Patent classifications
G06F21/1082
Data integration system for triggering analysis of connection oscillations
Embodiments of the present invention are directed to data integration and threat assessment for triggering analysis of connection oscillations in order to improve data and connection security. The invention leverages a security threat assessment engine and an analytics engine to gather and process data from a combination of internal and external data sources for a third party connection. The system continuously monitors and updates a generated threat level for a third party connection to determine changes or triggers indicating a potential security threat. In response to these determined changes or triggers, the system then responds to a detected security threat and minimizes damages resulting from data compromised by third party systems. Further, the system may extract and recover data from the third party systems and alter connection channels in order to further limit losses.
AUTOMATICALLY CREATING DATA PROTECTION ROLES USING ANONYMIZED ANALYTICS
Selecting user access policies for a new system, by collecting user, access policy, and resource metadata for a plurality of other users storing data dictated by one or more access restriction policies. The collected metadata is anonymized with respect to personal identifying information, and is stored in an anonymized analytics database. The system receives specific user, access policy and resource metadata for the new system from a specific user, and matches the received specific user metadata to the collected metadata to identify an optimum access policy of the one or more access policies based on the assets and access restriction requirements of the new system. The new system is then configured with the identified optimum access policy as an initial configuration.
Method and system for distributed systems backup configuration wizard
A distributed systems backup configuration wizard is described. A computer executes a wizard. The wizard receives an identifier of a distributed setup for backup configuration via a user interface. The wizard identifies each system which comprises the distributed setup. The wizard retrieves information associated with each system for configuring backup of the distributed setup. The wizard outputs configuration options based on retrieved information via the user interface. The wizard configures backup of the distributed setup based on the retrieved information and user selected configuration options received via the user interface.
Using recognized backup images for recovery after a ransomware attack
The content of each specific image file in a user's backup set (or other type of file set on an endpoint) is analyzed, for example during a backup of the endpoint. Each analyzed image file is categorized based on the results of analyzing its content. The analysis can be in the form identifying one or more objects graphically represented in given image files, and the categorization of image files can be based on these identified graphically represented object(s). Subsequently (for example during a subsequent backup of the endpoint), modifications made to specific ones of the image files in the file set are detected. In response to a quantification of the detected modifications exceeding a specific threshold level, it is adjudicated that a file corruption event has occurred on the endpoint, such as a cryptographic ransomware attack. In response to the adjudication, one or more security actions are taken.
DATA INTEGRATION SYSTEM FOR TRIGGERING ANALYSIS OF CONNECTION OSCILLATIONS
Embodiments of the present invention are directed to data integration and threat assessment for triggering analysis of connection oscillations in order to improve data and connection security. The invention leverages a security threat assessment engine and an analytics engine to gather and process data from a combination of internal and external data sources for a third party connection. The system continuously monitors and updates a generated threat level for a third party connection to determine changes or triggers indicating a potential security threat. In response to these determined changes or triggers, the system then responds to a detected security threat and minimizes damages resulting from data compromised by third party systems. Further, the system may extract and recover data from the third party systems and alter connection channels in order to further limit losses.
Method and System for Decommissioning Cloud-Connected Printers
A method in a server includes: receiving, from a client computing device associated with an account identifier, an account deletion request corresponding to the account identifier; retrieving, from a repository, an identifier of a printer associated with the account identifier; transmitting a decommissioning command to the printer, the decommissioning command configuring the printer to delete data associated with the account identifier from a local storage of the printer, and deleting, from the repository, the account identifier and account data associated with the account identifier.
DATA INTERACTION PROCESSING
Implementations of the present specification provide a digital item transfer interaction processing method and apparatus. The digital item transfer interaction processing method includes: receiving a digital item transfer request submitted by a member terminal of a target member in a member group of an institution, where the digital item transfer request is generated after a digital item transfer interface configured for the member group is triggered; performing digital item transfer processing on digital item transfer information carried in the digital item transfer request, and obtaining a digital item transfer record; generating digital item transfer interaction messages of institutional members in the member group for the digital item transfer record based on member permission of the institutional members, where the digital item transfer interaction messages carry interaction tags of the corresponding institutional members; and performing digital item transfer interaction processing on a digital item transfer interaction request submitted by any institutional member based on an interaction tag, if the digital item transfer interaction request is received.
A COMPUTERIZED CHARGING/INTERFACE DEVICE WITH MALWARE DETECTION AND BACKUP CAPABILITIES
A computerized charger for a mobile device, comprising a charging unit having an AC cord for charging the battery of the mobile device; a communication and power supply cable connected to a charging interface of the mobile device; a processor and associated memory, for implementing a computation device, being capable of performing backup and malware detection operations; one or more software modules or applications, stored in the memory and run by the processor, which are adapted to provide predetermined backup, data transfer and security services to the mobile device, during charging periods of the mobile device.
EDGE CONFIGURATION AWARE LICENSE KEY
Edge configuration aware license key generation is presented herein. An example method comprises, in response to downloading an intelligent activation key, instantiating an edge configuration engine comprising a listening process and a configuration process, creating and associating a license file vault instance with the edge configuration engine, initiating the listening process, and based on the listening process detecting that a change has occurred with the license file vault, initiating the configuration process, wherein the configuration process configures edge computing equipment to retrieve enabling data used to activate a product associated with the intelligent activation key and enumerated in the license file vault.
MITIGATING SIESMIC EVENTS VIA HIGHLY AVAILABLE VOLUMES
According to one embodiment, a method, computer system, and computer program product for mitigating vibration damage to a distributed storage system is provided. The present invention may include classifying at least two of the drives comprising the distributed storage system as vulnerable and not vulnerable, respectively, and responsive to detecting that a site associated with the distributed storage system is at risk of a vibration event, turning off the vulnerable drives at the site; creating a thin mitigation layer comprising thin-provisioned volumes associated with standard volumes comprising the vulnerable drives; routing read IO addressed to the standard volumes instead to associated partner volumes; routing write IO addressed to the standard volumes instead to the thin-provisioned volumes; and responsive to determining that the site is no longer at risk of a vibration event, turning on the vulnerable drives and copying states from the thin-provisioned volumes to the standard volumes.