Dell products l.p. (20240137384). SYSTEM AND METHOD FOR THREAT DETECTION THROUGH DATA STORAGE ANALYSIS simplified abstract

From WikiPatents
Jump to navigation Jump to search

SYSTEM AND METHOD FOR THREAT DETECTION THROUGH DATA STORAGE ANALYSIS

Organization Name

dell products l.p.

Inventor(s)

GAURAV Chawla of Austin TX (US)

BORIS Glimcher of Tel Aviv-Yafo (IL)

MAUNISH A. Shah of Austin TX (US)

SYSTEM AND METHOD FOR THREAT DETECTION THROUGH DATA STORAGE ANALYSIS - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240137384 titled 'SYSTEM AND METHOD FOR THREAT DETECTION THROUGH DATA STORAGE ANALYSIS

Simplified Explanation

The patent application describes methods and systems for managing data access based threats using a network interface controller (NIC) that presents emulated storage devices for data storage. The NIC actively screens for access patterns that indicate compromised compute complexes, locally processing the data on the NIC.

  • The system includes a network interface controller (NIC) that presents emulated storage devices for data storage.
  • The emulated storage devices utilize storage resources of storage devices.
  • The NIC actively screens for access patterns indicating compromised compute complexes.
  • Data processing is done locally on the NIC to manage data access based threats.

Potential Applications

This technology could be applied in industries where data security is crucial, such as finance, healthcare, and government sectors.

Problems Solved

This technology helps in managing data access based threats and identifying compromised compute complexes, enhancing overall data security.

Benefits

The system provides an additional layer of security by actively screening for access patterns and processing data locally on the NIC, improving data protection.

Potential Commercial Applications

Potential commercial applications include data security solutions for businesses, cloud service providers, and data centers.

Possible Prior Art

One possible prior art could be systems that use network interface controllers for data processing and security measures, but the specific method of actively screening for access patterns to identify compromised compute complexes may be a novel aspect of this technology.

What are the specific access patterns that the NIC screens for to detect compromised compute complexes?

The article does not provide specific details on the access patterns that the NIC screens for to detect compromised compute complexes.

How does the system differentiate between normal access patterns and those indicating compromised compute complexes?

The article does not elaborate on how the system differentiates between normal access patterns and those indicating compromised compute complexes.


Original Abstract Submitted

methods and systems for managing data access based threats are disclosed. to manage the data access based threats, a data processing system may include a network interface controller (nic). the network interface controller may present emulated storages that may be used for data storage. the emulated storage devices may utilize storage resources of storage devices. the nic may actively screen for access patterns in use of the emulated storage devices that indicate compute complexes may be compromised. when doing so, the processing may be done locally on the nic.