SYSTEM AND METHOD FOR IDENTIFYING SECURITY THREATS BASED ON COMPLIANCE FAILURES AND INFRASTRUCTURE ACTIVITY

    公开(公告)号:US20240356946A1

    公开(公告)日:2024-10-24

    申请号:US18304796

    申请日:2023-04-21

    IPC分类号: H04L9/40

    CPC分类号: H04L63/1425 H04L63/20

    摘要: Methods and systems for managing computing infrastructure compliance with standards are disclosed. The computing infrastructure may provide computer implemented services that may be at elevated risk if the computing infrastructure fails to comply with various standards such as security or redundancy standards. To manage compliance with standards, a cross-standard compliance coverage model may be used. The cross-standard compliance coverage model may use information regarding infrastructure components of the computing infrastructure to ascertain compliance with any number of standards. The compliance and activity of the infrastructure may be used to identify actions usable to manage the infrastructure to reduce or prevent compliance failures.

    MIGRATION OF DATA TO MAINTAIN DATA RESILIENCY

    公开(公告)号:US20240094909A1

    公开(公告)日:2024-03-21

    申请号:US17934060

    申请日:2022-09-21

    IPC分类号: G06F3/06 G06F11/30

    摘要: Migration of data to maintain data resiliency, including receiving user-input indicating a first data resiliency of first data; storing the first data at a first storage device of the storage devices, the first storage device associated with the first data resiliency; monitoring vectors associated with performance of the storage devices; determining, based on the monitoring, that a particular vector fails to meet an associated performance criteria for the first data resiliency of the first data, and in response: analyzing characteristics of each of the storage devices, including a resiliency of each of the storage devices; identifying, based on the characteristics of each of the storage devices, a second storage device of the storage devices for migration of the first data such that the first resiliency of the first data is maintained; and migrating the first data from the first storage device to the second storage device

    SYSTEM AND METHOD FOR SECURING DATA PROCESSING SYSTEMS THROUGH RECOGNITION AND ANALYSIS OF COMMANDS

    公开(公告)号:US20240364534A1

    公开(公告)日:2024-10-31

    申请号:US18309266

    申请日:2023-04-28

    IPC分类号: H04L9/32 G06F8/65

    CPC分类号: H04L9/3247 G06F8/65

    摘要: Methods and systems for securing data processing systems are disclosed. The data processing systems may be secured through analysis of recognition and simulation of commands that may be run on data processing systems. An analysis of recognition of the command may be used to query if the command has already been simulated for its effects on the data processing system. If the command may have already simulated the command, then the data processing system may know whether to execute the command. Conversely, if the command may not have been simulated, the command may be simulated to understand the effects on the data processing system. In understanding the effects of the command, the data processing system may formulate whether to execute the command.

    SYSTEM AND METHOD FOR MANAGING A CACHE HOSTED BY A DATA PROCESSING SYSTEM USING A DIGITAL TWIN

    公开(公告)号:US20240362010A1

    公开(公告)日:2024-10-31

    申请号:US18309147

    申请日:2023-04-28

    IPC分类号: G06F8/65 G06N5/02

    CPC分类号: G06F8/65 G06N5/02

    摘要: Methods and systems for managing operation of data processing systems with limited access to an uplink pathway are disclosed. To manage the operation, a system may include a data processing system manager, a data collector, and one or more data processing systems. The data processing system manager may identify future events that may impact operation of the data processing system using a digital twin and observational data. A cache hosted by the data processing system may store events and commands associated with the events. The commands may include action sets intended to mitigate impacts of the events. If the data processing system does not have commands associated with the simulated future events stored in the cache, the data processing system manager may provide instructions for replacing at least a portion of the commands stored in the cache with commands responsive to the simulated future events.

    SYSTEM AND METHOD FOR MANAGING COMPLIANCE FAILURES BASED ON ESTIMATIONS FOR REMEDIATION

    公开(公告)号:US20240356977A1

    公开(公告)日:2024-10-24

    申请号:US18304800

    申请日:2023-04-21

    摘要: Methods and systems for managing computing infrastructure compliance with standards are disclosed. The computing infrastructure may provide computer implemented services that may be at elevated risk if the computing infrastructure fails to comply with various standards such as security or redundancy standards. To manage compliance with standards, a cross-standard compliance coverage model may be used. The cross-standard compliance coverage model may use information regarding infrastructure components of the computing infrastructure to ascertain compliance with any number of standards. The compliance and activity of the infrastructure may be used to identify actions usable to manage the infrastructure to reduce or prevent compliance failures. Remediation workflows may be established using the actions.

