Malwarebytes Inc. (20240259424). Cloud Ransomware Protection simplified abstract
Contents
Cloud Ransomware Protection
Organization Name
Inventor(s)
Adam S. Hyder of Cupertino CA (US)
Raghuram Sri Sivalanka of San Ramon CA (US)
Atanu Podder of Dublin CA (US)
Thomas R. Gissel of Apex NC (US)
Brian P. Morehead of Manteca CA (US)
Cloud Ransomware Protection - A simplified explanation of the abstract
This abstract first appeared for US patent application 20240259424 titled 'Cloud Ransomware Protection
Simplified Explanation:
When a new or modified object is sent to a server for analysis, it is locked and made inaccessible to users, devices, and networks. If the object is found to be malicious, it may be deleted, quarantined, or have its permissions changed. Conversely, if the object is safe, it can be replicated across multiple cloud storage platforms to mitigate ransomware attacks.
- The technology involves sending objects to a server for analysis and locking them during the process.
- Malicious objects can be marked for review, deleted, quarantined, or have their permissions changed.
- Safe objects can be replicated across multiple cloud storage platforms to prevent ransomware attacks.
Potential Applications:
This technology can be used in cybersecurity systems to analyze and mitigate potential threats in real-time. It can also be applied in cloud storage platforms to enhance security measures.
Problems Solved:
This technology addresses the need for real-time analysis of potentially harmful objects to prevent security breaches and ransomware attacks.
Benefits:
The benefits of this technology include enhanced cybersecurity measures, real-time threat analysis, and mitigation of ransomware attacks through object replication.
Commercial Applications:
Potential commercial applications include cybersecurity software development, cloud storage platform integration, and data protection services for businesses.
Questions about the Technology: 1. How does this technology impact the efficiency of cybersecurity systems? 2. What are the potential cost savings for businesses implementing this technology?
Frequently Updated Research:
Researchers are continually exploring ways to improve the speed and accuracy of object analysis in real-time cybersecurity systems. Stay updated on the latest advancements in threat detection and mitigation technologies.
Original Abstract Submitted
a newly created or modified object is sent to a networked local or remote server for analysis. while the object is being analyzed for vulnerabilities, the object is locked and made inaccessible to users, devices, and networks. if the object is identified as malicious, it may be marked for review, deleted, placed in quarantine, or have its permissions changed so that it cannot cause harm by propagating through the environment. conversely, if the object is identified as safe, the risk of ransomware attacks may also be mitigated by replicating the object across multiple cloud storage platforms.