-
公开(公告)号:US11188641B2
公开(公告)日:2021-11-30
申请号:US16261490
申请日:2019-01-29
摘要: Provided are a computer program product, system, and method for detecting a security breach in a system managing access to a storage. Process Input/Output (I/O) activity by a process accessing data in a storage is monitored. A determination is made of a characteristic of the data subject to the I/O activity from the process. A determination is made as to whether a characteristic of the process I/O activity as compared to the characteristic of the data satisfies a condition. The process initiating the I/O activity is characterized as a suspicious process in response to determining that the condition is satisfied. A security breach is indicated in response to characterizing the process as the suspicious process.
-
公开(公告)号:US11175994B2
公开(公告)日:2021-11-16
申请号:US16440975
申请日:2019-06-13
IPC分类号: G06F11/14
摘要: Provided are a computer program product, system, and method for copying data from multiple point-in-time copies to a log storage to use to roll-back a source storage managing point-in-time copies of a source storage. A plurality of point-in-time copies of a source storage at different point-in-times are established. In response to receiving writes to the source storage after establishing each of the point-in-time copies, point-in-time data in the source storage is copied, before being updated by the received writes, to a log storage, wherein the log storage stores point-in-time data for multiple of the point-in-time copies. The log storage is used to roll-back the source storage to a selected point-in-time of one of the point-in-time copies.
-
公开(公告)号:US11151109B2
公开(公告)日:2021-10-19
申请号:US15839291
申请日:2017-12-12
摘要: Provided are techniques for indexing and archiving multiple statements using a single statement dictionary in a document containing the multiple statements. A document comprising a statement dictionary and one or more statements is indexed by extracting a statement metadata corresponding to each of the one or more statements from the statement dictionary. Each statement metadata is stored in a database. In response to a search request for a statement, the statement is retrieved using the corresponding statement metadata.
-
公开(公告)号:US11151108B2
公开(公告)日:2021-10-19
申请号:US15357217
申请日:2016-11-21
摘要: Provided are techniques for indexing and archiving multiple statements using a single statement dictionary in a document containing the multiple statements. A document comprising a statement dictionary and one or more statements is indexed by extracting a statement metadata corresponding to each of the one or more statements from the statement dictionary. Each statement metadata is stored in a database. In response to a search request for a statement, the statement is retrieved using the corresponding statement metadata.
-
公开(公告)号:US11144639B2
公开(公告)日:2021-10-12
申请号:US16292306
申请日:2019-03-04
IPC分类号: G06F21/55 , G06F12/0888 , G06F21/56 , G06F12/0895
摘要: Provided are a computer program product, system, and method for determining whether to destage write data in cache to storage based on whether the write data has malicious data. Write data for a storage is cached in a cache. A determination is made as to whether the write data in the cache comprises random data according to a randomness criteria. The write data in the cache to the storage in response to determining that the write data does not comprise random data according to the randomness criteria. The write data is processed as malicious data after determining that the write data comprises random data according to the randomness criteria.
-
公开(公告)号:US11132755B2
公开(公告)日:2021-09-28
申请号:US16175492
申请日:2018-10-30
发明人: Roger C. Raphael , Rajesh M. Desai , Nazrul Islam , Satwik Hebbar
IPC分类号: G06Q50/18 , G06N5/02 , G06F16/93 , G06F16/242 , G06F16/901 , G06F16/9535 , G06F40/30 , G06F40/295 , G06F16/36
摘要: Provided are techniques for extracting, deriving, and using legal matter semantics to generate e-discovery queries in an e-discovery system. A semantic knowledge graph is iteratively built by receiving meet and confer document instances, legal matter types, historical e-discovery queries for different legal matters, and legal semantic types extracted from the historical e-discovery queries. The legal semantic types are added to the semantic knowledge graph, and a list of terms that serve as a basis of an initial query are identified. An e-discovery query is generated for an e-discovery system. The e-discovery query is modified using the semantic knowledge graph and additional input by receiving a legal matter type and meet and confer information, obtaining the legal semantic types that are relevant to the legal matter type and the meet and confer information, and modifying the e-discovery query. The modified e-discovery query is provided. Then, the modified e-discovery query is executed.
-
公开(公告)号:US11093395B2
公开(公告)日:2021-08-17
申请号:US16534676
申请日:2019-08-07
IPC分类号: G06F12/08 , G06F12/0817 , G06F12/123
摘要: Provide a computer program product, system, and method for adjusting insertion points used to determine locations in a cache list at which to indicate tracks based on number of tracks added at insertion points. There are a plurality of insertion points to a cache list for the cache having a least recently used (LRU) end and a most recently used (MRU) end. Each insertion point of the insertion points identifies a track in the cache list. A plurality of tracks are indicated at positions in the cache list with respect to insertion points. For each track indicated at an insertion point of the insertion points, at least one insertion point counter for at least one insertion point with respect to the insertion point at which the track is indicated is incremented. A plurality of the insertion points are adjusted to point to different tracks in the cache list based on insertion point counters for the insertion points.
-
公开(公告)号:US11082417B2
公开(公告)日:2021-08-03
申请号:US16657687
申请日:2019-10-18
IPC分类号: H04L29/06
摘要: Provided are techniques for authenticating a device. Accepted communication patterns representing accepted modes of communication between devices in an internet of things network are stored. In response to receiving a new communication from a requesting device of the devices, it is determined whether the new communication matches at least one of the accepted communication patterns. In response to determining that the new communication matches, there is a response to the new communication. In response to determining that the new communication does not match, flagging the new communication as an anomaly and determining how to process the new communication based on the flagging.
-
公开(公告)号:US11080397B2
公开(公告)日:2021-08-03
申请号:US16129616
申请日:2018-09-12
摘要: Provided are a computer program product, system, and method for using trap cache segments to detect malicious processes. A trap cache segment to the cache for data in the storage and indicated as a trap cache segment. Cache segments are added to the cache having data from the storage that are not indicated as trap cache segments. A memory function call from a process executing in the computer system reads data from a region of a memory device to output the read data to a buffer of the memory device. A determination is made as to whether the region of the memory device includes the trap cache segment. The memory function call is blocked and the process is treated as a potentially malicious process in response to determining that the region includes the trap cache segment.
-
公开(公告)号:US11074185B2
公开(公告)日:2021-07-27
申请号:US16534651
申请日:2019-08-07
IPC分类号: G06F12/123 , G06F12/0817
摘要: Provided are a computer program product, system, and method for adjusting a number of insertion points used to determine locations in a cache list at which to indicate tracks. Tracks added to the cache are indicated in a cache list. The cache list has a least recently used (LRU) end and a most recently used (MRU) end. In response to indicating in a cache list an insertion point interval number of tracks in the cache in a cache list, setting an insertion point to indicate one of the tracks of the insertion point interval number of tracks indicated in the cache list. Insertion points to tracks in the cache list are used to determine locations in the cache list at which to indicate tracks in the cache in the cache list.
-
-
-
-
-
-
-
-
-