Malwarebytes Inc. (20240256690). INTELLIGENT CLOUD STORAGE SECURITY simplified abstract

From WikiPatents
Jump to navigation Jump to search

INTELLIGENT CLOUD STORAGE SECURITY

Organization Name

Malwarebytes Inc.

Inventor(s)

Adam S. Hyder of Cupertino CA (US)

Raghuram Sri Sivalanka of San Ramon CA (US)

Atanu Podder of Dublin CA (US)

Thomas R. Gissel of Apex NC (US)

Brian P. Morehead of Manteca CA (US)

INTELLIGENT CLOUD STORAGE SECURITY - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240256690 titled 'INTELLIGENT CLOUD STORAGE SECURITY

Simplified Explanation: A newly created or modified object is sent to a networked local or remote server for analysis. While the object is being analyzed for vulnerabilities, it is locked and made inaccessible to users, devices, and networks. If the object is identified as malicious, it may be marked for review, deleted, placed in quarantine, or have its permissions changed to prevent harm. Conversely, if the object is safe, the risk of ransomware attacks may be mitigated by replicating it across multiple cloud storage platforms.

Key Features and Innovation:

  • Objects sent for analysis to a networked server
  • Locking and making objects inaccessible during analysis
  • Identification of malicious objects for further action
  • Replication of safe objects across multiple cloud storage platforms

Potential Applications: This technology can be used in cybersecurity systems to analyze and mitigate potential threats in real-time.

Problems Solved: This technology addresses the need for quick and effective identification of malicious objects to prevent security breaches.

Benefits:

  • Enhanced security measures
  • Mitigation of ransomware attacks
  • Real-time analysis of potential threats

Commercial Applications: Potential commercial uses include cybersecurity software and services for businesses looking to enhance their security measures.

Prior Art: Readers can start their search for prior art related to this technology by looking into cybersecurity patents and innovations in threat analysis and mitigation.

Frequently Updated Research: Stay updated on the latest advancements in threat analysis and cybersecurity measures to ensure the most effective implementation of this technology.

Questions about Threat Analysis Technology: 1. How does this technology improve cybersecurity measures? 2. What are the potential implications of replicating safe objects across multiple cloud storage platforms?


Original Abstract Submitted

a newly created or modified object is sent to a networked local or remote server for analysis. while the object is being analyzed for vulnerabilities, the object is locked and made inaccessible to users, devices, and networks. if the object is identified as malicious, it may be marked for review, deleted, placed in quarantine, or have its permissions changed so that it cannot cause harm by propagating through the environment. conversely, if the object is identified as safe, the risk of ransomware attacks may also be mitigated by replicating the object across multiple cloud storage platforms.