-
公开(公告)号:IL295240B2
公开(公告)日:2025-03-01
申请号:IL29524022
申请日:2022-07-31
Applicant: IBM , MATTHIAS SEUL , ALEXANDR PAVLOVICH KORCHEMNIY
Inventor: MATTHIAS SEUL , ALEXANDR PAVLOVICH KORCHEMNIY
IPC: H04L67/06 , H04L67/1097 , H04L67/561 , H04L67/5681
Abstract: A computer system with access to remote files stored on a remote system can predict that a portion of a remote file is likely to be necessary. The computer system may download the portion of the remote file to a local file and update metadata of the local file to reflect the downloaded portion.
-
公开(公告)号:GB2608767A
公开(公告)日:2023-01-11
申请号:GB202215195
申请日:2021-03-11
Applicant: IBM
Inventor: MATTHIAS SEUL , ALEXANDR PAVLOVICH KORCHEMNIY
IPC: H04L67/5681 , H04L67/06 , H04L67/1097
Abstract: A computer system with access to remote files stored on a remote system can predict that a portion of a remote file is likely to be necessary. The computer system may download the portion of the remote file to a local file and update metadata of the local file to reflect the downloaded portion.
-
公开(公告)号:GB2557440A
公开(公告)日:2018-06-20
申请号:GB201717510
申请日:2017-10-25
Applicant: IBM
Inventor: MATTHIAS SEUL , ARTEMIY ALEKSANDROVICH SOLYAKOV , CLAUDIUS LINK
Abstract: Dynamically altering routing decisions of IP packets 410 being sent through a network comprising extending the packet to add a routing script, wherein routing requirements and decisions of a client are stored in the routing script (smart packet payload 422), and at a network node, extracting and executing the routing script to obtain script results, changing a routing decision based on the script results and delivering the extended packet to a destination based on the changed routing decision. The routing decision making is shifted from the intermediate routing devices to the sender side of the network communication in order to exceed limitations of existing routing protocols by expressing certain conditions and actions in a smart packet 420, enabling routing decisions to be made at compatible smart routers on the path of the packet. The invention may be implemented to coexist with other existing routing protocols or may completely replace them.
-
公开(公告)号:GB2533098A
公开(公告)日:2016-06-15
申请号:GB201421826
申请日:2014-12-09
Applicant: IBM
Inventor: ERIK RUEGER , THORSTEN MUEHGE , MARCUS BREUER , MATTHIAS SEUL , ITZHACK GOLDBERG
IPC: G06F21/62
Abstract: Storing data in a Cloud environment where the Cloud environment comprises a security layer. The method comprises physically separating the Cloud storage from a key vault system 102, and receiving a storage request together with a confidentiality rating 104, wherein the storage request together with data and the confidentiality rating is received via the Cloud storage access interface by the security layer. The method further comprises encrypting the data to be stored and the confidentiality rating on request of the security layer by the key vault system into a data container 106. The Cloud storage is categorised into Cloud zones, wherein each Cloud zone is assigned a trust level 108 and data container is stored in one of the Cloud zones of the Cloud storage such that the trust level of the one of the Cloud zones corresponds to the data confidentiality rating 110. Cloud zone may denote an area in which storage systems may be physically or logically located.
-
公开(公告)号:IL295240A
公开(公告)日:2022-10-01
申请号:IL29524022
申请日:2022-07-31
Applicant: IBM , MATTHIAS SEUL , ALEXANDR PAVLOVICH KORCHEMNIY
Inventor: MATTHIAS SEUL , ALEXANDR PAVLOVICH KORCHEMNIY
IPC: H04L67/06 , H04L67/1097 , H04L67/561 , H04L67/5681
Abstract: A computer system with access to remote files stored on a remote system can predict that a portion of a remote file is likely to be necessary. The computer system may download the portion of the remote file to a local file and update metadata of the local file to reflect the downloaded portion.
