Dell products l.p. (20240338434). DISCOVERY OF RANSOMWARE PROCESSES USING LAST-INTERACTED METADATA TAGGING simplified abstract
Contents
DISCOVERY OF RANSOMWARE PROCESSES USING LAST-INTERACTED METADATA TAGGING
Organization Name
Inventor(s)
Ofir Ezrielev of Be’er Sheba (IL)
Yevgeni Gehtman of Modi'in (IL)
Tomer Shachar of Beer-Sheva (IL)
DISCOVERY OF RANSOMWARE PROCESSES USING LAST-INTERACTED METADATA TAGGING - A simplified explanation of the abstract
This abstract first appeared for US patent application 20240338434 titled 'DISCOVERY OF RANSOMWARE PROCESSES USING LAST-INTERACTED METADATA TAGGING
Simplified Explanation: The patent application describes a method that involves tagging data with metadata to identify the last process that interacted with the data. It then detects errors when another process tries to interact with the tagged data, queries to identify the last process, and takes action accordingly.
- Detect errors when another process interacts with tagged data
- Query to identify the last process
- Take action based on the identified last process
Key Features and Innovation:
- Tagging data with metadata to track the last process that interacted with it
- Error detection when unauthorized processes try to access tagged data
- Querying metadata to identify the last process for appropriate action
Potential Applications: This technology can be applied in data security systems, workflow management tools, and data governance solutions.
Problems Solved:
- Unauthorized access to data
- Tracking data interactions
- Ensuring data integrity
Benefits:
- Enhanced data security
- Improved workflow management
- Better data governance
Commercial Applications: Potential commercial applications include data security software, workflow automation tools, and compliance management systems.
Questions about the Technology: 1. How does the method ensure the accuracy of identifying the last process that interacted with the data? 2. What are the potential challenges in implementing this technology in large-scale systems?
Frequently Updated Research: Stay updated on advancements in data tagging technologies, error detection methods, and metadata querying techniques for improved data management and security.
Original Abstract Submitted
one method includes tagging data with metadata that identifies a last process that interacted with the data, detecting an error that occurs when another process attempts to interact with the data that has been tagged with the metadata, in response to detecting the error, performing a query to identify the last process, and taking an action with respect to the last process. the query includes examining the metadata to identify the last process.