NETWORK INTRUSION EVENT RESPONSE AND PROTECTION

    公开(公告)号:US20240362351A1

    公开(公告)日:2024-10-31

    申请号:US18306799

    申请日:2023-04-25

    Applicant: Snowflake Inc.

    Abstract: Provided herein are systems and methods for network intrusion event response and remediation. A file encryption key is generated based on a first private key of a user and a root key associated with a primary deployment of a database system. File data is encoded at a source account of the user using the file encryption key. The file data is replicated from the source account into a target account of the user to generate replicated file data. Notification of a detected network intrusion event is encoded for transmission to the user. A failover of the source account to the target account is performed based on the notification. The failover grants the user access to the replicated file data based at least on a second private key of the user.

    Detecting unauthorized encryptions in data storage systems

    公开(公告)号:US12124595B2

    公开(公告)日:2024-10-22

    申请号:US17181655

    申请日:2021-02-22

    Abstract: At a first time, a system identifies a set of data files which are stored in a part of a data storage system. At a second time, the system identifies each newly encoded data file based on identifying each data file in the set of data files which is encoded and created and/or updated since the first time. The system identifies each compressed data file based on identifying each newly encoded data file which is reduced in size since the first time. The system determines a file compression success rate based on a total count of each compressed data file relative to a total count of each newly encoded data file. If the system determines that the file compression success rate does not satisfy the file compression success rate threshold, the system outputs an alert about an unauthorized encryption in the data storage system.

    Computer-implemented method for removing access to data

    公开(公告)号:US12099623B2

    公开(公告)日:2024-09-24

    申请号:US17992802

    申请日:2022-11-22

    CPC classification number: G06F21/6218 G06F2221/2107

    Abstract: A computer-implemented method is provided for removing access to data, comprising: receiving a request from the user to delete the user data; suspending control of the user data; generating a second database comprising the user data under full control of the user; deleting the user data from the database; and, on request re-integrating the user data into the same database or integrating into a further database. By providing a database under complete control of the user and outside the control of any database manager or service provider, users are given more freedom to decide what to do with their data. They can choose to protect it, or to monetize it themselves by selling it or licensing it. They can also create a plurality of copies, allowing sales to more than one database manager or service provider.

Patent Agency Ranking