18295364. DISCOVERY OF RANSOMWARE PROCESSES USING LAST-INTERACTED METADATA TAGGING simplified abstract (Dell Products L.P.)

From WikiPatents
Revision as of 02:47, 18 October 2024 by Wikipatents (talk | contribs) (Creating a new page)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

DISCOVERY OF RANSOMWARE PROCESSES USING LAST-INTERACTED METADATA TAGGING

Organization Name

Dell Products L.P.

Inventor(s)

Ofir Ezrielev of Be’er Sheba (IL)

Yehiel Zohar of Sderot (IL)

Yevgeni Gehtman of Modi'in (IL)

Tomer Shachar of Beer-Sheva (IL)

Maxim Balin of Gan-Yavne (IL)

DISCOVERY OF RANSOMWARE PROCESSES USING LAST-INTERACTED METADATA TAGGING - A simplified explanation of the abstract

This abstract first appeared for US patent application 18295364 titled 'DISCOVERY OF RANSOMWARE PROCESSES USING LAST-INTERACTED METADATA TAGGING

The abstract of the patent application describes a method that involves tagging data with metadata to identify the last process that interacted with the data. It then detects errors when another process attempts to interact with the tagged data, performs a query to identify the last process, and takes action with respect to that process.

  • Tagging data with metadata to identify the last process that interacted with the data
  • Detecting errors when another process tries to interact with the tagged data
  • Performing a query to identify the last process
  • Taking action with respect to the last process
  • Query includes examining the metadata to determine the last process

Potential Applications: - Data security and integrity in information systems - Error detection and resolution in data processing workflows

Problems Solved: - Ensuring data integrity by tracking the last process that interacted with it - Detecting errors in data processing workflows to prevent further issues

Benefits: - Improved data security and integrity - Efficient error detection and resolution in data processing workflows

Commercial Applications: Title: Data Security and Workflow Optimization Technology This technology can be applied in industries such as finance, healthcare, and e-commerce to enhance data security and streamline workflow processes. It can also be integrated into software systems to improve error handling and data integrity.

Questions about the Technology: 1. How does this technology improve data security in information systems? - This technology enhances data security by tracking the last process that interacted with the data, allowing for efficient error detection and resolution. 2. What are the potential commercial applications of this technology? - This technology can be utilized in various industries to enhance data security, streamline workflow processes, and improve error handling.


Original Abstract Submitted

One method includes tagging data with metadata that identifies a last process that interacted with the data, detecting an error that occurs when another process attempts to interact with the data that has been tagged with the metadata, in response to detecting the error, performing a query to identify the last process, and taking an action with respect to the last process. The query includes examining the metadata to identify the last process.