Detecting and mitigating leaked cloud authorization keys

    公开(公告)号:US11178160B2

    公开(公告)日:2021-11-16

    申请号:US15498418

    申请日:2017-04-26

    Applicant: Splunk Inc.

    Inventor: Camille Gaspard

    Abstract: In one embodiment, a discrepancy detection application automatically detects and addresses unauthorized activities associated with one or more authorization keys based on a request log and a provider log. The request log specifies activities that a client initiated, where the activities are associated with the authorization keys. The provider log specifies activities that a cloud provider performed, where the activities are associated with the authorization keys. In operation, the discrepancy detection application determines that one or more unauthorized activities have occurred based on comparing the request log to the provider log. The discrepancy detection application then performs an action that addresses the unauthorized activities. Advantageously, by detecting discrepancies between activities initiated by the client and activities performed by the cloud provider, the discrepancy detection application automatically detects any leaked authorization keys and minimizes resulting damages incurred by the client.

    Detecting and mitigating leaked cloud authorization keys

    公开(公告)号:US12155678B1

    公开(公告)日:2024-11-26

    申请号:US17526893

    申请日:2021-11-15

    Applicant: SPLUNK INC.

    Inventor: Camille Gaspard

    Abstract: In one embodiment, a discrepancy detection application automatically detects and addresses unauthorized activities associated with one or more authorization keys based on a request log and a provider log. The request log specifies activities that a client initiated, where the activities are associated with the authorization keys. The provider log specifies activities that a cloud provider performed, where the activities are associated with the authorization keys. In operation, the discrepancy detection application determines that one or more unauthorized activities have occurred based on comparing the request log to the provider log. The discrepancy detection application then performs an action that addresses the unauthorized activities. Advantageously, by detecting discrepancies between activities initiated by the client and activities performed by the cloud provider, the discrepancy detection application automatically detects any leaked authorization keys and minimizes resulting damages incurred by the client.

    DETECTING AND MITIGATING LEAKED CLOUD AUTHORIZATION KEYS

    公开(公告)号:US20180316702A1

    公开(公告)日:2018-11-01

    申请号:US15498418

    申请日:2017-04-26

    Applicant: Splunk Inc.

    Inventor: Camille Gaspard

    Abstract: In one embodiment, a discrepancy detection application automatically detects and addresses unauthorized activities associated with one or more authorization keys based on a request log and a provider log. The request log specifies activities that a client initiated, where the activities are associated with the authorization keys. The provider log specifies activities that a cloud provider performed, where the activities are associated with the authorization keys. In operation, the discrepancy detection application determines that one or more unauthorized activities have occurred based on comparing the request log to the provider log. The discrepancy detection application then performs an action that addresses the unauthorized activities. Advantageously, by detecting discrepancies between activities initiated by the client and activities performed by the cloud provider, the discrepancy detection application automatically detects any leaked authorization keys and minimizes resulting damages incurred by the client.

Patent Agency Ranking