US 12,367,282 B2
Bit-level data extraction and threat detection
Garrett Thomas Oetken, Post Falls, ID (US); and Henry Stoltenberg, Walnut Creek, CA (US)
Assigned to Quantum Star Technologies Inc., Coeur d'Alene, ID (US)
Filed by Quantum Star Technologies Inc., Coeur d'Alene, ID (US)
Filed on Mar. 8, 2024, as Appl. No. 18/600,516.
Application 18/600,516 is a continuation of application No. 17/185,884, filed on Feb. 25, 2021, abandoned.
Prior Publication US 2024/0330453 A1, Oct. 3, 2024
Int. Cl. G06F 21/56 (2013.01); G06N 7/01 (2023.01); G06N 20/00 (2019.01)
CPC G06F 21/562 (2013.01) [G06N 7/01 (2023.01); G06N 20/00 (2019.01); G06F 2221/033 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A system comprising:
control circuitry; and
memory communicatively coupled to the control circuitry and storing executable instructions that, when executed by the control circuitry, cause the control circuitry to perform operations comprising:
receiving network traffic data that includes a plurality of bits, the network traffic data being structured in a first format;
extracting a first set of bits from the plurality of bits;
determining a first coordinate for a first point based on the first set of bits;
extracting a second set of bits from the plurality of bits;
determining a second coordinate for the first point based on the second set of bits;
extracting a third set of bits from the plurality of bits;
determining a first coordinate for a second point based on the third set of bits;
extracting a fourth set of bits from the plurality of bits;
determining a second coordinate for the second point based on the fourth set of bits;
mapping the first point and the second point to an n-dimensional space;
using a pattern recognition algorithm to identify a set of points represented in the n-dimensional space;
generating an n-dimensional model for the set of points and storing n-dimension data for the n-dimensional model in a data structure;
processing the n-dimensional model with an Artificial Intelligence (AI) model that is configured to detect data security issues;
based on the processing, determining that the network traffic data includes a data security issue;
removing a portion of the network traffic data that is associated with the data security issue from the network traffic data; and
sending the network traffic data to a device.