BSV
$52.67
Vol 33.52m
-7.56%
BTC
$96057
Vol 52364.66m
-2.23%
BCH
$446.32
Vol 414.27m
-4.28%
LTC
$98.08
Vol 958.92m
-6.34%
DOGE
$0.3
Vol 6692.13m
-8.05%
Getting your Trinity Audio player ready...

Tech giant IBM has secured a patent for a blockchain-powered network security system, the latest blockchain IP to be tied up by the firm.

The patent describes how blockchain technology can be used to monitor network security breaches within computer systems, one of many specific use cases filed with the U.S. Patent and Trademark Office (USPTO) by the IT firm.

According to the preamble to the filing, the system would rely on a distributed network of monitors, recording and writing log data to a blockchain, while providing essential safeguards against hackers who try to cover their tracks.

The patent stated, “The present invention may include configuring monitors in a chain configuration by configuring a network address of a primary monitor to a backup monitor. The present invention may include configuring a sensor to communicate with the monitors. The present invention may include receiving a first set of information from the sensor to a primary and backup monitor and broadcasting the information to a plurality of monitors and logging the information.”

The patent continues to describe how networks can use node consensus to identify irregularities in reconciling data from their network monitors.

“On a computer system or network, data may be monitored for many different purposes. Data monitoring may identify problems, observe conditions or track metrics by logging the events of a given computer system or network,” according to the patent filing. “Having synchronized monitors set up in a blockchain configuration ensures consensus among the monitors. Since one monitor alone cannot alter the event log in the past or cannot fake the event log in the future, if one monitor is hacked, then there may be no consensus among the synchronized monitors and the event may not get written into the log.”

Information detected by the system is passed to multiple monitors, allowing consensus for automatically validating information. In the event of a discrepancy, the system will instantly detect and flag the potential breach.

According to IBM’s filing, this technology would “create a less vulnerable network,” and “may alert the monitor security program of inconsistent data.”

Recommended for you

Google unveils ‘Willow’; Bernstein downplays quantum threat to Bitcoin
Google claims that Willow can eliminate common errors associated with quantum computing, while Bernstein analysts noted that Willow’s 105 qubits...
December 18, 2024
WhatsOnChain adds support for 1Sat Ordinals with new API set
WhatsOnChain now supports the 1Sat Ordinals with a set of APIs in beta testing; with this new development, developers can...
December 13, 2024
Advertisement
Advertisement
Advertisement