Dell Products, L.P. (20240248975). PERFORMANT WORKSPACE DATA ORCHESTRATION USING INFORMATION TRUST SCORES simplified abstract

From WikiPatents
Jump to navigation Jump to search

PERFORMANT WORKSPACE DATA ORCHESTRATION USING INFORMATION TRUST SCORES

Organization Name

Dell Products, L.P.

Inventor(s)

Joseph Kozlowski of Broken Arrow OK (US)

Nicholas D. Grobelny of Evergreen CO (US)

PERFORMANT WORKSPACE DATA ORCHESTRATION USING INFORMATION TRUST SCORES - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240248975 titled 'PERFORMANT WORKSPACE DATA ORCHESTRATION USING INFORMATION TRUST SCORES

Abstract: An information handling system (IHS), such as an IHS supporting workspaces employing subject workspace data, and/or an IHS of a workspace orchestration service may identify each modification to the subject data, identify each trusted entity performing each trusted operation on the data, and identify each unauthorized or undocumented modification to the data, each based, at least in part, on each gap in identification of each trusted entity performing each trusted operation on the data. Whereupon, a security score of the data may be decremented for each identified unauthorized or undocumented modification to the data. A data passport may be implemented, in which each modification to the data is identified. This data passport may be a ledger, such as a blockchain, a log file, such as an extract, transform, load (ETL) server log file, rendered content from layered applications, such as a certificate chain (e.g., a final leaf certificate node).

Key Features and Innovation:

  • Identification of each modification to subject data
  • Identification of trusted entities performing operations on the data
  • Detection of unauthorized or undocumented modifications
  • Decrementing security score for unauthorized modifications
  • Implementation of a data passport for tracking modifications

Potential Applications: - Data security and integrity in workspaces - Compliance monitoring in workspace orchestration services - Tracking and auditing data modifications in real-time

Problems Solved: - Lack of visibility into data modifications - Difficulty in identifying trusted entities performing operations - Unauthorized changes to data going undetected

Benefits: - Enhanced data security and integrity - Improved compliance monitoring and auditing - Real-time tracking of data modifications

Commercial Applications: Title: Data Security and Compliance Monitoring System Description: This technology can be utilized in industries such as finance, healthcare, and government where data security and compliance are critical. It can be integrated into workspace management systems to ensure the integrity of sensitive information.

Questions about the Technology: 1. How does the data passport system work to track modifications to the data? 2. What are the potential implications of decrementing the security score for unauthorized modifications?

Frequently Updated Research: Ongoing research in data security and compliance monitoring systems continues to explore ways to enhance real-time tracking and auditing of data modifications. Stay updated on the latest advancements in this field for improved data protection.


Original Abstract Submitted

an information handling system (ihs), such as an ihs supporting workspaces employing subject workspace data, and/or an ihs of a workspace orchestration service may identify each modification to the subject data, identify each trusted entity performing each trusted operation on the data, and identify each unauthorized or undocumented modification to the data, each based, at least in part, on each gap in identification of each trusted entity performing each trusted operation on the data. whereupon, a security score of the data may be decremented for each identified unauthorized or undocumented modification to the data. a data passport may be implemented, in which each modification to the data is identified. this data passport may be a ledger, such as a blockchain, a log file, such as an extract, transform, load (etl) server log file, rendered content from layered applications, such as a certificate chain (e.g., a final leaf certificate node).