Dynamic scriptable routing
    3.
    发明专利

    公开(公告)号:GB2557440A

    公开(公告)日:2018-06-20

    申请号:GB201717510

    申请日:2017-10-25

    Applicant: IBM

    Abstract: Dynamically altering routing decisions of IP packets 410 being sent through a network comprising extending the packet to add a routing script, wherein routing requirements and decisions of a client are stored in the routing script (smart packet payload 422), and at a network node, extracting and executing the routing script to obtain script results, changing a routing decision based on the script results and delivering the extended packet to a destination based on the changed routing decision. The routing decision making is shifted from the intermediate routing devices to the sender side of the network communication in order to exceed limitations of existing routing protocols by expressing certain conditions and actions in a smart packet 420, enabling routing decisions to be made at compatible smart routers on the path of the packet. The invention may be implemented to coexist with other existing routing protocols or may completely replace them.

    Automated management of confidential data in cloud environments

    公开(公告)号:GB2533098A

    公开(公告)日:2016-06-15

    申请号:GB201421826

    申请日:2014-12-09

    Applicant: IBM

    Abstract: Storing data in a Cloud environment where the Cloud environment comprises a security layer. The method comprises physically separating the Cloud storage from a key vault system 102, and receiving a storage request together with a confidentiality rating 104, wherein the storage request together with data and the confidentiality rating is received via the Cloud storage access interface by the security layer. The method further comprises encrypting the data to be stored and the confidentiality rating on request of the security layer by the key vault system into a data container 106. The Cloud storage is categorised into Cloud zones, wherein each Cloud zone is assigned a trust level 108 and data container is stored in one of the Cloud zones of the Cloud storage such that the trust level of the one of the Cloud zones corresponds to the data confidentiality rating 110. Cloud zone may denote an area in which storage systems may be physically or logically located.

    Encrypted knowledge graph
    6.
    发明专利

    公开(公告)号:GB2599043A

    公开(公告)日:2022-03-23

    申请号:GB202117672

    申请日:2020-07-23

    Applicant: IBM

    Abstract: A computer-implemented method for managing access rights to a knowledge graph is provided. The method comprises splitting, for each user system, its respective portion of the knowledge graph into a plurality of knowledge subgraphs, encrypting each of the knowledge subgraphs, and generating a plurality of private summary graphs. The method also comprises maintaining a collaboration graph comprising one vertex per user system and edges representing collaborations between the users, mapping all private subgraphs of all user systems to one public summary graph, each vertex of the public summary graph comprises less data than the related vertex of the related private summary graphs and wherein none of the vertices of the summary graph comprises any encryption or decryption key, and granting access to a selected knowledge subgraph from a first user system to a second user system.

    Automated management of confidential data in cloud environments

    公开(公告)号:GB2533098B

    公开(公告)日:2016-12-14

    申请号:GB201421826

    申请日:2014-12-09

    Applicant: IBM

    Abstract: A shared networked storage may be separated from a key vault system. A storage request with data to be stored and the storage request with a confidentiality rating may be received. The confidentiality rating may indicate a level of confidentiality the data is associated with. The storage request with the data and the confidentiality rating may be received via a shared networked storage access interface by a security layer. The data to be stored by the key vault system and the confidentiality rating may be encrypted on request of the security layer and into a data container. The shared networked storage may be categorized into Cloud zones. Each Cloud zone may be assigned a trust level. The data container may be stored in one of the Cloud zones of the shared networked storage. The trust level of the one of the Cloud zones may correspond to the confidentiality rating.

    Secure smart containers for controlling access to data

    公开(公告)号:GB2603593A

    公开(公告)日:2022-08-10

    申请号:GB202117000

    申请日:2021-11-25

    Applicant: IBM

    Abstract: Instantiating a data container from an image file exposes a virtual file system and files to the user. The invention provides secure smart containers that store data and control access to the data thus accounting for security threats that arise when an unauthorised user gains access or an authorised user begins to perform illegitimate actions. Protection is extended at the initial point of access and the entire time a user accesses the data. A secure container that is based on an image file is instantiated at an endpoint device of a user, wherein the secure container includes encrypted data corresponding to the user. An access request to the secure container is authenticated by verifying credentials of the user. If access to the data is granted, access is controlled by decrypting and enabling access to certain portions of the data. If an unauthorised access event is detected and a risk threshold exceeded, further access to data may be prevented. The data may be encrypted such that different users can access different portions of the data using unique passwords or keys. Different levels of access may be defined.

    System and method for SIEM rule sorting and conditional execution

    公开(公告)号:GB2598214A

    公开(公告)日:2022-02-23

    申请号:GB202111756

    申请日:2020-04-28

    Applicant: IBM

    Abstract: A method for processing security events by applying a rule-based alarm scheme may be provided. The method includes generating a rule index of rules and an indicator of compromise index for each of the rules. The method includes also processing the incomingsecurity event by applying the rules, increasing a current rule counter relating to a triggered rule, and increasing a current indicator of compromise counter pertaining to the triggered rule. Furthermore, the method includes generating a pseudo security event from received data about known attacks and related indicators of compromise, processing the pseudo security events by sequentially applying the rules, increasing a current rule counter of pseudo security events, and increasing a current indicator of compromise counter for pseudo security events, and sorting the rules and sorting within each rule the indicator of compromise values in the indicator of compromise index.

Patent Agency Ranking