18048657. SYSTEM AND METHOD FOR THREAT DETECTION THROUGH DATA STORAGE ANALYSIS simplified abstract (Dell Products L.P.)
Contents
- 1 SYSTEM AND METHOD FOR THREAT DETECTION THROUGH DATA STORAGE ANALYSIS
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 SYSTEM AND METHOD FOR THREAT DETECTION THROUGH DATA STORAGE ANALYSIS - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Potential Applications
- 1.6 Problems Solved
- 1.7 Benefits
- 1.8 Potential Commercial Applications
- 1.9 Possible Prior Art
- 1.10 Original Abstract Submitted
SYSTEM AND METHOD FOR THREAT DETECTION THROUGH DATA STORAGE ANALYSIS
Organization Name
Inventor(s)
GAURAV Chawla of Austin TX (US)
BORIS Glimcher of Tel Aviv-Yafo (IL)
MAUNISH A. Shah of Austin TX (US)
SYSTEM AND METHOD FOR THREAT DETECTION THROUGH DATA STORAGE ANALYSIS - A simplified explanation of the abstract
This abstract first appeared for US patent application 18048657 titled 'SYSTEM AND METHOD FOR THREAT DETECTION THROUGH DATA STORAGE ANALYSIS
Simplified Explanation
The abstract describes methods and systems for managing data access based threats using a network interface controller (NIC) that presents emulated storages for data storage and actively screens for access patterns that may indicate compromised compute complexes.
- The data processing system includes a network interface controller (NIC).
- The NIC presents emulated storages for data storage.
- Emulated storage devices utilize storage resources of storage devices.
- The NIC actively screens for access patterns indicating compromised compute complexes.
- Processing is done locally on the NIC.
Potential Applications
This technology could be applied in cybersecurity systems to detect and prevent unauthorized access to sensitive data.
Problems Solved
This technology helps in managing data access based threats and prevents potential security breaches in data processing systems.
Benefits
The system provides enhanced security measures by actively screening for access patterns that may indicate compromised compute complexes, thus protecting sensitive data from unauthorized access.
Potential Commercial Applications
One potential commercial application of this technology could be in the development of advanced cybersecurity solutions for businesses and organizations looking to enhance their data security measures.
Possible Prior Art
One possible prior art could be the use of network interface controllers for data processing and storage management in computer systems.
What are the specific access patterns that the NIC screens for in the emulated storage devices?
The specific access patterns that the NIC screens for in the emulated storage devices are not detailed in the abstract.
How does the NIC determine if compute complexes may be compromised based on the access patterns it screens for?
The abstract does not provide specific information on how the NIC determines if compute complexes may be compromised based on the access patterns it screens for.
Original Abstract Submitted
Methods and systems for managing data access based threats are disclosed. To manage the data access based threats, a data processing system may include a network interface controller (NIC). The network interface controller may present emulated storages that may be used for data storage. The emulated storage devices may utilize storage resources of storage devices. The NIC may actively screen for access patterns in use of the emulated storage devices that indicate compute complexes may be compromised. When doing so, the processing may be done locally on the NIC.