The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
May. 17, 2022

Filed:

Sep. 20, 2019
Applicant:

Bank of America Corporation, Charlotte, NC (US);

Inventors:

Michael J. Sbandi, Charlotte, NC (US);

Marisa Kamer, Naperville, IL (US);

Sanjay Lohar, Charlotte, NC (US);

Margaret M. Brewer, Charlotte, NC (US);

Anna E. Ganse, Chicago, IL (US);

Assignee:

Bank of America Corporation, Charlotte, NC (US);

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
H04L 29/00 (2006.01); H04L 29/06 (2006.01); G06F 11/36 (2006.01); G06N 20/00 (2019.01);
U.S. Cl.
CPC ...
H04L 63/1433 (2013.01); G06F 11/3612 (2013.01); G06N 20/00 (2019.01);
Abstract

A plurality of communicatively coupled, networked assets may be threatened or attacked by a cybersecurity attack. The operational resiliency of the computer network determines whether the cybersecurity attack leads to a shutdown of one or more assets, or even the entire computer network. Machines and processes are disclosed to improve operational cybersecurity resiliency of software on the computer network. Machine learning is used to identify potential vulnerabilities from a vulnerability database. Chaos stress testing using a machine learning algorithm can be performed on software to exploit the vulnerabilities. A blast radius can be set to minimize any potential negative side effects of the testing. Software can be remediated to account for responses to the testing by reconfiguring to prevent exploitation of the vulnerabilities. A financial impact of the exploited vulnerabilities can be calculated and reports can be generated.


Find Patent Forward Citations

Loading…