Dell products l.p. (20240338434). DISCOVERY OF RANSOMWARE PROCESSES USING LAST-INTERACTED METADATA TAGGING simplified abstract

From WikiPatents
Revision as of 00:35, 18 October 2024 by Wikipatents (talk | contribs) (Creating a new page)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

DISCOVERY OF RANSOMWARE PROCESSES USING LAST-INTERACTED METADATA TAGGING

Organization Name

dell products l.p.

Inventor(s)

Ofir Ezrielev of Be’er Sheba (IL)

Yehiel Zohar of Sderot (IL)

Yevgeni Gehtman of Modi'in (IL)

Tomer Shachar of Beer-Sheva (IL)

Maxim Balin of Gan-Yavne (IL)

DISCOVERY OF RANSOMWARE PROCESSES USING LAST-INTERACTED METADATA TAGGING - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240338434 titled 'DISCOVERY OF RANSOMWARE PROCESSES USING LAST-INTERACTED METADATA TAGGING

Simplified Explanation: The patent application describes a method that involves tagging data with metadata to identify the last process that interacted with the data. It then detects errors when another process tries to interact with the tagged data, queries to identify the last process, and takes action accordingly.

  • Detect errors when another process interacts with tagged data
  • Query to identify the last process
  • Take action based on the identified last process

Key Features and Innovation:

  • Tagging data with metadata to track the last process that interacted with it
  • Error detection when unauthorized processes try to access tagged data
  • Querying metadata to identify the last process for appropriate action

Potential Applications: This technology can be applied in data security systems, workflow management tools, and data governance solutions.

Problems Solved:

  • Unauthorized access to data
  • Tracking data interactions
  • Ensuring data integrity

Benefits:

  • Enhanced data security
  • Improved workflow management
  • Better data governance

Commercial Applications: Potential commercial applications include data security software, workflow automation tools, and compliance management systems.

Questions about the Technology: 1. How does the method ensure the accuracy of identifying the last process that interacted with the data? 2. What are the potential challenges in implementing this technology in large-scale systems?

Frequently Updated Research: Stay updated on advancements in data tagging technologies, error detection methods, and metadata querying techniques for improved data management and security.


Original Abstract Submitted

one method includes tagging data with metadata that identifies a last process that interacted with the data, detecting an error that occurs when another process attempts to interact with the data that has been tagged with the metadata, in response to detecting the error, performing a query to identify the last process, and taking an action with respect to the last process. the query includes examining the metadata to identify the last process.