-
公开(公告)号:US20200220928A1
公开(公告)日:2020-07-09
申请号:US16243036
申请日:2019-01-08
Applicant: Box, Inc.
Inventor: Advait D. Karande , Alok Ojha , Deepak Khajuria
IPC: H04L29/08 , G06F9/50 , G06F16/185 , H04L29/06
Abstract: Methods, systems and computer program products for managing shared content directory structure metadata stored on client devices. A method embodiment includes identifying a collaboration system that stores one or more content objects that are organized in accordance with a directory structure. Requests pertaining to the content objects are raised by processing entities running on the client device. The requests include instructions to retrieve one or more of multiple types of metadata associated with the directory elements that constitute the directory structure. Based on timing and patterns of requests pertaining to the content objects, a monitoring function detects unwanted runaway retrieval by a runaway process. To prevent further unwanted runaway retrieval of the metadata, the runaway process is blocked from continuing its pattern of unwanted (runaway) retrieval. The collaboration system is notified of characteristics of the runaway process. Some or all of the unwanted retrievals are remediated automatically.
-
公开(公告)号:US12099619B2
公开(公告)日:2024-09-24
申请号:US16248641
申请日:2019-01-15
Applicant: Box, Inc.
Inventor: Alok Ojha , Advait D. Karande , Peter Loer , Jeremy Scott Spiegel
IPC: G06F21/62 , G06F16/11 , G06F21/53 , G06F21/57 , G06N5/04 , G06N20/00 , H04L9/40 , H04L67/06 , H04L67/55
CPC classification number: G06F21/6218 , G06F16/11 , G06F21/53 , G06F21/577 , G06F21/6227 , G06N5/04 , G06N20/00 , H04L63/102 , H04L63/105 , H04L63/107 , H04L63/1416 , H04L63/1466 , H04L67/06 , H04L67/55 , G06F2221/034
Abstract: Systems and methods for ransomware protection in collaboration systems. One embodiment operates in conjunction with a collaboration system that manages one or more user devices that store device-local copies of content objects in storage areas of the one or more user devices. The collaboration system is accessed by the one or more user devices to facilitate collaboration activity over the content objects. Patterns of collaboration activity are classified, and in some cases, such patterns are deemed to be indicative of ransomware. If ransomware is indicated to be running on a user device, the collaboration system is notified that a ransomware process has been detected on the user device. The collaboration system delivers a prevention policy to other user devices that interface with the collaboration system. The prevention policy is in turn enforced by the other user devices to prevent synchronization of content object changes made by the ransomware.
-
公开(公告)号:US11017048B2
公开(公告)日:2021-05-25
申请号:US16231274
申请日:2018-12-21
Applicant: Box, Inc.
Inventor: Advait D. Karande , Jason Lin , Ryan Knotts
IPC: G06F16/955 , H04L29/08 , G06F16/907 , G06F16/954
Abstract: Content management in a collaboration system. Ease-of-use of shared content is facilitated. A URL is presented in a user interface. The system determines (e.g., based on user preferences) whether to display the content corresponding to the URL in a browser at the user device, or whether to display the content corresponding to the URL using a non-browser application. If the user device is configured to display the content corresponding to the URL using a non-browser application, then when the user clicks or touches or hovers, or otherwise indicates a selection of a URL, the system displays the content using the non-browser application. In this situation, the system retrieves the content from the collaboration system, stores a local instance of the content in local storage of the user device, and opens the local instance using the non-browser application. Local instance edits are synchronized with the collaboration system using a synchronization protocol.
-
公开(公告)号:US10911539B2
公开(公告)日:2021-02-02
申请号:US16243036
申请日:2019-01-08
Applicant: Box, Inc.
Inventor: Advait D. Karande , Alok Ojha , Deepak Khajuria
IPC: H04L29/08 , H04L29/06 , G06F16/185 , G06F9/50
Abstract: Methods, systems and computer program products for managing shared content directory structure metadata stored on client devices. A method embodiment includes identifying a collaboration system that stores one or more content objects that are organized in accordance with a directory structure. Requests pertaining to the content objects are raised by processing entities running on the client device. The requests include instructions to retrieve one or more of multiple types of metadata associated with the directory elements that constitute the directory structure. Based on timing and patterns of requests pertaining to the content objects, a monitoring function detects unwanted runaway retrieval by a runaway process. To prevent further unwanted runaway retrieval of the metadata, the runaway process is blocked from continuing its pattern of unwanted (runaway) retrieval. The collaboration system is notified of characteristics of the runaway process. Some or all of the unwanted retrievals are remediated automatically.
-
公开(公告)号:US20200067975A1
公开(公告)日:2020-02-27
申请号:US16248641
申请日:2019-01-15
Applicant: Box, Inc.
Inventor: Alok Ojha , Advait D. Karande , Peter Loer , Jeremy Scott Spiegel
Abstract: Systems and methods for ransomware protection in collaboration systems. One embodiment operates in conjunction with a collaboration system that manages one or more user devices that store device-local copies of content objects in storage areas of the one or more user devices. The collaboration system is accessed by the one or more user devices to facilitate collaboration activity over the content objects. Patterns of collaboration activity are classified, and in some cases, such patterns are deemed to be indicative of ransomware. If ransomware is indicated to be running on a user device, the collaboration system is notified that a ransomware process has been detected on the user device. The collaboration system delivers a prevention policy to other user devices that interface with the collaboration system. The prevention policy is in turn enforced by the other user devices to prevent synchronization of content object changes made by the ransomware.
-
-
-
-