US-20260128889-A1 - SYSTEMS AND METHODS FOR THIRD-PARTY TOKENIZATION
Abstract
Systems, methods, and computer-readable media for modeling data using cyber resilience identities and associated metadata are disclosed. A system can include one or more processing circuits configured to generate at least one cyber resilience identity including at least a link or association with metadata and one or more actions or events performed by an entity or a third-party corresponding with one or more plan parameters, product parameters, or service parameters (PPPPSP) of a protection provider. The one or more processors can associate the at least one cyber resilience identity within a control structure, the control structure being compatible with at least one data structure. The one or more processors can transmit the at least one cyber resilience identity to at least one of (i) a distributed ledger, (ii) a data source, or (iii) an interface.
Inventors
- Simon Mullaney
- Jonathan J. Thompson
Assignees
- AS0001, INC.
Dates
- Publication Date
- 20260507
- Application Date
- 20241214
Claims (20)
- 1 . A method for modeling data using cyber resilience identities and associated metadata, the method comprising: generating, by one or more processing circuits, at least one cyber resilience identity comprising at least a link or association with metadata and one or more actions or events performed by an entity or a third-party corresponding with one or more plan parameters, product parameters, or service parameters (PPPPSP) of a protection provider; associating, by the one or more processing circuits, the at least one cyber resilience identity within a control structure, the control structure being compatible with at least one data structure corresponding with accessing at least a portion of the at least one cyber resilience identity based at least on the one or more protection provider PPPPSP of the protection provider; and transmitting, by the one or more processing circuits, the at least one cyber resilience identity to at least one of (i) a distributed ledger, (ii) a data source, or (iii) an interface.
- 2 . The method of claim 1 , wherein the control structure comprises a verification function to restrict one or more updates and redemptions of a metadata object, the verification function executable by the control structure to validate one or more of the one or more updates and redemptions of the metadata object by verifying one or more cryptographic proofs of authorization of a plurality of authorized entities prior to updating the at least one cyber resilience identity.
- 3 . The method of claim 2 , further comprising: receiving or identifying, by the one or more processing circuits, additional at least one PPPPSPs of an entity or third-party corresponding to the at least one cyber resilience identity; receiving, by the one or more processing circuits, at least one cryptographic proof of provenance of the additional at least one PPPPSPs; verifying, by the one or more processing circuits using the verification function of the control structure, the at least one cryptographic proof of provenance; updating, by the one or more processing circuits using the control structure, the at least one cyber resilience identity by updating the metadata object or appending the additional at least one PPPPSPs to a performance event dataset; and broadcasting, by the one or more processing circuits using the control structure, the updated the at least one cyber resilience identity to at least one of (i) a distributed ledger, (ii) a data source, or (iii) an interface.
- 4 . The method of claim 1 , further comprising: receiving, by the one or more processing circuits from an entity or third-party computing system of an entity or third-party corresponding to the at least one cyber resilience identity or from an authorized entity or third-party computing system corresponding to an authorized entity or third-party of a plurality of authorized entities, an access request for the at least one cyber resilience identity, the access request comprising the at least one data structure; verifying, by the one or more processing circuits using the control structure, the at least one data structure; granting, by the one or more processing circuits, access to a metadata object and a performance event dataset within the at least one cyber resilience identity to the entity or third-party or the authorized entity; decrypting, by the one or more processing circuits, the metadata object; and providing, by the one or more processing circuits, the access to the metadata object and a performance event dataset by facilitating retrieval using a secure interface between the one or more processing circuits and the entity or third-party computing system or the authorized entity or third-party computing system.
- 5 . The method of claim 1 , wherein the at least one cyber resilience identity is a data structure encapsulating a plurality of resilience tokens, each of the plurality of resilience tokens corresponding to a cybersecurity dimension of a posture of an entity or third-party corresponding to the at least one cyber resilience identity, the plurality of resilience tokens comprising at least: at least one unified token comprising cyber resilience data captured over a period of time; at least one evaluation token comprising the cyber resilience data captured at a plurality of points in time over the period of time; and at least one roll-up token comprising data of the at least one unified token and at least one real-time token corresponding with a security performance of the entity or third-party over the period of time.
- 6 . The method of claim 5 , wherein the at least one unified token comprises: a unified safeguard token comprising data of implemented safeguards and configurations over the period of time; a unified requirements token comprising data of entity-specific requirements and third-party requirements over the period of time; a unified asset token comprising data of a plurality of assets of the entity or third-party over the period of time; or a unified attestation token comprising data of entity or third-party attestations over the period of time.
- 7 . The method of claim 5 , wherein the at least one real-time token comprises: a plurality of evaluation tokens comprising data of at least one of a posture of the entity, a state of the entity, or a protection of the entity or third-party at a point in time of the plurality of points in time over the period of time.
