20240028723. SUSPICIOUS WORKSPACE INSTANTIATION DETECTION simplified abstract (Dell Products L.P.)

From WikiPatents
Jump to navigation Jump to search

SUSPICIOUS WORKSPACE INSTANTIATION DETECTION

Organization Name

Dell Products L.P.

Inventor(s)

Girish S. Dhoble of Austin TX (US)

David Konetski of Austin TX (US)

Nicholas D. Grobelny of Evergreen CO (US)

SUSPICIOUS WORKSPACE INSTANTIATION DETECTION - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240028723 titled 'SUSPICIOUS WORKSPACE INSTANTIATION DETECTION

Simplified Explanation

The abstract of the patent application describes a system that monitors workspace instantiations for suspicious behavior. It explains that each time a workspace is instantiated, a log is created on the client endpoint computer, recording the historical instantiations. The log includes timestamps and serves as a database describing each workspace and its corresponding definition file. A workspace orchestration service can monitor the log for unusual or anomalous counts and terminate any current workspace instantiation as a security precaution.

  • The system monitors workspace instantiations for potentially suspicious behavior.
  • Each workspace instantiation creates a log entry on the client endpoint computer.
  • The log contains historical information about each workspace and its timestamp.
  • A workspace orchestration service can monitor the log for unusual counts.
  • Current workspace instantiations can be terminated for security reasons.

Potential Applications:

  • Workspace security and monitoring systems
  • Cloud computing platforms
  • Virtual desktop infrastructure

Problems Solved:

  • Detecting and preventing suspicious behavior in workspace instantiations
  • Enhancing security measures in workspace orchestration
  • Providing a historical database of workspace instantiations

Benefits:

  • Improved workspace security
  • Early detection of potentially malicious activities
  • Enhanced monitoring and control over workspace instantiations
  • Historical data for analysis and auditing purposes


Original Abstract Submitted

workspace instantiations are monitored for potentially suspicious behavior. when a workspace is instantiated, a client endpoint computer creates a log of historical workspace instantiations. each time the client endpoint computer requests, receives, or executes a workspace, the client endpoint computer adds and timestamps a new entry in the log of historical workspace instantiations. the log of historical workspace instantiations thus represents a rich database description of each workspace, its corresponding workspace definition file, and its corresponding timestamp. a workspace orchestration service may monitor how frequently the log of historical workspace instantiations is generated and flag or alert of unusual or anomalous counts. any current workspace instantiation may thus be terminated as a security precaution.