    SYSTEM AND METHOD FOR QUANTIFICATION OF STANDARD COMPLIANCE TO DRIVE REMEDIATION

    公开(公告)号:US20240356975A1

    公开(公告)日:2024-10-24

    申请号:US18304766

    申请日:2023-04-21

    IPC分类号: H04L9/40

    CPC分类号: H04L63/20 G06F21/57

    摘要: Methods and systems for managing computing infrastructure compliance with standards are disclosed. The computing infrastructure may provide computer implemented services that may be at elevated risk if the computing infrastructure fails to comply with various standards such as security or redundancy standards. To manage compliance with standards, a cross-standard compliance coverage model may be used. The cross-standard compliance coverage model may use information regarding infrastructure components of the computing infrastructure to ascertain compliance with any number of standards.

    SYSTEM AND METHOD FOR DYNAMIC RESOLUTION OF STANDARD COMPLIANCE

    公开(公告)号:US20240356974A1

    公开(公告)日:2024-10-24

    申请号:US18304760

    申请日:2023-04-21

    IPC分类号: H04L9/40

    CPC分类号: H04L63/20

    摘要: Methods and systems for managing computing infrastructure compliance with standards are disclosed. The computing infrastructure may provide computer implemented services that may be at elevated risk if the computing infrastructure fails to comply with various standards such as security or redundancy standards. To manage compliance with standards, a cross-standard compliance coverage model may be used. The cross-standard compliance coverage model may use information regarding infrastructure components of the computing infrastructure to ascertain compliance with any number of standards.

    SYSTEM AND METHOD FOR IDENTIFYING SECURITY THREATS BASED ON STANDARD COMPLIANCE FAILURES AND INFRASTRUCTURE CONDITIONS

    公开(公告)号:US20240356956A1

    公开(公告)日:2024-10-24

    申请号:US18304780

    申请日:2023-04-21

    IPC分类号: H04L9/40

    摘要: Methods and systems for managing computing infrastructure compliance with standards are disclosed. The computing infrastructure may provide computer implemented services that may be at elevated risk if the computing infrastructure fails to comply with various standards such as security or redundancy standards. To manage compliance with standards, a cross-standard compliance coverage model may be used. The cross-standard compliance coverage model may use information regarding infrastructure components of the computing infrastructure to ascertain compliance with any number of standards. The compliance and conditions of the infrastructure may be used to identify security threats to which the infrastructure components are likely to be exposed.

    SYSTEM AND METHOD FOR SELECTIVE MANAGEMENT OF VULNERABILITIES

    公开(公告)号:US20240354419A1

    公开(公告)日:2024-10-24

    申请号:US18302281

    申请日:2023-04-18

    IPC分类号: G06F21/57

    CPC分类号: G06F21/577 G06F2221/034

    摘要: Methods and systems for managing vulnerabilities that may be exhibited by data processing systems are disclosed. The vulnerabilities may be managed by identifying components of the data processing systems and conditions impacting the data processing systems. The conditions may be used to establish a hierarchy for the vulnerabilities. Remediation for the vulnerabilities may be selectively performed based on the locations of the vulnerabilities within the hierarchy.

    SYSTEM AND METHOD FOR MANAGING DATA WORKFLOWS USING DIGITAL TWINS

    公开(公告)号:US20240362561A1

    公开(公告)日:2024-10-31

    申请号:US18309243

    申请日:2023-04-28

    IPC分类号: G06Q10/0631 G06Q10/0639

    CPC分类号: G06Q10/06316 G06Q10/0639

    摘要: Methods and systems for managing data workflows performed by data processing systems throughout a distributed environment are disclosed. To manager data workflows, a system may include a data workflow manager and one or more data processing systems. The data workflow manager may host and operate a digital twin intended to duplicate operation of each corresponding data processing system involved in a data workflow. In the event of a loss of functionality of a data processing system involved in the data workflow, the data workflow manager may initiate operation of a corresponding digital twin and re-route the data workflow through the digital twin to facilitate continued performance of computer-implemented services based on the data workflow. When a replacement data processing system becomes available, the replacement data processing system may be inserted into the data workflow and the digital twin may no longer be used.