18048657. SYSTEM AND METHOD FOR THREAT DETECTION THROUGH DATA STORAGE ANALYSIS simplified abstract (Dell Products L.P.)

From WikiPatents
Jump to navigation Jump to search

SYSTEM AND METHOD FOR THREAT DETECTION THROUGH DATA STORAGE ANALYSIS

Organization Name

Dell Products L.P.

Inventor(s)

GAURAV Chawla of Austin TX (US)

BORIS Glimcher of Tel Aviv-Yafo (IL)

MAUNISH A. Shah of Austin TX (US)

SYSTEM AND METHOD FOR THREAT DETECTION THROUGH DATA STORAGE ANALYSIS - A simplified explanation of the abstract

This abstract first appeared for US patent application 18048657 titled 'SYSTEM AND METHOD FOR THREAT DETECTION THROUGH DATA STORAGE ANALYSIS

Simplified Explanation

The abstract describes methods and systems for managing data access based threats using a network interface controller (NIC) that presents emulated storages for data storage and actively screens for access patterns that may indicate compromised compute complexes.

  • The data processing system includes a network interface controller (NIC).
  • The NIC presents emulated storages for data storage.
  • Emulated storage devices utilize storage resources of storage devices.
  • The NIC actively screens for access patterns indicating compromised compute complexes.
  • Processing is done locally on the NIC.

Potential Applications

This technology could be applied in cybersecurity systems to detect and prevent unauthorized access to sensitive data.

Problems Solved

This technology helps in managing data access based threats and prevents potential security breaches in data processing systems.

Benefits

The system provides enhanced security measures by actively screening for access patterns that may indicate compromised compute complexes, thus protecting sensitive data from unauthorized access.

Potential Commercial Applications

One potential commercial application of this technology could be in the development of advanced cybersecurity solutions for businesses and organizations looking to enhance their data security measures.

Possible Prior Art

One possible prior art could be the use of network interface controllers for data processing and storage management in computer systems.

What are the specific access patterns that the NIC screens for in the emulated storage devices?

The specific access patterns that the NIC screens for in the emulated storage devices are not detailed in the abstract.

How does the NIC determine if compute complexes may be compromised based on the access patterns it screens for?

The abstract does not provide specific information on how the NIC determines if compute complexes may be compromised based on the access patterns it screens for.


Original Abstract Submitted

Methods and systems for managing data access based threats are disclosed. To manage the data access based threats, a data processing system may include a network interface controller (NIC). The network interface controller may present emulated storages that may be used for data storage. The emulated storage devices may utilize storage resources of storage devices. The NIC may actively screen for access patterns in use of the emulated storage devices that indicate compute complexes may be compromised. When doing so, the processing may be done locally on the NIC.