20240045964. Cybersecurity Active Defense and Rapid Bulk Recovery in a Data Storage System simplified abstract (RackTop Systems, Inc.)

From WikiPatents
Jump to navigation Jump to search

Cybersecurity Active Defense and Rapid Bulk Recovery in a Data Storage System

Organization Name

RackTop Systems, Inc.

Inventor(s)

Eric Bednash of Fulton MD (US)

Jonathan Halstuch of Fulton MD (US)

Nicholas Louis Mezei of Catonsville MD (US)

Garrett Porter of Highland MD (US)

Gerald Jelinek of Colorado Springs CO (US)

Garrett Eugene D’amore of San Marcos CA (US)

Cybersecurity Active Defense and Rapid Bulk Recovery in a Data Storage System - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240045964 titled 'Cybersecurity Active Defense and Rapid Bulk Recovery in a Data Storage System

Simplified Explanation

The patent application describes a system and architecture for protecting data storage systems from malicious attacks. The system includes a file system and an architecture installed on the file system, which operates in a zero trust manner. The architecture includes a controller that identifies file-level operations indicative of a malicious event and takes actions to protect the files. These actions include blocking user accounts or machine addresses interacting with the files, preventing data exfiltration or corruption, providing alerts, identifying associated files, generating recommendations based on data points and file-level operations, presenting a graphical user interface displaying the recommendations, and removing and restoring files as requested.

  • The system protects data storage systems from malicious attacks.
  • It operates in a zero trust manner, meaning it does not automatically trust any user or system.
  • The architecture includes a controller that identifies file-level operations indicative of a malicious event.
  • It can block user accounts or machine addresses interacting with the files.
  • It prevents data exfiltration or corruption of the files.
  • It provides alerts regarding the files.
  • It identifies the files associated with the malicious event.
  • It generates recommendations based on data points and file-level operations.
  • It presents a graphical user interface displaying the recommendations.
  • It can remove and restore files as requested.

Potential applications of this technology:

  • Data storage systems in organizations that require strong cybersecurity measures.
  • Cloud storage providers looking to enhance their security offerings.
  • Government agencies or military organizations handling sensitive information.

Problems solved by this technology:

  • Protects data storage systems from malicious attacks, preventing unauthorized access or data loss.
  • Identifies and responds to malicious events in real-time, minimizing the impact of the attack.
  • Provides recommendations based on data points and file-level operations, helping users make informed decisions about file management.

Benefits of this technology:

  • Enhanced cybersecurity for data storage systems.
  • Real-time detection and response to malicious events.
  • Improved user interface for managing files and receiving recommendations.
  • Ability to quickly remove and restore files as needed.


Original Abstract Submitted

cybersecurity active defense and rapid bulk recovery in data storage systems are disclosed herein. an example system includes a file system, and an architecture installed on the file system, the architecture being configured to protect the file system in a zero trust manner from a malicious attack by a source system, the architecture including a controller that is configured to determine file-level operations of files in the file system that are indicative of a malicious event, block a user account or machine address interacting with the files, prevent data exfiltration or data corruption of the files, provide an alert regarding the files, identify the files that were associated with the malicious event, generate recommendations regarding the files based on datapoints and the file-level operations on the files, present a graphical user interface that displays the recommendations, and remove and restore the one or more of the files as requested.