SECURE APPROVAL CHAIN FOR RUNTIME PROTECTION

    公开(公告)号:US20220116216A1

    公开(公告)日:2022-04-14

    申请号:US17069436

    申请日:2020-10-13

    Abstract: A secure approval chain for runtime protection is disclosed. As an application or pod is developed in a pipeline, an approval engine ensures that the pod is approved by all approvers. The approval engine generates a deployment token that is added to the configuration data of the pod and that can be used at deployment to perform various security operations including pod verification, runtime environment control and enforcement, and pod or application verification.

    Rescue package for uncontrollable splitters

    公开(公告)号:US11275658B2

    公开(公告)日:2022-03-15

    申请号:US16802795

    申请日:2020-02-27

    Abstract: A data protection system configured to replicate data may generate rescue packages that allow the system to recover when communication between a splitter or source of the production data being replicated and an appliance that stores the replicated data is disrupted. The rescue package is stored on a datastore and is then retrieved by the data protection system or another splitter. After processing the rescue package, which may contain IOs that the data protection is unaware of due to the communication disruption, replication may resume normally.

    DATACENTER IoT-TRIGGERED PREEMPTIVE MEASURES USING MACHINE LEARNING

    公开(公告)号:US20210349776A1

    公开(公告)日:2021-11-11

    申请号:US17382065

    申请日:2021-07-21

    Abstract: One example method includes performing a machine learning process that involves performing an assessment of a state of a computing system, and the assessment includes analyzing information generated by an IoT edge sensor in response to a sensed physical condition in the computing system, and identifying an entity in the computing system potentially impacted by an event associated with the physical condition. The example method further includes identifying a preemptive recovery action and associating the preemptive recovery action with an entity, and the preemptive recovery action, when performed, reduces or eliminates an impact of the event on the entity, determining a cost associated with implementation of the preemptive recovery action, evaluating the cost associated with the preemptive recovery actions and identifying the preemptive recovery action with the lowest associated cost, implementing the preemptive recovery action with the lowest associated cost, and repeating part of the machine learning process.

    Data provenance using distributed ledgers

    公开(公告)号:US10929389B2

    公开(公告)日:2021-02-23

    申请号:US16170229

    申请日:2018-10-25

    Abstract: Data provenance techniques are provided using distributed ledgers. An exemplary method comprises obtaining an indication of a data operation that operates on a data item, wherein the data operation comprises an operation type; creating an operation transaction in a first data ledger for the data operation, wherein the operation transaction comprises an identifier of the operation type, an identifier of an operator entity that performs the data operation; an identifier of the data item, and a timestamp of the data operation; and maintaining a provenance graph comprising a provenance graph transaction for a plurality of data operations in the first data ledger and/or a second data ledger, wherein a given provenance graph transaction comprises an identifier of source data items used to create the data item associated with the given provenance graph transaction and sources of the source data items, wherein the first data ledger and/or the second data ledger are used to determine an origin and/or recipients of one or more data items.

    Translating existing security policies enforced in upper layers into new security policies enforced in lower layers

    公开(公告)号:US10715554B2

    公开(公告)日:2020-07-14

    申请号:US16143250

    申请日:2018-09-26

    Abstract: Existing policies enforced at or above an operating system (OS) layer of a device are obtained. Translation rules are stored that include data structure descriptions of conditions, corresponding actions performed when the conditions are satisfied, and attributes specified in the existing policies, and attributes of one or more layers below the OS layer that are relevant to policy enforcement in the one or more layers below the OS layer. The existing policies are parsed using the data structure descriptions to identify the conditions, corresponding actions, and attributes specified in the existing policies. New policies are generated that are consistent with the existing policies. The new policies include the identified attributes specified in the existing policies and the attributes relevant to policy enforcement in the one or more layers below the OS layer. The new policies are enforced in the one or more layers below the OS layer.

    Tracing Mechanism for Monitoring and Analysis of Cloud-Based Communication Session Attacks

    公开(公告)号:US20200028863A1

    公开(公告)日:2020-01-23

    申请号:US16039503

    申请日:2018-07-19

    Abstract: A tracing mechanism is provided for analyzing session-based attacks. An exemplary method comprises: detecting a potential attack associated with a session from a potential attacker based on predefined anomaly detection criteria; adding a tracing flag identifier to a response packet; sending a notification to a cloud provider of the potential attack, wherein the notification comprises the tracing flag identifier; and sending the response packet to the potential attacker, wherein, in response to receiving the response packet with the tracing flag identifier, the cloud provider: determines a source of the potential attack based on a destination of the response packet; forwards the response packet to the potential attacker based on the destination of the response packet; and monitors the determined source to evaluate the potential attack. The response packet is optionally delayed by a predefined time duration and/or until the cloud provider has acknowledged receipt of the notification.

    BACKUP AND TIERED POLICY COORDINATION IN TIME SERIES DATABASES

    公开(公告)号:US20200019470A1

    公开(公告)日:2020-01-16

    申请号:US16035221

    申请日:2018-07-13

    Abstract: A data protection system configured to backup a time series database is provided. The data protection system may be integrated with or have access to consolidation policies of the time series database. The backup policy and backup retention policy are set by monitoring the consolidation policy and adjusting the backup policy to ensure that the data in the time series database is protected prior to being downscaled, discarded or otherwise consolidated.

Patent Agency Ranking