DETERMINING LIKELIHOODS OF COMPUTER SYSTEM STATE TRANSITIONS BASED ON STATE TRANSITION HISTORIES

    公开(公告)号:US20240281576A1

    公开(公告)日:2024-08-22

    申请号:US18169972

    申请日:2023-02-16

    Inventor: Debdipta Ghosh

    CPC classification number: G06F30/27 G06F2111/08

    Abstract: A process includes accessing data representing a directed graph model state for a computer system. The directed graph includes a plurality of transitions among the model states, and the directed graph includes, for each transition, a transition identifier that is associated with the transition and a probability that is associated with the transition. The process includes characterizing a history of the computer system to reach a current state of the computer system. The current state corresponds to a given model state and the history corresponds to first transitions. Characterizing the history includes, based on the data, identifying first transition identifiers associated with the first transition, and applying a first arithmetic operator to the first transition identifier to provide a history identifier, which corresponds to the history. The process includes, based on the history identifier, determining a likelihood that the computer system will transition from the current state to a given future state; and based on the likelihood, initiating a responsive action in anticipation of the computer system transitioning to the given future state.

    Updating error policy
    2.
    发明授权

    公开(公告)号:US11645156B1

    公开(公告)日:2023-05-09

    申请号:US17586909

    申请日:2022-01-28

    Inventor: Debdipta Ghosh

    CPC classification number: G06F11/1417

    Abstract: Approaches for updating an error policy based on boot-time error information and run-time error information, are described. The error policy maps an error type with a prescribed action. In an example, the error policy is updateable based run-time error information corresponding to a computing device. The updated error policy may then be used for addressing boot-time errors of computing devices.

    Secure data center update and monitoring

    公开(公告)号:US12105851B2

    公开(公告)日:2024-10-01

    申请号:US17486288

    申请日:2021-09-27

    Inventor: Debdipta Ghosh

    CPC classification number: G06F21/64 G06F8/65 G06F21/552 G06F21/566 G06F21/602

    Abstract: A system hash for each production system is generated. Each system hash includes a concatenation of a hardware hash and a software hash of each production system in the datacenter. A datacenter hash tree is created based on a combination of the system hashes. A test copy of the software hash of each of the production systems is created in respective test systems in the datacenter. In response to detecting a change in the datacenter hash tree, a modification in a system hash which resulted in the change is identified. The central copy of the software hash is compared with the test copy of the software hash. In response to a mismatch between the central copy and the test copy, occurrence of an unauthorized attack in a software of the production system is detected.

    Recording memory errors for use after restarts

    公开(公告)号:US11537468B1

    公开(公告)日:2022-12-27

    申请号:US17457679

    申请日:2021-12-06

    Abstract: In some examples, a system records, in a data structure stored in a non-volatile storage, information of memory errors in respective segments of a memory. The system determines whether memory errors of a subset of the segments satisfy a criterion, and in response to determining that the memory errors of the subset of the segments satisfy the criterion, the system groups the memory errors of the subset into a partition having a size greater than a size of a segment. The system records, in the data structure, information of memory errors in the partition, and in response to a restart of the system, retrieves the data structure from the non-volatile storage for use in an operation that addresses memory errors in the system.

    SECURE DATA CENTER UPDATE AND MONITORING

    公开(公告)号:US20230026057A1

    公开(公告)日:2023-01-26

    申请号:US17486288

    申请日:2021-09-27

    Inventor: Debdipta Ghosh

    Abstract: SECURE DATA CENTER UPDATE AND MONITORING A system hash for each production system is generated. Each system hash includes a concatenation of a hardware hash and a software hash of each production system in the datacenter. A datacenter hash tree is created based on a combination of the system hashes. A test copy of the software hash of each of the production systems is created in respective test systems in the datacenter. In response to detecting a change in the datacenter hash tree, a modification in a system hash which resulted in the change is identified. The central copy of the software hash is compared with the test copy of the software hash. In response to a mismatch between the central copy and the test copy, occurrence of an unauthorized attack in a software of the production system is detected.

Patent Agency Ranking