发明名称 System and method of data cognition incorporating autonomous security protection
摘要 Autonomous embedded data cognition enables data to perform real-time environmental configuration control, self-manage, perform analysis, determine its current situation, and evaluate behavior to respond accordingly. When created, security measures, and access controls are selected. Highly sensitive data can be extracted and substituted with creator label and/or functional representation. Data-to-data reasoning and analysis can be performed. The processing method comprises autonomous monitoring for a state change and analyzing the current user to determine if the instantiation should exist. If affirmed, the cognition engine automatically configures the computational environment in which it resides. If denied, environmental behavior is further analyzed for security problems or an erroneous situation. If detected, the creator is alerted and provided with incident information enabling remote creator control of the data. Cognitive data can decide to self-destruct mitigating risk of undesirable instantiations. Intelligent Agents, a comprehensive data structure, and intelligent document means are leveraged for implementation.
申请公布号 US9038193(B2) 申请公布日期 2015.05.19
申请号 US200812164844 申请日期 2008.06.30
申请人 Azos Al, LLC 发明人 Burgess Sheila Jean;Burgess, IV George G.
分类号 G06F21/62;G06F21/31;G06F21/55;H04L12/66 主分类号 G06F21/62
代理机构 代理人 Heiman, Esq. Lee C.
主权项 1. A method for data environment management and control comprising: executing on a processor a secured data file comprising a data file and embedded cognitive data processing capabilities for securing the secured data file, wherein the embedded cognitive data processing capabilities cause the processor to perform steps comprising: closing any open environment ports based upon the security requirements of the secured data file; terminating processes that are not used in conjunction with the data file based upon the security requirements; accessing the data file for a user to utilize based upon data creator selected controls and constraints; blocking opening of environment communication to ports that are not used in conjunction with the data while the data file is activated; permitting allowed user commands based upon the security requirements upon user access to the data file; and terminating the data file access to the user based upon the user's indication of selecting to terminate the user access of the data file or, upon an event occurrence in the environment that does not meet the security requirements of the data file.
地址 Haymarket VA US