-
公开(公告)号:DE112015004500B4
公开(公告)日:2021-06-02
申请号:DE112015004500
申请日:2015-10-23
Applicant: IBM
Inventor: BREUER MARCUS , GOLDBERG ITZHACK , MUEHGE THORSTEN , RUEGER ERIK , SEUL MATTHIAS
Abstract: Verfahren (100) zum Speichern von Daten in einer gemeinsam genutzten vernetzten Umgebung, wobei die gemeinsam genutzte vernetzte Umgebung (610) eine Sicherheitsschicht (612) zwischen einem gemeinsam genutzten vernetzten Speicher und einer Zugriffsschnittstelle eines gemeinsam genutzten vernetzten Speichers (602) aufweist, wobei das Verfahren (100) aufweist- physisches Trennen (102) des gemeinsam genutzten vernetzten Speichers mit der Sicherheitsschicht (612) von einem Schlüsseltresorsystem (604),- Empfangen (104) einer Speicheranforderung zusammen mit Daten, die in dem gemeinsam genutzten vernetzten Speicher gespeichert werden sollen, und zusammen mit einer Vertraulichkeitseinstufung, wobei die Speicheranforderung zusammen mit Daten und der Vertraulichkeitseinstufung über die Zugriffsschnittstelle des gemeinsam genutzten vernetzte Speichers (602) von der Sicherheitsschicht (612) empfangen wird,- Verschlüsseln (106) der zu speichernden Daten und der Vertraulichkeitseinstufung auf Anforderung der Sicherheitsschicht (612) durch das Schlüsseltresorsystem (604) in einem Datencontainer (608, 904),- Kategorisieren (108) des gemeinsam genutzten vernetzten Speichers in Cloud-Zonen, wobei jeder Cloud-Zone eine Vertrauensebene zugewiesen ist;- Speichern (110) des Datencontainers (608, 904) in einer der Cloud-Zonen des gemeinsam genutzten vernetzten Speichers, sodass die Vertrauensebene von der einen der Cloud-Zonen der Vertraulichkeitseinstufung entspricht; und- Validieren durch das Schlüsseltresorsystem (604), dass die Speicheranforderung mit konfigurierbaren Richtlinien konform ist durch- Validieren, dass die Sicherheitsschicht (612) für eine Datenübertragung vertrauenswürdig ist, und dass ein Übertragungskanal zwischen der Sicherheitsschicht (612) und dem Schlüsseltresorsystem (604) durch eine Verschlüsselung auf Zertifikatsgrundlage geschützt ist, und- im Fall einer positiven Validierung, Erstellen eines Übertragungstickets, das die Autorisierung aufweist, Anfordern von Informationen über den Speicher-Anforderer und von Metadaten über die zu speichernden Daten, einer Signatur der Sicherheitsschicht (612) und einer Ablaufzeit für die Speicheranforderung, und Signieren des Übertragungstickets, bevor das Übertragungsticket an die Sicherheitsschicht (612) zurückgesendet wird.
-
公开(公告)号:CA3137249A1
公开(公告)日:2020-10-22
申请号:CA3137249
申请日:2020-03-23
Applicant: IBM
Inventor: UDUPI RAGHAVENDRA ARJUN , SEUL MATTHIAS , SCHEIDELER TIM , AIROLDI TIZIANO
IPC: G06F21/55
Abstract: A computer-implemented method for dynamically identifying security threats comprising a cyber-attack chain composed of a sequence of partial cyber-attacks represented by attack patterns is provided. The method comprises receiving a sequence of security events, determining, a first cyber-attack pattern by applying a set of predefined rules for detecting an indicator of compromise of a first partial cyber-attack of the cyber-attack chain thereby, identifying a specific cyber-attack chain and determining a type and an attribute in the pattern of the first partial cyber-attack. The method comprises further configuring at least one rule for a downstream partial cyber-attack in the specific cyber-attack chain based on the type and the attribute in the attack pattern of the first partial cyber-attack, and adding the at least one configured rule to the set of predefined rules to be used by the correlation engine for dynamically identifying security threats.
-
公开(公告)号:GB2498832B
公开(公告)日:2014-03-05
申请号:GB201221375
申请日:2012-11-28
Applicant: IBM
Inventor: SEUL MATTHIAS
IPC: G06F9/44 , G06F3/0481
Abstract: A mechanism provides additional information to a visual interface element of a graphical user interface in an operating system environment. To display the additional information to the visual interface element on the information container layer, a background service process determines for each of the visual interface elements of the graphical user interface whether at least one configured context is assigned; collecting information across all applications from at least one information or status source related to the at least one assigned context; generating and placing a corresponding information container on the information container layer to be visible at a relative position to the corresponding visual interface element of the graphical user interface on the display area.
