Dell products l.p. (20240137384). SYSTEM AND METHOD FOR THREAT DETECTION THROUGH DATA STORAGE ANALYSIS simplified abstract
Contents
- 1 SYSTEM AND METHOD FOR THREAT DETECTION THROUGH DATA STORAGE ANALYSIS
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 SYSTEM AND METHOD FOR THREAT DETECTION THROUGH DATA STORAGE ANALYSIS - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Potential Applications
- 1.6 Problems Solved
- 1.7 Benefits
- 1.8 Potential Commercial Applications
- 1.9 Possible Prior Art
- 1.10 Original Abstract Submitted
SYSTEM AND METHOD FOR THREAT DETECTION THROUGH DATA STORAGE ANALYSIS
Organization Name
Inventor(s)
GAURAV Chawla of Austin TX (US)
BORIS Glimcher of Tel Aviv-Yafo (IL)
MAUNISH A. Shah of Austin TX (US)
SYSTEM AND METHOD FOR THREAT DETECTION THROUGH DATA STORAGE ANALYSIS - A simplified explanation of the abstract
This abstract first appeared for US patent application 20240137384 titled 'SYSTEM AND METHOD FOR THREAT DETECTION THROUGH DATA STORAGE ANALYSIS
Simplified Explanation
The patent application describes methods and systems for managing data access based threats using a network interface controller (NIC) that presents emulated storage devices for data storage. The NIC actively screens for access patterns that indicate compromised compute complexes, locally processing the data on the NIC.
- The system includes a network interface controller (NIC) that presents emulated storage devices for data storage.
- The emulated storage devices utilize storage resources of storage devices.
- The NIC actively screens for access patterns indicating compromised compute complexes.
- Data processing is done locally on the NIC to manage data access based threats.
Potential Applications
This technology could be applied in industries where data security is crucial, such as finance, healthcare, and government sectors.
Problems Solved
This technology helps in managing data access based threats and identifying compromised compute complexes, enhancing overall data security.
Benefits
The system provides an additional layer of security by actively screening for access patterns and processing data locally on the NIC, improving data protection.
Potential Commercial Applications
Potential commercial applications include data security solutions for businesses, cloud service providers, and data centers.
Possible Prior Art
One possible prior art could be systems that use network interface controllers for data processing and security measures, but the specific method of actively screening for access patterns to identify compromised compute complexes may be a novel aspect of this technology.
What are the specific access patterns that the NIC screens for to detect compromised compute complexes?
The article does not provide specific details on the access patterns that the NIC screens for to detect compromised compute complexes.
How does the system differentiate between normal access patterns and those indicating compromised compute complexes?
The article does not elaborate on how the system differentiates between normal access patterns and those indicating compromised compute complexes.
Original Abstract Submitted
methods and systems for managing data access based threats are disclosed. to manage the data access based threats, a data processing system may include a network interface controller (nic). the network interface controller may present emulated storages that may be used for data storage. the emulated storage devices may utilize storage resources of storage devices. the nic may actively screen for access patterns in use of the emulated storage devices that indicate compute complexes may be compromised. when doing so, the processing may be done locally on the nic.