18295364. DISCOVERY OF RANSOMWARE PROCESSES USING LAST-INTERACTED METADATA TAGGING simplified abstract (Dell Products L.P.)
Contents
DISCOVERY OF RANSOMWARE PROCESSES USING LAST-INTERACTED METADATA TAGGING
Organization Name
Inventor(s)
Ofir Ezrielev of Be’er Sheba (IL)
Yevgeni Gehtman of Modi'in (IL)
Tomer Shachar of Beer-Sheva (IL)
DISCOVERY OF RANSOMWARE PROCESSES USING LAST-INTERACTED METADATA TAGGING - A simplified explanation of the abstract
This abstract first appeared for US patent application 18295364 titled 'DISCOVERY OF RANSOMWARE PROCESSES USING LAST-INTERACTED METADATA TAGGING
The abstract of the patent application describes a method that involves tagging data with metadata to identify the last process that interacted with the data. It then detects errors when another process attempts to interact with the tagged data, performs a query to identify the last process, and takes action with respect to that process.
- Tagging data with metadata to identify the last process that interacted with the data
- Detecting errors when another process tries to interact with the tagged data
- Performing a query to identify the last process
- Taking action with respect to the last process
- Query includes examining the metadata to determine the last process
Potential Applications: - Data security and integrity in information systems - Error detection and resolution in data processing workflows
Problems Solved: - Ensuring data integrity by tracking the last process that interacted with it - Detecting errors in data processing workflows to prevent further issues
Benefits: - Improved data security and integrity - Efficient error detection and resolution in data processing workflows
Commercial Applications: Title: Data Security and Workflow Optimization Technology This technology can be applied in industries such as finance, healthcare, and e-commerce to enhance data security and streamline workflow processes. It can also be integrated into software systems to improve error handling and data integrity.
Questions about the Technology: 1. How does this technology improve data security in information systems? - This technology enhances data security by tracking the last process that interacted with the data, allowing for efficient error detection and resolution. 2. What are the potential commercial applications of this technology? - This technology can be utilized in various industries to enhance data security, streamline workflow processes, and improve error handling.
Original Abstract Submitted
One method includes tagging data with metadata that identifies a last process that interacted with the data, detecting an error that occurs when another process attempts to interact with the data that has been tagged with the metadata, in response to detecting the error, performing a query to identify the last process, and taking an action with respect to the last process. The query includes examining the metadata to identify the last process.