20240045734. SYSTEM AND METHOD FOR GENERATING TIME-BASED CONTEXTUAL GRAPH IN CLOUD COMPUTING ENVIRONMENT simplified abstract (UNO.AI, INC.)

From WikiPatents
Jump to navigation Jump to search

SYSTEM AND METHOD FOR GENERATING TIME-BASED CONTEXTUAL GRAPH IN CLOUD COMPUTING ENVIRONMENT

Organization Name

UNO.AI, INC.

Inventor(s)

MURUGESAN Guruswamy of SAN JOSE CA (US)

GRIFFIN MAXWELL Brome of CONCORD CA (US)

KAIXIN Huang of ARCADIA CA (US)

SAHAJ TUSHAR Gandhi of SUNNYVALE CA (US)

SHASHANK Tiwari of PALO ALTO CA (US)

STEPHANIE YUEN-KWAN Knill of PITT MEADOWS (CA)

SUKHVIR Singh of SAN JOSE CA (US)

SYSTEM AND METHOD FOR GENERATING TIME-BASED CONTEXTUAL GRAPH IN CLOUD COMPUTING ENVIRONMENT - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240045734 titled 'SYSTEM AND METHOD FOR GENERATING TIME-BASED CONTEXTUAL GRAPH IN CLOUD COMPUTING ENVIRONMENT

Simplified Explanation

The patent application describes a computer-implemented system and method for generating a time-based contextual graph in a cloud computing environment. The system receives requests for security anomaly analysis of cloud infrastructure-based resources and applications from computing devices. It identifies parent node and node attributes corresponding to the parent node based on the requests. The system then determines hierarchical node relationships between the parent node and child nodes based on the identified node attributes. It further analyzes risks associated with security anomalies in the context of cloud infrastructure-based resources and applications using the hierarchical node relationships. The system generates a time-based contextual graph representing the analyzed risks based on the determined hierarchical node relationships. Finally, the system outputs the analyzed risks on a display associated with the computing devices using the generated time-based contextual graph.

  • The system receives requests for security anomaly analysis of cloud infrastructure-based resources and applications.
  • It identifies parent node and node attributes corresponding to the parent node based on the requests.
  • The system determines hierarchical node relationships between the parent node and child nodes based on the identified node attributes.
  • It analyzes risks associated with security anomalies in the context of cloud infrastructure-based resources and applications using the hierarchical node relationships.
  • The system generates a time-based contextual graph representing the analyzed risks based on the determined hierarchical node relationships.
  • It outputs the analyzed risks on a display associated with the computing devices using the generated time-based contextual graph.

Potential applications of this technology:

  • Security anomaly analysis in cloud computing environments
  • Risk assessment and management in cloud infrastructure-based resources and applications

Problems solved by this technology:

  • Efficient identification and analysis of security anomalies in cloud infrastructure-based resources and applications
  • Improved risk assessment and management in cloud computing environments

Benefits of this technology:

  • Enhanced security in cloud computing environments
  • Improved decision-making for risk mitigation in cloud infrastructure-based resources and applications


Original Abstract Submitted

a computer-implemented system and method for generating time-based contextual graph in cloud computing environment is disclosed. the system receives, from computing devices, requests corresponding to security anomaly analysis of cloud infrastructure-based resources and applications. the system identifies parent node and node attributes corresponding to parent node in cloud infrastructure-based resources and/or applications, based on requests. further, system determines hierarchical node relationships between parent node and child nodes, based on identified node attributes. furthermore, system analyses risks in context of security anomaly associated with cloud infrastructure-based resources and/or applications, based on hierarchical node relationships between parent node and child nodes. further, system generates time-based contextual graph corresponding to analyzed risks in context of security anomaly, based on determined hierarchical node relationships. furthermore, system outputs on display associated with the computing devices, result corresponding to analyzed risks in context of security anomaly using generated time-based contextual graph.