INTRUSION DETECTION
    2.
    发明申请
    INTRUSION DETECTION 审中-公开

    公开(公告)号:US20200311280A1

    公开(公告)日:2020-10-01

    申请号:US16367676

    申请日:2019-03-28

    Inventor: Kenneth Byrne

    Abstract: Techniques are provided for intrusion detection on a computer system. In an example, a computer host device is configured to access data storage of the computer system via a communications network. It can be determined that the computer host device is behaving anomalously because a first current access by the computer host device to the data storage deviates from a second expected access by the computer host device to the data storage by more than a predefined amount. Then, in response to determining that the computer host device is behaving anomalously, the computer system can mitigate against the computer host device behaving anomalously.

    Intrusion detection
    3.
    发明授权

    公开(公告)号:US12111935B2

    公开(公告)日:2024-10-08

    申请号:US18052085

    申请日:2022-11-02

    Inventor: Kenneth Byrne

    Abstract: Techniques are provided for intrusion detection on a computer system. In an example, a computer host device is configured to access data storage of the computer system via a communications network. It can be determined that the computer host device is behaving anomalously because a first current access by the computer host device to the data storage deviates from a second expected access by the computer host device to the data storage by more than a predefined amount. Then, in response to determining that the computer host device is behaving anomalously, the computer system can mitigate against the computer host device behaving anomalously.

    Automated cloud provider creation and synchronization in an embedded container architecture

    公开(公告)号:US11386121B2

    公开(公告)日:2022-07-12

    申请号:US17033809

    申请日:2020-09-27

    Abstract: A SSMA (Storage System Management Application) automates creation of a cloud provider on a cloud repository. The SSMA instructs a CTS (Cloud Tethering Subsystem) to create the cloud provider, which causes the CTS to establish a secure connection to the cloud repository. The cloud repository creates the cloud provider and returns identifying information. The CTS then tests the connection to verify that the cloud provider is reachable at the cloud repository. The SSMA also instruct a solution enabler to install the cloud provider in the storage system embedded operating system. The SSMA also implements a cloud provider synchronization verification process, which enables the SSMA to determine if there are any differences between lists of cloud providers maintained by the CTS and the embedded operating system. If any differences are detected, the SSMA automates the process of installing the correct set of cloud providers in the storage system embedded operating system.

    Fully Orchestrated Setup of a Containerized Cloud Communication System Within an Embedded Operating System

    公开(公告)号:US20220103627A1

    公开(公告)日:2022-03-31

    申请号:US17033813

    申请日:2020-09-27

    Abstract: A storage system management application contains control logic configured to enable the storage system management application to fully orchestrate setup of a containerized cloud communication system within embedded operating system, with minimal interaction from an end user. Upon receipt of an instruction to initiate cloud access, the storage system management application enrolls a cloud tethering subsystem and establishes a secure communication channel to the cloud tethering subsystem. The storage system management application also creates a cloud protection environment within the operating system for use by the cloud tethering subsystem, and registers the storage system to the cloud tethering subsystem. The storage system management application also creates external network interfaces on the cloud tethering subsystem and configures one or more private cloud provider endpoints on the cloud tethering subsystem.

    Processing rest API requests based on resource usage satisfying predetermined limits

    公开(公告)号:US11579926B2

    公开(公告)日:2023-02-14

    申请号:US16785759

    申请日:2020-02-10

    Abstract: A request manager analyzes API calls from a client to a host application for state and performance information. If current utilization of host application processing or memory footprint resources exceed predetermined levels, then the incoming API call is not forwarded to the application. If current utilization of the host application processing and memory resources do not exceed the predetermined levels, then the request manager quantifies the processing or memory resources required to report the requested information and determines whether projected utilization of the host application processing or memory resources inclusive of the resources required to report the requested information exceed predetermined levels. If the predetermined levels are not exceeded, then the request manager forwards the API call to the application for processing.

    REST API REQUEST MANAGEMENT
    7.
    发明申请

    公开(公告)号:US20210248007A1

    公开(公告)日:2021-08-12

    申请号:US16785759

    申请日:2020-02-10

    Abstract: A request manager analyzes API calls from a client to a host application for state and performance information. If current utilization of host application processing or memory footprint resources exceed predetermined levels, then the incoming API call is not forwarded to the application. If current utilization of the host application processing and memory resources do not exceed the predetermined levels, then the request manager quantifies the processing or memory resources required to report the requested information and determines whether projected utilization of the host application processing or memory resources inclusive of the resources required to report the requested information exceed predetermined levels. If the predetermined levels are not exceeded, then the request manager forwards the API call to the application for processing. The request manager may implement a limited number of retries if the predetermined levels are exceeded. The request manager prompts sending of an error message to the client if the retries are unsuccessful. Quantification of the required processing and memory resources is based on previous API calls so accuracy may improve over time.

    INTRUSION DETECTION
    8.
    发明公开
    INTRUSION DETECTION 审中-公开

    公开(公告)号:US20230306119A1

    公开(公告)日:2023-09-28

    申请号:US18052085

    申请日:2022-11-02

    Inventor: Kenneth Byrne

    Abstract: Techniques are provided for intrusion detection on a computer system. In an example, a computer host device is configured to access data storage of the computer system via a communications network. It can be determined that the computer host device is behaving anomalously because a first current access by the computer host device to the data storage deviates from a second expected access by the computer host device to the data storage by more than a predefined amount. Then, in response to determining that the computer host device is behaving anomalously, the computer system can mitigate against the computer host device behaving anomalously.

    Intrusion detection
    9.
    发明授权

    公开(公告)号:US11520898B2

    公开(公告)日:2022-12-06

    申请号:US16367676

    申请日:2019-03-28

    Inventor: Kenneth Byrne

    Abstract: Techniques are provided for intrusion detection on a computer system. In an example, a computer host device is configured to access data storage of the computer system via a communications network. It can be determined that the computer host device is behaving anomalously because a first current access by the computer host device to the data storage deviates from a second expected access by the computer host device to the data storage by more than a predefined amount. Then, in response to determining that the computer host device is behaving anomalously, the computer system can mitigate against the computer host device behaving anomalously.

Patent Agency Ranking