Unlock instant, AI-driven research and patent intelligence for your innovation.

Accident investigation event capture

A technology for security and event recording, applied in the direction of secure communication devices, computer security devices, electrical components, etc.

Pending Publication Date: 2022-03-04
MICROSOFT TECH LICENSING LLC
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Similarly, security breach-type incidents can occur where covert actors gain or attempt to gain access to customer data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Accident investigation event capture
  • Accident investigation event capture
  • Accident investigation event capture

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0143] Example 1 is a computing system comprising:

[0144] a request processing system that receives a create workspace request input identifying a characteristic of the incident to be investigated and indicating a user request to create a workspace within the sovereign cloud computing system, the request processing system based on the The create workspace request input is used to generate a first control message, wherein the request processing system receives a perform task request input that identifies a task to be performed within the workspace and generates a command indicating the identified task. The second control message for the task:

[0145] a control message processing system that receives the first control message and generates a workspace within the sovereign cloud computing system based on the first control message and executes the task in the workspace based on the second control message ;as well as

[0146] A security log generating system within the soverei...

example 2

[0147] Example 2 is the computing system of any or all of the previous examples, wherein the security log generation system comprises:

[0148] An interface generation logic unit configured to expose an interface with an information receiving function to receive the workspace creation indicator and the task indicator.

example 3

[0149] Example 3 is the computing system of any or all of the previous examples, wherein the security log generation system comprises:

[0150] An event record generation trigger detector detects an event record generation trigger and generates a trigger signal based on the detected event record generation trigger.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A security survey platform in a sovereign cloud includes a request processing system that receives a request for investigating an accident. And controlling the message processing system to create a workspace within the sovereignty cloud so as to enable investigation within the workspace. The control message processing system performs a survey task within the workspace. A security log generation system captures information corresponding to the task and generates an event record based on the captured information.

Description

Background technique [0001] Computer systems are widely used today. Many computer systems host services that are accessed and used by remote client computing systems. For example, many computing systems provide cloud-based services in which various software applications are provided as services to customers. [0002] In these types of services, various different types of incidents may occur which will be investigated to correct them. For example, features or components of the Service may malfunction, contain errors, or operate in other undesirable ways. Similarly, security breach type incidents may occur in which covert actors gain or attempt to gain access to customer data. [0003] These types of services may be provided across a number of different compliance boundaries. The compliance boundary defines what is sometimes referred to as the "sovereign cloud." Different sovereign clouds can be divided along compliance boundaries. Each of the different sovereign clouds ma...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06N20/00G06F21/62G06F21/55G06F9/54H04L9/40
CPCG06N20/00G06F21/6245G06F9/546G06F9/542G06F21/552H04L63/1416H04L63/1425
Inventor Y·拉加塞卡兰R·拉赫曼A·科尔P·R·莫耶B·B·德塞郝梓君M·米赞K·贾亚拉曼B·杜G·潘迪P·马内克
Owner MICROSOFT TECH LICENSING LLC