MUMBAI, India, Feb. 6 -- Intellectual Property India has published a patent application (202631010862 A) filed by C. V. Raman Global University, Bhubaneswar, Orissa, on Feb. 2, for 'multi-layered cybersecurity integrating llm threat prediction, ephemeral crypto authentication, and tamper-evident distributed anomaly ledger for proactive security operations.'

Inventor(s) include Adya Omnkar Panda; Mohit Ranjan; Soujanya Pandia; Rituparna Satpathy; Dhananjay; and Dr. Ram Chandra Barik.

The application for the patent was published on Feb. 6, under issue no. 06/2026.

According to the abstract released by the Intellectual Property India: "VectorVault presents an innovative cybersecurity architecture that fundamentally transforms defense from reactive to proactive through the integration of two core indigenous frameworks: the Predictive Event Anomaly Recorder (P.E.A.R) Engine and the Advanced Security & Token-Based Rotating Authentication (A.S.T.R.A) Framework. The P.E.A.R Engine operates as an anti-causal inference mechanism that analyzes preceding data behavior to forecast security anomalies before they manifest, utilizing a Bi-nodal topography comprising a Real-Time Ingestion (RTI) Node and a Predictive Ingestion (PI) Node. The engine employs neural deviation analysis through CUDAaccelerated CNN-LSTM pipelines combined with Ground Deviation Modules (GDM) and Volume Deviation Modules (VDM) to automatically isolate and neutralize malicious payloads within pseudo-server trapping mechanisms without impacting live systems. The A.S.T.R.A Framework revolutionizes authentication by introducing ephemeral, daily-rotating credentials through a hardened multi-stage cryptographic pipeline incorporating HMAC-SHA256 pre-hashing, PBKDF2 CPU-cost slowdown, ShuffleRoleByte cryptographic role-binding, MFA-HMAC mathematical binding, and Argon2id memory-hard resistance. This framework eliminates the static credential vulnerability inherent in traditional authentication systems, rendering stolen password hashes cryptographically invalid within 24 hours and preventing privilege escalation attacks at the credential level through role-embedded cryptography. The integrated system achieves autonomous threat isolation, continuous self-learning through reinforcement feedback loops, and tamper-evident auditing via an immutable Agentic Ledger employing Merkle-tree hash chaining. Hardware integration includes FIPS 140-3 compliant HSMs for key custody, TPM 2.0 modules for secure boot, FPGA cryptographic accelerators for sub-millisecond encryption, and GPS-NTP appliances for tamper-evident timestamps. Performance benchmarks demonstrate sustained throughput of 1.2 million events per second, neural response latency below 50 milliseconds, authentication cycle completion in 431 milliseconds, and 99.99% operational uptime with zero-downtime failover capabilities. The architecture supports elastic scalability across small, medium, and enterprise deployments while maintaining identical security postures and compliance with ISO 27001, NIST 800-53, FIPS 140-3, and SOC 2 standards, establishing a self-sustaining digital immune system capable of autonomous prediction, prevention, and self-healing without human dependency."

Disclaimer: Curated by HT Syndication.