Unlock instant, AI-driven research and patent intelligence for your innovation.

Generation of application allowed lists for machines

A technology of machines and application sets, used in special data processing applications, instruments, computer security devices, etc.

Active Publication Date: 2019-08-06
MICROSOFT TECH LICENSING LLC
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The system identifies for each machine the set of executing applications executed by that machine

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Generation of application allowed lists for machines
  • Generation of application allowed lists for machines
  • Generation of application allowed lists for machines

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] A method and system are provided for automatically generating an application's permission list for a machine. As used herein, the term "machine" refers to any computing system that can be considered to execute an application, such as a server, virtual machine, user computer, tablet computer, smart phone, embedded device, special purpose computer, and the like. In some embodiments, an permission list generation ("ALG") system identifies a collection of applications executed by machines in a collection of machines (eg, an organization's machines), and identifies clusters of machines that will share the same permission list. For example, machines can be clustered based on their functionality (eg, database servers in the same cluster), machines can be clustered based on manual designation by administrators, machines can be automatically clustered based on similarity of the set of applications the machines have executed clustering, etc. After identifying the clusters, the A...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A computing system for generating allowed lists of applications for machines is provided. The system, for each machine, identifies a set of executed applications that were executed by that machine. The system then clusters the machines based on similarity between the sets of executed applications so that machines with similar sets are in the same cluster. The system then, for each cluster of machines, creates an allowed list of applications for the cluster that includes the applications in the sets of executed applications of the machines of the cluster. An allowed list for a cluster indicatesthat only applications in the allowed list are allowed to be executed by a machine in the cluster. The system then distributes the allowed list for a cluster to the machines of that cluster so that the machines execute only applications in the allowed list for their cluster.

Description

Background technique [0001] Cyberattacks cost companies and individuals billions of dollars. A 2015 report estimated that cyberattacks cost companies more than $400 billion annually. In addition to the financial cost, a cyber attack can lead to other damages such as destroying valuable information, publishing sensitive information, etc. Without effective defenses, costs and damage will certainly increase over time. Cyberattacks often rely on malicious software called "malware" that is installed and executed by the computer that is the target of the attack. Executed malware coordinated attack. For example, a ransomware attack can encrypt all data on a computer, including unique copies of financial documents, family photos, email messages, and more. If the ransom is not paid, the data may remain encrypted forever. Even if the ransom is paid, the attacker may not provide the key to decrypt the data. Due to the high cost of cyber-attacks, companies and individuals spend cons...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04W12/08H04L29/08G06F21/10
CPCH04L67/30G06F21/10G06F11/34G06F21/552H04L63/10H04W12/08G06F16/00H04L63/104H04L63/101
Inventor M·伊斯雷尔R·亚里B·克利格尔Y·达甘G·伊尔亚沙M·沙拉拉E·汉萨弗
Owner MICROSOFT TECH LICENSING LLC