-
公开(公告)号:GB2506624A
公开(公告)日:2014-04-09
申请号:GB201217734
申请日:2012-10-04
Applicant: IBM
Inventor: SEUL MATTHIAS , DIETRICH CARSTEN , WALTER STEFAN
Abstract: An improved method for correlation of session activities to a browser window (120) in a client-server environment (1) comprises: Implementing correlation means (52) to intercept and manipulate data traffic between client (100) and server (15, 25) and to submit requests (162) to said server (15, 25) and to submit responses (170, 174) to said client (100); tracking and monitoring all incoming client requests (160, 164) and server responses (172); looking for a session identifier (56) and identifying corresponding marker locations containing said session identifier (56); wherein in case an incoming browser request (160, 164) is missing said session identifier (56) at at least one predefined main marker location said incoming client request (160, 164) is intercepted and a correlation response (170) attached with a session identifier (56) is send to a requesting client (100) for repeating said client request (160, 164) including said session identifier (56) at predefined marker locations and using said session identifier (56) for all subsequent requests (160, 164) originated by said client (100); and wherein in case all predefined main marker locations are containing said session identifier (56), all session identifiers (56) are removed and details of said client request (160, 164) are recorded and associated with said session identifier (56), and said client request (160) is marked with a specific marker containing said session identifier (56) and submitted as marked request (162) to said server (15, 25).
-
公开(公告)号:IL286611D0
公开(公告)日:2021-10-31
申请号:IL28661121
申请日:2021-09-22
Applicant: IBM , UDUPI RAGHAVENDRA ARJUN , SEUL MATTHIAS , SCHEIDELER TIM , AIROLDI TIZIANO
Inventor: UDUPI RAGHAVENDRA ARJUN , SEUL MATTHIAS , SCHEIDELER TIM , AIROLDI TIZIANO
Abstract: A computer-implemented method for dynamically identifying security threats comprising a cyber-attack chain composed of a sequence of partial cyber-attacks represented by attack patterns may be provided. The method comprises receiving a sequence of security events, determining, a first cyber-attack pattern by applying a set of predefined rules for detecting an indicator of compromise of a first partial cyber-attack of the cyber-attack chain—thereby, identifying a specific cyber-attack chain—and determining a type and an attribute in the pattern of the first partial cyber-attack. The method comprises further configuring at least one rule for a downstream partial cyber-attack in the specific cyber-attack chain based on the type and the attribute in the attack pattern of the first partial cyber-attack, and adding the at least one configured rule to the set of predefined rules to be used by the correlation engine for dynamically identifying security threats to information technology systems.
-
公开(公告)号:SG11202109795WA
公开(公告)日:2021-10-28
申请号:SG11202109795W
申请日:2020-03-23
Applicant: IBM
Inventor: UDUPI RAGHAVENDRA ARJUN , SEUL MATTHIAS , SCHEIDELER TIM , AIROLDI TIZIANO
Abstract: A computer-implemented method for dynamically identifying security threats comprising a cyber-attack chain composed of a sequence of partial cyber-attacks represented by attack patterns may be provided. The method comprises receiving a sequence of security events, determining, a first cyber-attack pattern by applying a set of predefined rules for detecting an indicator of compromise of a first partial cyber-attack of the cyber-attack chain—thereby, identifying a specific cyber-attack chain—and determining a type and an attribute in the pattern of the first partial cyber-attack. The method comprises further configuring at least one rule for a downstream partial cyber-attack in the specific cyber-attack chain based on the type and the attribute in the attack pattern of the first partial cyber-attack, and adding the at least one configured rule to the set of predefined rules to be used by the correlation engine for dynamically identifying security threats to information technology systems.
-
公开(公告)号:DE102017218904A1
公开(公告)日:2018-05-03
申请号:DE102017218904
申请日:2017-10-24
Applicant: IBM
Inventor: LINK CLAUDIUS , SEUL MATTHIAS , SOLYAKOV ARTEMIY ALEKSANDROVICH
Abstract: Ausführungsformen beziehen sich auf eine Senderseite einer Netzwerkdatenübertragung, die von einem Sender über einen Netzwerkpfad an ein Ziel gesendet wird, wobei die Senderseite bestimmte Bedingungen und Aktionen in Form eines Skripts ausdrückt und das Skript in Netzwerkpaketen codiert, so dass Routing-Entscheidungen getroffen werden können. Routing-Einheiten entlang des Netzwerkpfads sind mit einer Ausführungsumgebung und einer Anwendungsprogrammschnittstelle (Application Program Interface, API) ausgestattet, damit das Skript ausgeführt werden und in den Routing-Prozess eingreifen (d.h. mit der Routing-Einheit „reden“) kann. Hier bereitgestellte Ausführungsformen können so realisiert werden, dass sie mit anderen, bestehenden Routing-Protokollen gemeinsam vorhanden sind, oder sie können andere, bestehende Routing-Protokolle vollständig ersetzen.
