Computer security application configuration structure employing independently specified configuration objects and separate resolver
    1.
    发明授权
    Computer security application configuration structure employing independently specified configuration objects and separate resolver 有权
    计算机安全应用程序配置结构采用独立指定的配置对象和单独的解析器

    公开(公告)号:US09094447B1

    公开(公告)日:2015-07-28

    申请号:US14221608

    申请日:2014-03-21

    Abstract: An information security application responds to a request by generating a context vector and performing a lookup in a configuration structure to identify a configurable action to be taken. The context vector includes current values of environment variables. The configuration structure stores configuration objects having an environment field storing configured values of the environment variables to specify a context for use of an action value in an action field. A wildcard value indicates that the context for use is independent of a given environment variable. The lookup results in a set of configuration objects whose configured values of the environment variables either are wildcards or match respective values in the context vector. The set of action values is resolved to a resolved action value specifying the configurable action, and a response is returned to the client computer based on a result of the configurable action.

    Abstract translation: 信息安全应用程序通过生成上下文向量来响应请求,并在配置结构中执行查找以识别要执行的可配置动作。 上下文向量包括环境变量的当前值。 配置结构存储具有环境字段的配置对象,该环境字段存储环境变量的配置值,以指定在动作字段中使用动作值的上下文。 通配符值表示使用的上下文与给定的环境变量无关。 查找结果是一组配置对象,其配置的环境变量的值是通配符,也可以匹配上下文向量中的相应值。 一组操作值被解析为指定可配置操作的已解决操作值,并根据可配置操作的结果将响应返回给客户端计算机。

    Detecting malicious online activities using event stream processing over a graph database

    公开(公告)号:US09967265B1

    公开(公告)日:2018-05-08

    申请号:US14869146

    申请日:2015-09-29

    CPC classification number: H04L63/1416 H04L63/20

    Abstract: Techniques of detecting malicious events involve generating a relational graph of event data describing events that occur within a specified, limited time window. Along these lines, a malicious event detection computer receives event data describing interactions between entities such as users, devices, and network domains from various servers that occur within a specified time window. In response, the malicious event detection computer generates a relational graph that has graph structures (e.g., nodes and edges) representing these interactions. Analysis of patterns within the resulting relational graph indicates whether there is a malicious event occurring.

    Abstraction layer
    6.
    发明授权

    公开(公告)号:US10592128B1

    公开(公告)日:2020-03-17

    申请号:US14984279

    申请日:2015-12-30

    Abstract: A computer implemented method, system, and computer program product comprising intercepting an interaction with a data storage capability at the abstraction layer enabled to intercept data interactions for different types of data storage capabilities; wherein the interaction changes data on the data storage capability; sending a copy of the interaction to a replication data storage capability; and sending the interaction to the data storage capability.

    Multi-cloud data migration in platform as a service (PAAS) environment

    公开(公告)号:US10334044B1

    公开(公告)日:2019-06-25

    申请号:US15085876

    申请日:2016-03-30

    Abstract: According to one embodiment, a request is received for estimating migrating a first dataset from a first cloud system to a second cloud system. A migration cost estimation module determines a network bandwidth required to migrate the first dataset from the first cloud system to the second cloud system, determines a duplicated data time period during migration that the first dataset has to be maintained by both the first cloud system and the second cloud system for service continuity, and determines a total cost of migrating the first dataset from the first cloud system to the second cloud system based on the required network bandwidth and the duplicated data time period. It is then determined whether to migrate the first dataset from the first cloud system to the second cloud system based on the total cost.

    Database monitoring for online migration optimization

    公开(公告)号:US10108645B1

    公开(公告)日:2018-10-23

    申请号:US14984281

    申请日:2015-12-30

    Abstract: In general, the invention relates to a method and system for migrating tables in databases. The method may include calculating a first plurality of migration factors for a first set of tables in a source database using a plurality of pre-calculated factors and a first plurality of dynamically-calculated factor, where each of the first plurality of migration factors is associated with one of the first set of tables. The method may further include selecting a first table from the first set of tables to migrate based on the first plurality of migration factors; and migrating the first table to a target database.

    Modifying queries and rules for profile fetching and risk calculation
    9.
    发明授权
    Modifying queries and rules for profile fetching and risk calculation 有权
    修改配置文件提取和风险计算的查询和规则

    公开(公告)号:US09535955B1

    公开(公告)日:2017-01-03

    申请号:US13796421

    申请日:2013-03-12

    CPC classification number: G06F17/30469

    Abstract: Methods, apparatus and articles of manufacture for modifying queries and rules for profile fetching and risk calculation are provided herein. A method includes comparing at least one aspect of a query submitted to access a data store to rule sets associated with the data store to determine a potential access path within the data store for responding to the query, comparing information pertaining to an entity identified via the query to risk information pertaining to entities to determine a level of risk associated with the entity identified via the query, generating a modified version of the query based on information derived from the potential access path within the data store for responding to the query, and calculating a risk score associated with the modified version of the query based on the aspect of the query and the level of risk associated with the entity identified via the query.

    Abstract translation: 本文提供了用于修改轮廓提取和风险计算的查询和规则的方法,装置和制造。 一种方法包括将提交的访问数据存储的查询的至少一个方面与数据存储相关联的规则集进行比较,以确定数据存储区内的响应查询的潜在访问路径,比较与经由 查询与实体有关的风险信息,以确定与通过查询识别的实体相关联的风险级别;基于从数据存储中的潜在访问路径导出的响应查询的信息生成查询的修改版本,以及计算 基于查询的方面与查询的修改版本相关联的风险分数以及与通过查询识别的实体相关联的风险级别。

Patent Agency Ranking