-
公开(公告)号:US09773122B2
公开(公告)日:2017-09-26
申请号:US14953260
申请日:2015-11-27
CPC分类号: G06F9/45558 , G06F8/61 , G06F21/55 , G06F21/577 , G06F21/6218 , G06F2009/45562
摘要: The invention relates to a computer-implemented method for automated approval of a non-compliance of a modified configuration of a computer system with one or more compliance rules, the method comprising: receiving by a package management system a pre-approved modification pattern in form of a software package, deploying a modification pattern of the software package and providing compliance exception pre-approvals of the software package to a compliance management system, performing a compliance check of the resulting modified configuration of the computer system, in response to detecting a non-compliance with a compliance rule, comparing the detected non-compliance with the one or more pre-approved non-compliances, in response to a matching of the detected non-compliance with one or more of the respective pre-approved non-compliances, automatically approving the detected non-compliance by the compliance management system.
-
公开(公告)号:US12093959B2
公开(公告)日:2024-09-17
申请号:US15806368
申请日:2017-11-08
CPC分类号: G06Q20/4016 , G06F21/52 , G06F21/6254 , G06Q20/02 , G06Q20/4014 , H04L63/1408
摘要: Methods, computer program products, and systems are presented. The methods include customer specific information exchange and an adjustment of the privacy level of this information. For this purpose an abstraction layer and an obfuscation module are introduced. Using a “fraud vector” a risk assessment is performed on the obfuscated transaction data.
-
公开(公告)号:US12056706B2
公开(公告)日:2024-08-06
申请号:US15715370
申请日:2017-09-26
CPC分类号: G06Q20/4016 , G06F21/52 , G06F21/6254 , G06Q20/02 , G06Q20/4014 , H04L63/1408
摘要: Methods, computer program products, and systems are presented. The methods include customer specific information exchange and an adjustment of the privacy level of this information. For this purpose an abstraction layer and an obfuscation module are introduced. Using a “fraud vector” a risk assessment is performed on the obfuscated transaction data.
-
公开(公告)号:US09609025B1
公开(公告)日:2017-03-28
申请号:US14950002
申请日:2015-11-24
发明人: Boas Betzler , Vinod S. Chavan , Ingo Dressler , Holger Karn
CPC分类号: H04L63/20 , G06F21/6245 , G06F21/6254 , H04L63/02 , H04L63/0245 , H04L63/0254 , H04L63/0263 , H04L63/0281 , H04L63/04 , H04L67/1097
摘要: A method and associated computing system. Data received by a computing environment includes a mixture of non-sensitive data and sensitive data along with related metadata indicative of a sensitivity of the sensitive data. The computing system includes the computing environment. An operation is performed on the sensitive data in the computing environment by: (a) determining that the data used for the operation are sensitive data, (b) intercepting the operation on the sensitive data, and (c) registering newly created sensitive data, as a result of the operation, with metadata indicating one or more addresses of the sensitive data. An external access to the sensitive data in the computing environment is intercepted. A compliance firewall rule is applied to the sensitive data intended to leave the computing environment. The compliance firewall rule defines an action to be applied to the sensitive data such that the sensitive data are protected against unauthorized access.
-
公开(公告)号:US11119976B2
公开(公告)日:2021-09-14
申请号:US16580637
申请日:2019-09-24
IPC分类号: G06F16/11 , G06F16/182
摘要: A computer-implemented method for migrating a source container with a running application to a target container may be provided. The method includes providing a source container motion daemon being executed in the source container management system, and a target container motion daemon being executed in the target container management system, and creating a host container hosting an encapsulated container environment in the target container management system. The host container is executing a host container motion daemon and the target container. The method also includes connecting a container motion controller to the source container motion daemon, the target container motion daemon and the host container motion daemon, and copying content of a source memory of the source container to a target memory via the source container motion daemon and the host container motion daemon under control of the container motion controller.
