Dell products l.p. (20240111855). DEVICE PROTECTION USING PRE-EXECUTION COMMAND INTERCEPTION AND EVALUATION simplified abstract

From WikiPatents
Jump to navigation Jump to search

DEVICE PROTECTION USING PRE-EXECUTION COMMAND INTERCEPTION AND EVALUATION

Organization Name

dell products l.p.

Inventor(s)

Tomer Shachar of Beer Sheva (IL)

Maxim Balin of Gan-Yavne (IL)

Yevgeni Gehtman of Modi'in (IL)

DEVICE PROTECTION USING PRE-EXECUTION COMMAND INTERCEPTION AND EVALUATION - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240111855 titled 'DEVICE PROTECTION USING PRE-EXECUTION COMMAND INTERCEPTION AND EVALUATION

Simplified Explanation

The patent application describes techniques for device protection using pre-execution command interception and evaluation.

  • Obtaining commands from a user before execution
  • Requesting approval from an approval entity to evaluate whether to execute the command
  • Initiating execution based on the evaluation result
  • Identifying the approval entity from a registry of authorized users
  • Evaluating whether to execute the command based on specified policy tasks

Potential Applications

This technology could be applied in various industries such as cybersecurity, data protection, and device management.

Problems Solved

1. Unauthorized access to sensitive information 2. Malicious commands executed on devices

Benefits

1. Enhanced security for devices 2. Prevention of unauthorized actions 3. Control over command execution

Potential Commercial Applications

"Device Protection System for Command Execution Control"

Possible Prior Art

One possible prior art could be the use of access control lists (ACLs) to restrict command execution on devices.

Unanswered Questions

How does this technology impact user experience?

This article does not delve into how users interact with the approval process and if it affects their workflow.

What are the potential limitations of this technology?

The article does not discuss any drawbacks or challenges that may arise from implementing this system.


Original Abstract Submitted

techniques are provided for device protection using pre-execution command interception and evaluation. one method comprises obtaining, by a software entity associated with an operating system kernel of a device, a command from a user prior to an execution of the command; providing, by the software entity associated with the operating system kernel, a request to an approval entity to evaluate whether to execute the command; and initiating the execution of the command based on a result of the evaluation, by the approval entity, of whether to execute the command. the approval entity may be identified by accessing a registry of one or more users that are authorized to provide an authorization to execute the command. the evaluation of whether to execute the command may comprise one or more tasks specified by a policy.