- 8 . The method of claim 1 , further comprising: generating, by the one or more processing circuits, the at least one data structure for at least one of an entity or third-party computing system of an entity or third-party corresponding to the cyber resilience identity or an authorized entity or third-party computing system corresponding to an authorized entity or third-party of a plurality of authorized entities; or receiving, by the one or more processing circuits from at least one of the entity or third-party computing system or the authorized entity or third-party computing system, the at least one data structure.
- 9 . The method of claim 8 , wherein the at least one data structure comprises a token, key, certificate, or access mechanism, and wherein determining the at least one data structure being compatible with the control structure comprises: in response to receiving the at least one data structure, configuring the at least one data structure by updating the control structure to enforce restricting one or more updates and redemptions of a metadata object, wherein updating the control structure comprises updating one or more access parameters of the control structure; or in response to generating the at least one data structure, providing, by the one or more processing circuits to the entity or third-party computing system or the authorized entity or third-party computing system, the at least one data structure.
- 10 . The method of claim 1 , wherein metadata and one or more actions or events comprises at least one of firmographics data, safeguard data, performance data, policy data, incident data, or claims data, and wherein the control structure comprises a smart contract.
- 11 . A system for modeling data using resilience identities and associated metadata, the system comprising: one or more processing circuits configured to: generate at least one resilience identity comprising at least a link or association with metadata and one or more actions or events performed by a entity or a third-party corresponding with one or more plan parameters, product parameters, or service parameters (PPPPSP) of a protection provider; associate the at least one resilience identity within a control structure, the control structure being compatible with at least one data structure corresponding with accessing at least a portion of the at least one resilience identity based at least on the one or more protection provider PPPPSP of the protection provider; and transmit the at least one resilience identity to at least one of (i) a distributed ledger, (ii) a data source, or (iii) an interface.
- 12 . The system of claim 11 , wherein the control structure comprises a verification function to restrict one or more updates and redemptions of a metadata object, the verification function executable by the control structure to validate one or more updates and redemptions of the metadata object by verifying one or more cryptographic proofs of authorization of a plurality of authorized entities prior to updating the at least one resilience identity.
- 13 . The system of claim 12 , the one or more processing circuits further configured to: receive or identify additional at least one PPPPSPs of an entity or third-party corresponding to the at least one resilience identity; receive at least one cryptographic proof of provenance of the additional at least one PPPPSPs; verify, using the verification function of the control structure, the at least one cryptographic proof of provenance; update, using the control structure, the at least one resilience identity by updating the metadata object or appending the additional at least one PPPPSPs to a performance event dataset; and broadcast, using the control structure, the at least one updated resilience identity to at least one of (i) a distributed ledger, (ii) a data source, or (iii) an interface.
- 14 . The system of claim 11 , the one or more processing circuits further configured to: receive, from an entity or third-party computing system of an entity or third-party corresponding to the at least one resilience identity or from an authorized entity or third-party computing system corresponding to an authorized or third-party of a plurality of authorized entities, an access request for the at least one cyber resilience identity, the access request comprising the at least one data structure; verify, using the control structure, the at least one data structure; grant access to a metadata object and a performance event dataset within the at least one resilience identity to the entity or third-party or the authorized entity; decrypt the metadata object; and provide access to the metadata object and the performance event dataset by facilitating retrieval using a secure interface between the one or more processing circuits and the entity or third-party computing system or the authorized entity or third-party computing system.
- 15 . The system of claim 11 , wherein the at least one resilience identity is a data structure encapsulating a plurality of resilience tokens, each of the plurality of resilience tokens corresponding to a cybersecurity dimension of a posture of an entity or third-party corresponding to the at least one resilience identity, the plurality of resilience tokens comprising at least: at least one unified token comprising the resilience data captured over a period of time; at least one evaluation token comprising the resilience data captured at a plurality of points in time over the period of time; and at least one roll-up token comprising data of the at least one unified token and at least one real-time token corresponding with a security performance of the entity or third-party over the period of time.
- 16 . The system of claim 15 , wherein the at least one unified token comprises: a unified safeguard token comprising data of implemented safeguards and configurations over the period of time; a unified requirements token comprising data of entity-specific requirements and third-party requirements over the period of time; a unified asset token comprising data of a plurality of assets of the entity or third-party over the period of time; or a unified attestation token comprising data of entity or third-party attestations over the period of time.
- 17 . The system of claim 15 , wherein the at least one real-time token comprises: a plurality of evaluation tokens comprising data of at least one of a posture of the entity, a state of the entity, or a protection of the entity or third-party at a point in time of the plurality of points in time over the period of time.
- 18 . The system of claim 11 , the one or more processing circuits further configured to: generate the at least one data structure for at least one of an entity or third-party computing system of an entity or third-party corresponding to the at least one resilience identity or an authorized entity or third-party computing system corresponding to an authorized entity or third-party of a plurality of authorized entities; or receive, from at least one of the entity or third-party computing system or the authorized entity or third-party computing system, the at least one data structure.
