MUMBAI, India, April 10 -- Intellectual Property India has published a patent application (202441075317 A) filed by Apexcognita Private Limited, Hyderabad, Telangana, on Oct. 4, 2024, for 'quantum-resistant device registration and validation system with ai-driven behavioral authentication and blockchain-based identity management for secure iot and edge computing environments.'

Inventor(s) include Babu Siva Prasad Dachepalli.

The application for the patent was published on April 10, under issue no. 15/2026.

According to the abstract released by the Intellectual Property India: "The Device Registration and Validation system (100) is an advanced solution for securely registering, authenticating, and managing devices in complex IoT and edge computing environments. It employs quantum-resistant cryptography for long-term security, AI-driven behavioral authentication for continuous device validation, and a blockchain-based device registry for immutable identity management. The system features zero-touch provisioning, secure over-the-air updates, and cross-platform integration capabilities. It is designed to meet the scalability and security requirements of diverse IoT deployments, from smart homes to large-scale smart city infrastructures, while providing adaptive threat detection and response mechanisms. The system's edge computing security module extends protection to the network edge, enabling local decision-making and distributed threat detection. The system features extensible protocol support, adaptive device profiling, and scalable identity management, complemented by advanced federated learning and multi-dimensional fingerprinting techniques, ensuring robust security and scalability in diverse and evolving IoT ecosystems. 12. DESCRIPTION OF THE DRAWINGS Fig. 1: Overall System Architecture of the Device Registration and Validation System Fig. 2: Quantum-Resistant Device Identity Generation Process Fig. 3: AI-Powered Device Behavior Profiling Process Fig. 4: Blockchain-Based Device Registry Structure Fig. 5: Zero-Touch Provisioning Workflow Fig. 6: Continuous Authentication Mechanism Fig. 7: Secure OTA Update System Architecture Fig. 8: Cross-Platform Integration Layer Fig. 9: Edge Computing Security Module Architecture Fig. 10: Anomaly Detection and Threat Response Workflow Fig. 11: Quantum Resilience Strategy Implementation Fig. 12: Scalability Scenarios Comparison Fig. 13: AI-Driven Behavioral Authentication Process Fig. 14: Blockchain-Based Identity Management Workflow Fig. 15: Edge-Based Threat Detection and Response 13. DRAWINGS (Refer to separate sheets for detailed diagrams)."

Disclaimer: Curated by HT Syndication.