Unlock instant, AI-driven research and patent intelligence for your innovation.

Generation of an identification evaluation regarding a system aspect of a system

a technology of system aspect and identification evaluation, applied in the field of computer systems, can solve problems such as the knowledge requirements of it department or third-party provider, the failure to perform the intended function, and the degradation of hardware components,

Pending Publication Date: 2021-09-23
UNCOMMONX INC
View PDF12 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

The present patent application claims priority to a provisional application filed on March 20, 2020, and is about a system analysis system that can evaluate computer systems and their hardware and software components. The system analysis system can detect and diagnose hardware and software issues, and recommend solutions to prevent system downtime and data loss caused by cyber-attacks. The patent text includes drawings and schematic block diagrams of the networked environment and system elements that can be used for evaluation and analysis. The technical effects of this patent are to provide a system analysis system that can efficiently and accurately evaluate computer systems and their components, and recommend solutions to prevent system downtime and data loss caused by cyber-attacks.

Problems solved by technology

Hardware components degrade over time and eventually are incapable of performing their intended functions.
The knowledge requirements for servicing a system typically outstrip the abilities of the IT department or third-party provider.
Thus, hardware and software may not be functioning properly and can adversely affect the overall system.
Cyber-attacks are initiated by individuals or entities with the bad intent of stealing sensitive information such as login / password information, stealing proprietary information such as trade secrets or important new technology, interfering with the operation of a system, and / or holding the system hostage until a ransom is paid, among other improper purposes.
A single cyber-attack can make a large system inoperable and cost the system owner many millions of dollars to restore and remedy.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Generation of an identification evaluation regarding a system aspect of a system
  • Generation of an identification evaluation regarding a system aspect of a system
  • Generation of an identification evaluation regarding a system aspect of a system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0153]FIG. 1 is a schematic block diagram of an embodiment of a networked environment that includes one or more networks 14, external data feeds sources 15, a plurality of systems 11-13, and an analysis system 10. The external data feed sources 15 includes one or more system proficiency resources 22, one or more business associated computing devices 23, one or more non-business associated computing devices 24 (e.g., publicly available servers 27 and subscription based servers 28), one or more BOT (i.e., internet robot) computing devices 25, and one or more bad actor computing devices 26. The analysis system 10 includes one or more analysis computing entities 16, a plurality of analysis system modules 17 (one or more in each of the systems 11-13), and a plurality of storage systems 19-21 (e.g., system A private storage 19, system B private storage 20, through system x private storage 21, and other storage). Each of the systems 11-13 includes one or more network interfaces 18 and many...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method includes determining, by an analysis system, a system aspect of a system for an identification evaluation. The method further includes determining, by the analysis system, at least one evaluation perspective for use in performing the identification evaluation on the system aspect. The method further includes determining, by the analysis system, at least one evaluation viewpoint for use in performing the identification evaluation on the system aspect. The method further includes obtaining, by the analysis system, identification data regarding the system aspect in accordance with the at least one evaluation perspective and the at least one evaluation viewpoint. The method further includes calculating, by the analysis system, an identification rating as a measure of system identification maturity for the system aspect based on the identification data, the at least one evaluation perspective, the at least one evaluation viewpoint, and at least one evaluation rating metric.

Description

CROSS-REFERENCE TO RELATED APPLICATIONS[0001]The present U.S. Utility Patent application claims priority pursuant to 35 U.S.C. § 119(e) to U.S. Provisional Application No. 62 / 992,661, entitled “SYSTEM ANALYSIS SYSTEM”, filed Mar. 20, 2020, which is hereby incorporated herein by reference in its entirety and made part of the present U.S. Utility Patent Application for all purposes.STATEMENT REGARDING FEDERALLY SPONSORED RESEARCH OR DEVELOPMENT[0002]Not Applicable.INCORPORATION-BY-REFERENCE OF MATERIAL SUBMITTED ON A COMPACT DISC[0003]Not Applicable.BACKGROUND OF THE INVENTIONTechnical Field of the Invention[0004]This disclosure relates to computer systems and more particularly to evaluation of a computer system.Description of Related Art[0005]The structure and operation of the Internet and other publicly available networks are well known and support computer systems (systems) of multitudes of companies, organizations, and individuals. A typical system includes networking equipment, e...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F11/34G06F11/07
CPCG06F11/3409G06F11/0793G06F11/3476G06Q10/06393G06F11/3668G06F21/6218H04L63/20H04L63/1408H04L63/1433G06F16/2379G06F11/26H04L63/1425G06F11/3006G06F11/3495G06F21/577G06F2221/034G06F11/079H04L63/1416G06F11/0709G06F11/076G06F11/3447
Inventor HICKS, RAYMONDPISANI, RYAN MICHAELMCNEELA, THOMAS JAMES
Owner UNCOMMONX INC