- 19 . The system of claim 18 , wherein the least one data structure comprises a token, key, certificate, or access mechanism, and wherein the one or more processing circuits are further configured to, in determining the at least one data structure being compatible with the control structure: in response to receiving the at least one data structure, configure the at least one data structure by updating the control structure to enforce restricting one or more updates and redemptions of a metadata object, wherein updating the control structure comprises updating one or more access parameters of the control structure; or in response to generating the at least one data structure, provide, to the entity or third-party computing system or the authorized entity or third-party computing system, the at least one data structure.
- 20 . A non-transitory computer readable medium (CRM) comprising one or more instructions stored thereon and executable by one or more processors to: generate at least one cyber resilience identity comprising at least a link or association with metadata and one or more actions or events performed by an entity or a third-party corresponding with one or more plan parameters, product parameters, or service parameters (PPPPSP) of a protection provider; associate the at least one cyber resilience identity within a control structure, the control structure being compatible with at least one data structure corresponding with accessing at least a portion of the at least one cyber resilience identity based at least on the one or more protection provider PPPPSP of the protection provider; and transmit the at least one cyber resilience identity to at least one of (i) a distributed ledger, (ii) a data source, or (iii) an interface.
Description
CROSS-REFERENCE TO RELATED PATENT APPLICATIONS This application is a continuation of U.S. Non-Provisional patent application Ser. No. 18/826,123 filed Sep. 5, 2024, which claims priority to U.S. Provisional Patent Application No.: 63/649,296, filed May 17, 2024, each of which are incorporated herein by reference in their entireties and for all purposes. BACKGROUND The present implementations relates generally to computer security architecture and software for information security and cybersecurity. In a computer networked environment, entities such as people or companies have vulnerabilities that can result in security incidents. Some entities may desire to implement protections and some entities may desire to offer protections. SUMMARY Some implementations relate to a method for modeling data using cyber resilience identities and associated metadata. The method includes receiving or identifying, by one or more processing circuits, cyber resilience data including at least a portion of metadata of the cyber resilience data or a link to the portion of the metadata of the cyber resilience data; generating, by the one or more processing circuits, at least one cyber resilience identity including at least a link with the metadata and one or more actions or events performed by an entity or third-party; associating, by the one or more processing circuits, the at least one cyber resilience identity within a control structure, the control structure being compatible with at least one access data structure corresponding with accessing at least a portion of the at least one cyber resilience identity; and transmitting, by the one or more processing circuits, the at least one cyber resilience identity to at least one of (i) a distributed ledger, (ii) a data source, or (iii) an interface. Some implementations relate to a system for modeling data using resilience identities and associated metadata. The system including one or more processing circuits configured to receive or identify resilience data including at least a portion of metadata of the resilience data or a link to the portion of the metadata of the resilience data; generate at least one resilience identity including at least a link with the metadata and one or more actions or events performed by an entity or third-party; associate the at least one resilience identity within a control structure, the control structure being compatible with at least one access data structure corresponding with accessing at least a portion of the at least one resilience identity; and transmit the at least one resilience identity to at least one of (i) a distributed ledger, (ii) a data source, or (iii) an interface. Some implementations relate to a non-transitory computer readable medium (CRM) including one or more instructions stored thereon and executable by one or more processors to receive or identify cyber resilience data including at least a portion of metadata of the cyber resilience data or a link to the portion of the metadata of the cyber resilience data; generate at least one cyber resilience identity including at least a link with the metadata and one or more actions or events performed by an entity or third-party; associate the at least one cyber resilience identity within a control structure, the control structure being compatible with at least one access data structure corresponding with accessing at least a portion of the at least one cyber resilience identity; and transmit the at least one cyber resilience identity to at least one of (i) a distributed ledger, (ii) a data source, or (iii) an interface. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 depicts a block diagram of an implementation of a security architecture for synchronizing and protecting data, according to some arrangements. FIGS. 2A-2B depicts a block diagram of another architecture of certain systems or devices of FIG. 1, according to some arrangements. FIG. 3 depicts a block diagram of another architecture of certain systems or devices of FIG. 1, according to some arrangements. FIG. 4 depicts a block diagram of another architecture of certain systems or devices of FIG. 1, according to some arrangements. FIG. 5 depicts a block diagram of another architecture of certain systems or devices of FIG. 1, according to some arrangements. FIG. 6 depicts a block diagram of another architecture of certain systems or devices of FIG. 1, according to some arrangements. FIG. 7 depicts a block diagram of an implementation of a system for improving cybersecurity protections across a plurality of entities, according to some arrangements. FIG. 8 depicts a block diagram of a system to analyze proof of performance of the plurality of entities to improve cybersecurity protections. FIG. 9 depicts a flowchart of a method for improving cybersecurity protections across the plurality of entities, according to some arrangements. FIG. 10 depicts a block diagram of another architecture of certain systems or devices of FIG. 7, according to