17748592. METHOD AND SYSTEM FOR PROTECTION OF CLOUD-BASED INFRASTRUCTURE simplified abstract (Capital One Services, LLC)

From WikiPatents
Jump to navigation Jump to search

METHOD AND SYSTEM FOR PROTECTION OF CLOUD-BASED INFRASTRUCTURE

Organization Name

Capital One Services, LLC

Inventor(s)

Syed Sameer Hakim of Dublin CA (US)

Ashwini Vasudev of Glen Allen VA (US)

METHOD AND SYSTEM FOR PROTECTION OF CLOUD-BASED INFRASTRUCTURE - A simplified explanation of the abstract

This abstract first appeared for US patent application 17748592 titled 'METHOD AND SYSTEM FOR PROTECTION OF CLOUD-BASED INFRASTRUCTURE

Simplified Explanation

Methods, systems, devices, and computer-readable media for a quarantining system are described in this patent application. The system aims to protect against potentially harmful or malicious activity associated with API requests for accessing applications.

  • A client device sends an API request to a service provider system to access a specific application.
  • The service provider system receives the request at a gateway and determines if it is associated with potentially harmful or unexpected activity.
  • If the request is flagged as suspicious, it is routed to a quarantine environment.
  • In the quarantine environment, a decoy API is identified, which is configured to interface with a decoy application that emulates the requested application using decoy information.
  • The API request is modified to call the decoy API instead.
  • The decoy application is executed, and a decoy response is generated.
  • The decoy response is sent back to the client device as a response to the API request.

Potential applications of this technology:

  • Enhancing cybersecurity measures by identifying and isolating potentially harmful API requests.
  • Protecting sensitive data and applications from unauthorized access or malicious activity.
  • Providing a secure environment for testing and analyzing suspicious API requests.

Problems solved by this technology:

  • Mitigating the risk of harmful or malicious activity associated with API requests.
  • Preventing unauthorized access to applications and sensitive data.
  • Reducing the potential impact of security breaches or attacks.

Benefits of this technology:

  • Improved security and protection against potential threats.
  • Enhanced ability to detect and respond to suspicious API requests.
  • Minimized risk of data breaches and unauthorized access.
  • Provides a controlled environment for analyzing and understanding potential threats.


Original Abstract Submitted

Methods, systems, devices, and computer-readable media for a quarantining system are provided. A message comprising an application programming interface (API) request may be sent by a client device to a service provider system for access to a first application. The message may be received at a gateway of the service provider system. The gateway may determine that the API request is associated with potentially harmful, malicious, or otherwise unexpected activity. The message may be routed to a quarantine environment and a decoy API configured to interface with a decoy application that uses decoy information to emulate the requested first application may be identified. The API request may be modified to call the decoy API. The decoy application may be executed and a decoy response generated. The decoy response may be sent to the client device in response to the API request.