US 12,105,799 B2
Systems and methods for security intelligence exchange
Jonathan J. Thompson, Carmel, IN (US)
Assigned to AS0001, INC., Carmel, IN (US)
Filed by AS0001, Inc., Carmel, IN (US)
Filed on Apr. 5, 2024, as Appl. No. 18/628,314.
Application 18/628,314 is a continuation in part of application No. 18/203,630, filed on May 30, 2023.
Claims priority of provisional application 63/457,671, filed on Apr. 6, 2023.
Claims priority of provisional application 63/347,389, filed on May 31, 2022.
Prior Publication US 2024/0256663 A1, Aug. 1, 2024
This patent is subject to a terminal disclaimer.
Int. Cl. G06F 21/55 (2013.01)
CPC G06F 21/554 (2013.01) [G06F 2221/034 (2013.01)] 19 Claims
OG exemplary drawing
 
1. A method of improving cybersecurity protections across a plurality of entities, the method comprising:
identifying or collecting, by one or more processing circuits, incident data corresponding with a cybersecurity incident;
recording, by the one or more processing circuits, the incident data in a distributed ledger or data source;
analyzing, by the one or more processing circuits, the incident data utilizing a cybersecurity model to generate one or more verified intelligences corresponding to at least one cybersecurity threat;
determining, by the one or more processing circuits, the one or more verified intelligences corresponds to at least one of the plurality of entities based on at least one of firmographic data, identified security gaps, or existing protection guards;
decoding, by the one or more processing circuits, the one or more verified intelligences into one or more entity-specific data formats of the at least one of the plurality of entities;
configuring or re-configuring, by the one or more processing circuits, at least one security tool of the at least one of the plurality of entities, the configuration or re-configuration corresponds to protecting the at least one of the plurality of entities from the at least one cybersecurity threat;
generating, by the one or more processing circuits, a decentralized identity passport for each of the plurality of entities;
attaching or embedding, by the one or more processing circuits, a plurality of proof of controls to the decentralized identify passport of an entity of the plurality of entities, the plurality of proof of controls corresponding to one or more cybersecurity protection actions implemented by the entity; and
recording, by the one or more processing circuits, the plurality of proof of controls on the distributed ledger or data source as one or more exchanges linked to the decentralized identity passport.