-
公开(公告)号:DE112015004500T5
公开(公告)日:2017-08-10
申请号:DE112015004500
申请日:2015-10-23
Applicant: IBM
Inventor: BREUER MARCUS , GOLDBERG ITZHACK , SEUL MATTHIAS , MUEHGE THORSTEN , RUEGER ERIK
Abstract: Ein Verfahren zum Speichern von Daten in einer Cloud-Umgebung kann bereitgestellt werden. Die Cloud-Umgebung weist eine Sicherheitsschicht auf. Das Verfahren weist ein physisches Trennen des Cloud-Speichers von einem Schlüsseltresorsystem und ein Empfangen einer Speicheranforderung zusammen mit einer Vertraulichkeitseinstufung auf, wobei die Speicheranforderung zusammen mit Daten und der Vertraulichkeitseinstufung über die Zugriffsschnittstelle des Cloud-Speichers von der Sicherheitsschicht empfangen wird. Das Verfahren weist ferner ein Verschlüsseln der zu speichernden Daten und der Vertraulichkeitseinstufung auf Anforderung der Sicherheitsschicht durch das Schlüsseltresorsystem in einem Datencontainer auf, ein Kategorisieren des Cloud-Speichers in Cloud-Zonen, wobei jeder Cloud-Zone eine Vertrauensebene zugewiesen wird; und ein Speichern des Datencontainers in einer der Cloud-Zonen des Cloud-Speichers, sodass die Vertrauensebene von der einen der Cloud-Zonen der Vertraulichkeitseinstufung entspricht.
-
公开(公告)号:GB2509709A
公开(公告)日:2014-07-16
申请号:GB201300316
申请日:2013-01-09
Applicant: IBM
Inventor: BRUGGER DOMINIK , SEUL MATTHIAS
Abstract: Secure data storage 405 in a distributed (e.g. cloud) computing system 400 by a client 401 of the distributed computing system, the method comprising in a gateway device 403 of the distributed computing system intercepting a data file from a data stream during transmission of the stream in the system; evaluating the intercepted data file for determining the communication protocol used for the stream data transmission; evaluating the intercepted data file based on the communication protocol for determining the destination and the source of the data file; if the destination is the storage (405): selecting a set of analysis algorithms from a plurality of predetermined analysis algorithms, wherein each analysis algorithm of the set of the analysis algorithms is associated with a predefined weight; analyzing the intercepted data file using each of the analysis algorithms of the selected set of analysis algorithms for determining if the intercepted data file comprises sensitive data, thereby determining a respective set of results; associating to each result of the set of results a number indicating that the data file comprises or not sensitive data; calculating a weighted sum of the numbers indicating that the data file comprises sensitive data using the predefined weights; comparing the weighted sum with a predetermined sensitivity threshold value; in response to determination that the weighted sum is higher than a sensitivity threshold, creating a data container and encrypting the payload content of the data file in a manner so as to maintain the original payload size, possibly using augmentation/reduction/compression and/or padding if necessary; storing the key used to encrypt the data file; and transmitting the encrypted payload rather than the original data file to the storage. If the destination is the client and the source of the stream is the storage the gateway decrypts the data file using a stored encryption key and transmits the data file to the client once authorized.
-
公开(公告)号:GB2498832A
公开(公告)日:2013-07-31
申请号:GB201221375
申请日:2012-11-28
Applicant: IBM
Inventor: SEUL MATTHIAS
Abstract: Disclosed is a method of providing additional information to a visual interface element of a graphical user interface in an operating system environment. An information container layer 20 is implemented running across all applications on top of a display area, a context 150, 160, 170 defining a predefined state of the operating system environment is configured and assigned to a visual interface element based on collected information or status information in the operating system environment. The context is considered active, if the operating system environment is in the predefined state, otherwise the context is considered inactive. To display the additional information to the visual interface element on the information container layer a background service process 100 is started that, determines for each of the visual interface elements of the graphical user interface if a configured context is assigned, if a configured context is assigned, collect and store information across all applications from the information or status source 120, 130, 140 related to the assigned context, evaluating the collected information to determine a state of the at least one assigned context, generating and placing a corresponding information container 22 on the information container layer in a way, that it is visible at a relative position to the corresponding visual interface element of the graphical user interface on the display area, if the state of the assigned context changes or remains for a certain amount of time.
-
-
-
-
-
-
-
-
-