The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Jun. 13, 2023

Filed:

Oct. 22, 2019
Applicant:

Honeywell International Inc., Morris Plains, NJ (US);

Inventors:

Tarun Gupta, Bangalore, IN;

Anusha Challa, Bangalore, IN;

Chetan Siddapura Kallappa, Bangalore, IN;

Assignee:

Honeywell International Inc., Morris Plains, NJ (US);

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
H04L 9/40 (2022.01); H04L 41/082 (2022.01); H04L 41/08 (2022.01); H04L 41/14 (2022.01); H04L 41/22 (2022.01);
U.S. Cl.
CPC ...
H04L 63/1425 (2013.01); H04L 41/082 (2013.01); H04L 41/0886 (2013.01); H04L 41/145 (2013.01); H04L 41/22 (2013.01);
Abstract

Various embodiments of the present disclosure are directed to automatic improved network architecture generation. In this regard, embodiments may process data representing a network architecture to generate an improved network architecture that resolves one or more vulnerabilities associated with the network architecture. In this regard, embodiments such as apparatuses, methods, and computer program products, are provided to identify a network architecture comprising a networked device set, determine cybersecurity threat set associated with the network architecture, identify an improved network configuration data set based on the cybersecurity threat set and the network device architecture, wherein each recommended sub network configuration of the improved network configuration data set decreases a threat likelihood associated with at least one determined cybersecurity threat from the cybersecurity threat set, generate an improved network architecture based on the network architecture and the improved network configuration data set, and output the improved network architecture.


Find Patent Forward Citations

Loading…