MUMBAI, India, Jan. 23 -- Intellectual Property India has published a patent application (202541117175 A) filed by Mrs. Priyanka K; Mr. Mathesh T; Mr. Lingeshwar. A; Mr. Jeevithkumar P; Mr. Karan S; and Mr. Sivaraj. M, Coimbatore, Tamil Nadu, on Nov. 26, 2025, for 'encrypted medical prescription and data management.'

Inventor(s) include Mrs. Priyanka K; Mr. Mathesh T; Mr. Lingeshwar. A; Mr. Jeevithkumar P; Mr. Karan S; and Mr. Sivaraj. M.

The application for the patent was published on Jan. 23, under issue no. 04/2026.

According to the abstract released by the Intellectual Property India: "Entity verification is a crucial building block of most modern cyber security operations, done manually by analysts on numerous threat intelligence platforms such as Virus Total, Abuse IPDB, and IP info. The fragmentation often leads to inconsistent data interpretation, redundant efforts, and significant delays in responding to potential security incidents. An automated threat verification framework is hereby presented, addressing the limitations above by integrating diverse intelligence sources into a unified, intelligent verification environment. Its system automatically collects, preprocesses, and normalizes threat data for accuracy, coherence, and reliability. It accelerates this process with high analytical precision, reducing the workload of cyber security professionals in doing the aforementioned tasks. It features an advanced correlation erigine that analyzes, compares, and merges intelligence from different sources. The framework identifies redundancies, eliminates duplicates, creates one unified score of a threat with its,confidence level for each entity, and hence helps make informed decisions more effectively. Automation reduces human error and offers real-time insight into emerging threats. Its modular architecture allows for smooth integration with other cyber security tools such as SIEM and SOAR platforms for flexibility and adaptability in dynamic environments. In all, the Automated Threat Verification Framework raises the bar for threat intelligence automation in the verification of suspicious digital entities by making it more accurate, faster, and consistent, and generally fortifies the efficiency of cyber security defense mechanisms."

Disclaimer: Curated by HT Syndication.