-
公开(公告)号:GB2599043A
公开(公告)日:2022-03-23
申请号:GB202117672
申请日:2020-07-23
Applicant: IBM
Inventor: TIM SCHEIDELER , ARJUN RAGHAVENDRA , MATTHIAS SEUL
IPC: G06F16/13
Abstract: A computer-implemented method for managing access rights to a knowledge graph is provided. The method comprises splitting, for each user system, its respective portion of the knowledge graph into a plurality of knowledge subgraphs, encrypting each of the knowledge subgraphs, and generating a plurality of private summary graphs. The method also comprises maintaining a collaboration graph comprising one vertex per user system and edges representing collaborations between the users, mapping all private subgraphs of all user systems to one public summary graph, each vertex of the public summary graph comprises less data than the related vertex of the related private summary graphs and wherein none of the vertices of the summary graph comprises any encryption or decryption key, and granting access to a selected knowledge subgraph from a first user system to a second user system.
-
公开(公告)号:GB2533098B
公开(公告)日:2016-12-14
申请号:GB201421826
申请日:2014-12-09
Applicant: IBM
Inventor: ERIK RUEGER , THORSTEN MUEHGE , MARCUS BREUER , MATTHIAS SEUL , ITZHACK GOLDBERG
IPC: G06F21/62
Abstract: A shared networked storage may be separated from a key vault system. A storage request with data to be stored and the storage request with a confidentiality rating may be received. The confidentiality rating may indicate a level of confidentiality the data is associated with. The storage request with the data and the confidentiality rating may be received via a shared networked storage access interface by a security layer. The data to be stored by the key vault system and the confidentiality rating may be encrypted on request of the security layer and into a data container. The shared networked storage may be categorized into Cloud zones. Each Cloud zone may be assigned a trust level. The data container may be stored in one of the Cloud zones of the shared networked storage. The trust level of the one of the Cloud zones may correspond to the confidentiality rating.
-
公开(公告)号:GB2603593A
公开(公告)日:2022-08-10
申请号:GB202117000
申请日:2021-11-25
Applicant: IBM
Abstract: Instantiating a data container from an image file exposes a virtual file system and files to the user. The invention provides secure smart containers that store data and control access to the data thus accounting for security threats that arise when an unauthorised user gains access or an authorised user begins to perform illegitimate actions. Protection is extended at the initial point of access and the entire time a user accesses the data. A secure container that is based on an image file is instantiated at an endpoint device of a user, wherein the secure container includes encrypted data corresponding to the user. An access request to the secure container is authenticated by verifying credentials of the user. If access to the data is granted, access is controlled by decrypting and enabling access to certain portions of the data. If an unauthorised access event is detected and a risk threshold exceeded, further access to data may be prevented. The data may be encrypted such that different users can access different portions of the data using unique passwords or keys. Different levels of access may be defined.
-
公开(公告)号:GB2598214A
公开(公告)日:2022-02-23
申请号:GB202111756
申请日:2020-04-28
Applicant: IBM
Inventor: TIM SCHEIDELER , RAGHAVENDRA ARJUN UDUPI , IVAN JAMES REEDMAN , MATTHIAS SEUL
IPC: H04L9/00
Abstract: A method for processing security events by applying a rule-based alarm scheme may be provided. The method includes generating a rule index of rules and an indicator of compromise index for each of the rules. The method includes also processing the incomingsecurity event by applying the rules, increasing a current rule counter relating to a triggered rule, and increasing a current indicator of compromise counter pertaining to the triggered rule. Furthermore, the method includes generating a pseudo security event from received data about known attacks and related indicators of compromise, processing the pseudo security events by sequentially applying the rules, increasing a current rule counter of pseudo security events, and increasing a current indicator of compromise counter for pseudo security events, and sorting the rules and sorting within each rule the indicator of compromise values in the indicator of compromise index.
-
-
-
-
-
-
-
-