18419228. SYSTEMS AND METHODS FOR DETECTION OF TOXIC ACCESS COMBINATIONS simplified abstract (JPMorgan Chase Bank, N.A.)

From WikiPatents
Revision as of 04:36, 26 July 2024 by Wikipatents (talk | contribs) (Creating a new page)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

SYSTEMS AND METHODS FOR DETECTION OF TOXIC ACCESS COMBINATIONS

Organization Name

JPMorgan Chase Bank, N.A.

Inventor(s)

Gaurav Gayawar of Bengaluru (IN)

Alok Singh of Bangalore (IN)

Smitha Ganesh of Bangalore (IN)

Matthew Javanshir of Southampton (GB)

Timothy Radebaugh, Jr. of Lewis Center OH (US)

Avisa Sherrell of Scarsdale OH (US)

SYSTEMS AND METHODS FOR DETECTION OF TOXIC ACCESS COMBINATIONS - A simplified explanation of the abstract

This abstract first appeared for US patent application 18419228 titled 'SYSTEMS AND METHODS FOR DETECTION OF TOXIC ACCESS COMBINATIONS

The patent application describes a method involving storing an audit group in an application management database, querying the database to retrieve access control descriptions, processing keywords with a machine learning model to determine duty groups, associating permissions with duty groups, and identifying toxic combinations of permissions based on database relationships.

  • Storing an audit group in an application management database
  • Querying the database to retrieve access control descriptions
  • Processing keywords with a machine learning model to determine duty groups
  • Associating permissions with duty groups
  • Identifying toxic combinations of permissions based on database relationships

Potential Applications: - This technology can be used in cybersecurity to analyze and manage access control permissions efficiently. - It can be applied in software development to ensure secure and compliant application management.

Problems Solved: - Streamlines the process of managing access control permissions. - Helps in identifying and mitigating toxic combinations of permissions.

Benefits: - Enhances security measures in application management. - Improves compliance with access control regulations. - Increases efficiency in analyzing and managing permissions.

Commercial Applications: Title: Enhanced Access Control Management System This technology can be utilized by cybersecurity firms, software development companies, and organizations with complex access control requirements. It has the potential to improve security measures and compliance standards, making it a valuable tool in various industries.

Questions about Access Control Management System: 1. How does this technology improve access control management processes? - This technology streamlines the process of analyzing and managing access control permissions, making it more efficient and effective. 2. What are the key benefits of using this system in cybersecurity? - The system enhances security measures by identifying toxic combinations of permissions and ensuring compliance with access control regulations.


Original Abstract Submitted

In some aspects, the techniques described herein relate to a method including: storing, in an application management database, an audit group, wherein the audit group identifies one or more computer applications; querying the application management database, wherein the querying returns a plurality of access control descriptions from the application management database; processing keywords from the plurality of access control descriptions with a machine learning (ML) model to determine a plurality of duty groups; associating access control permissions with the plurality of duty groups based on the keywords; and determining toxic combinations of the access control permissions based on database relationships between the plurality of duty groups, the audit group, and a user identifier.