-
公开(公告)号:US10055249B2
公开(公告)日:2018-08-21
申请号:US15650639
申请日:2017-07-14
CPC分类号: G06F9/45558 , G06F8/61 , G06F21/55 , G06F21/577 , G06F21/6218 , G06F2009/45562
摘要: Automated approval of a non-compliance of a modified configuration of a computer system includes performing a compliance check by a compliance management system. The modified configuration results from deploying a pre-approved modification pattern by a package management system modifying an initial configuration of the computer system. The modification pattern is provided by a software package that specifies at least one modification to be applied to the initial configuration and at least one compliance exception pre-approval specifying pre-approved non-compliances of modifications with compliance rules. Responsive to detecting a non-compliance, the non-compliance is compared with the pre-approved non-compliances. In response to determining that the detected non-compliances are not matching any pre-approved non-compliances, a compliance exception approval is requested. The detected non-compliance is approved in response to receiving the compliance exception approval for the detected non-compliances.
-
公开(公告)号:US20170149737A1
公开(公告)日:2017-05-25
申请号:US15403643
申请日:2017-01-11
发明人: Boas Betzler , Vinod S. Chavan , Ingo Dressler , Holger Karn
CPC分类号: H04L63/20 , G06F21/6245 , G06F21/6254 , H04L63/02 , H04L63/0245 , H04L63/0254 , H04L63/0263 , H04L63/0281 , H04L63/04 , H04L67/1097
摘要: A method and associated computing system. A first computing environment receives data that includes first sensitive data. The first computing environment includes a hypervisor, a virtual machine running on the hypervisor, and a compliance gateway coupled to the virtual machine and the hypervisor. The compliance gateway intercepts the request. The compliance gateway inspects the intercepted request, does not find sensitive data in the request from inspecting the intercepted request, and forwards the request directly to the virtual machine in response to not finding sensitive data in the request. The virtual machine receives the request from the compliance gateway and in response. The virtual machine initiates performance of an operation indicated in the request. The hypervisor determines that the performance of the request requires the first sensitive data that is sensitive, and in response the hypervisor prevents the virtual machine from completing performance of the operation, by intercepting the operation.
-
公开(公告)号:US20210089495A1
公开(公告)日:2021-03-25
申请号:US16580637
申请日:2019-09-24
IPC分类号: G06F16/11 , G06F16/182
摘要: A computer-implemented method for migrating a source container with a running application to a target container may be provided. The method includes providing a source container motion daemon being executed in the source container management system, and a target container motion daemon being executed in the target container management system, and creating a host container hosting an encapsulated container environment in the target container management system. The host container is executing a host container motion daemon and the target container. The method also includes connecting a container motion controller to the source container motion daemon, the target container motion daemon and the host container motion daemon, and copying content of a source memory of the source container to a target memory via the source container motion daemon and the host container motion daemon under control of the container motion controller.
-
公开(公告)号:US09912702B2
公开(公告)日:2018-03-06
申请号:US15403643
申请日:2017-01-11
发明人: Boas Betzler , Vinod S. Chavan , Ingo Dressler , Holger Karn
CPC分类号: H04L63/20 , G06F21/6245 , G06F21/6254 , H04L63/02 , H04L63/0245 , H04L63/0254 , H04L63/0263 , H04L63/0281 , H04L63/04 , H04L67/1097
摘要: A method and associated computing system. A first computing environment receives data that includes first sensitive data. The first computing environment includes a hypervisor, a virtual machine running on the hypervisor, and a compliance gateway coupled to the virtual machine and the hypervisor. The compliance gateway intercepts the request. The compliance gateway inspects the intercepted request, does not find sensitive data in the request from inspecting the intercepted request, and forwards the request directly to the virtual machine in response to not finding sensitive data in the request. The virtual machine receives the request from the compliance gateway and in response. The virtual machine initiates performance of an operation indicated in the request. The hypervisor determines that the performance of the request requires the first sensitive data that is sensitive, and in response the hypervisor prevents the virtual machine from completing performance of the operation, by intercepting the operation.
-
-
-
-
-
-
-
-