Supercharge Your Innovation With Domain-Expert AI Agents!

Method for preventing root level access attacks and measurable SLA security and compliance platform

A multi-user, authorized user technology, used in secure communication devices, platform integrity maintenance, computer security devices, etc., to solve problems such as systems lacking compliance

Pending Publication Date: 2022-03-25
CYEMPTIVE TECH INC
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] So what is lacking is a system that can prevent root attacks and measure compliance within the device's system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for preventing root level access attacks and measurable SLA security and compliance platform
  • Method for preventing root level access attacks and measurable SLA security and compliance platform
  • Method for preventing root level access attacks and measurable SLA security and compliance platform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] The drawings and the following description relate to the preferred embodiment by way of illustration only. Those skilled in the art will recognize that alternative embodiments of the structures and methods disclosed herein are feasible alternatives that may be employed without departing from the principles of the disclosure.

[0017] Reference will now be made in detail to several embodiments, examples of which are illustrated in the accompanying drawings. Note that wherever possible, similar or identical reference numerals may be used in the drawings and may indicate similar or identical functions. The figures depict an embodiment of the disclosed system (or method) for purposes of illustration only. Those skilled in the art will readily recognize from the following description that alternative embodiments of the structures and methods shown herein may be employed without departing from the principles described herein.

[0018] overview

[0019] A system that preven...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A management system detects a change at a target device. The management system sends a request message to an authorized device of an authorized user of the multi-user authorization pool, the request message requesting an indication from the authorized user whether the detected change is approved. The management system receives, from an authorization device of the multi-user authorization pool, a plurality of response messages indicating whether the detected change is approved by a corresponding authorized user, and determines that the detected change is not approved based on at least three of the plurality of response messages indicating not approved. In response to determining that the change is not approved, an instruction message is sent to the target managed device to instruct the target managed device to roll back to a previous state.

Description

[0001] Cross References to Related Applications [0002] This application claims priority to U.S. Provisional Application No. 62 / 865,083, filed June 21, 2019, and U.S. Provisional Application No. 62 / 865,080, filed June 21, 2019, both of which are incorporated herein in their entirety . Background technique [0003] An administrative or root account has full control over the device, operating system (OS), or applications executing on the system. When an administrator logs into a machine, the administrator's user account is placed into an "Administrative or Administrator" group account, which has permissions to perform such operations and responsibilities as an administrator. When a malicious attacker breaks into an operating system or application, they may try to use an administrative account to gain that administrative privilege so they can clean up their tracks and perform all the necessary changes needed to do whatever they want with the device or network. [0004] Further...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/44G06F21/57H04L9/40H04L41/5009
CPCG06F21/554H04L41/5019H04L43/065H04L43/16H04L63/1433H04L63/1491H04L63/1408H04L41/5009G06F21/552G06F21/57G06F2221/034G06F2221/2115G06F2221/2127G06F2221/2139H04L63/1441G06F21/54
Inventor 罗伯特·派克加里·泽兰科布赖恩·格林
Owner CYEMPTIVE TECH INC
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More