System for isolated access and analysis of suspicious code in a disposable computing environment

    公开(公告)号:US11636203B2

    公开(公告)日:2023-04-25

    申请号:US16907994

    申请日:2020-06-22

    Abstract: Providing an isolation system that allows analysts to analyze suspicious information in a way that aids in preventing harmful information from spreading to other applications and systems on a network. A plurality of virtual containers may be used by analysts to analyze suspicious information. The analyst may set the virtual environment configurations (e.g., applications, programs, settings, etc.) of the virtual container. The analyst may determine how the suspicious information effects the virtual environment configuration and/or use tools to analyze the suspicious information. When harmful information is identified the virtual container may be discarded (e.g., folded up and deleted), and a new virtual container may be provided to the analyst to continue to analyze the suspicious information and/or new suspicious information.

    Application interface based system for isolated access and analysis of suspicious code in a computing environment

    公开(公告)号:US11880461B2

    公开(公告)日:2024-01-23

    申请号:US16907995

    申请日:2020-06-22

    CPC classification number: G06F21/566 G06F9/547 G06F21/552 G06F2221/2149

    Abstract: Providing an isolation system that allows analysts to analyze suspicious information in way that aids in preventing harmful information from spreading to other applications and systems on a network. A plurality of virtual containers may be used by analysts to analyze the suspicious information. The analyst may utilize a non-native application to analyze the suspicious information within the virtual container. The non-native application may be used to analyze the suspicious information in an analysis format instead of an original format for which the suspicious information, and any harmful information therein, were intended to be accessed. Additionally, the virtual containers may be accessed through the use of an API that allows an analyst to analyze the suspicious information in the virtual container without transferring information from the virtual container back to the analyst user computer system.

    System for isolated access and analysis of suspicious code in a computing environment

    公开(公告)号:US11797669B2

    公开(公告)日:2023-10-24

    申请号:US16907993

    申请日:2020-06-22

    CPC classification number: G06F21/554 G06F9/455 G06F21/53 G06F2221/033

    Abstract: Providing an isolation system that allows analysts to analyze suspicious information in way that aids in preventing any harmful information from spreading to other applications and systems on a network. The isolation systems are physically and/or logically separated from other systems on the network. A plurality of virtual containers, which may be disposable and specific to each analyst, may be utilized to analyze the suspicious information within the isolation systems. Should a virtual container be infected with harmful information it may be discarded a new virtual container may be used to review the suspicious information. A non-native application may be used to transform the format of the suspicious information into a non-native format in order to aid preventing the harmful information from infecting the other systems on the network.

    APPLICATION INTERFACE BASED SYSTEM FOR ISOLATED ACCESS AND ANALYSIS OF SUSPICIOUS CODE IN A COMPUTING ENVIRONMENT

    公开(公告)号:US20210397706A1

    公开(公告)日:2021-12-23

    申请号:US16907995

    申请日:2020-06-22

    Abstract: Providing an isolation system that allows analysts to analyze suspicious information in way that aids in preventing harmful information from spreading to other applications and systems on a network. A plurality of virtual containers may be used by analysts to analyze the suspicious information. The analyst may utilize a non-native application to analyze the suspicious information within the virtual container. The non-native application may be used to analyze the suspicious information in an analysis format instead of an original format for which the suspicious information, and any harmful information therein, were intended to be accessed. Additionally, the virtual containers may be accessed through the use of an API that allows an analyst to analyze the suspicious information in the virtual container without transferring information from the virtual container back to the analyst user computer system.

    SYSTEM FOR ISOLATED ACCESS AND ANALYSIS OF SUSPICIOUS CODE IN A DISPOSABLE COMPUTING ENVIRONMENT

    公开(公告)号:US20210397704A1

    公开(公告)日:2021-12-23

    申请号:US16907994

    申请日:2020-06-22

    Abstract: Providing an isolation system that allows analysts to analyze suspicious information in a way that aids in preventing harmful information from spreading to other applications and systems on a network. A plurality of virtual containers may be used by analysts to analyze suspicious information. The analyst may set the virtual environment configurations (e.g., applications, programs, settings, etc.) of the virtual container. The analyst may determine how the suspicious information effects the virtual environment configuration and/or use tools to analyze the suspicious information. When harmful information is identified the virtual container may be discarded (e.g., folded up and deleted), and a new virtual container may be provided to the analyst to continue to analyze the suspicious information and/or new suspicious information.

    SYSTEM FOR ISOLATED ACCESS AND ANALYSIS OF SUSPICIOUS CODE IN A COMPUTING ENVIRONMENT

    公开(公告)号:US20210397703A1

    公开(公告)日:2021-12-23

    申请号:US16907993

    申请日:2020-06-22

    Abstract: Providing an isolation system that allows analysts to analyze suspicious information in way that aids in preventing any harmful information from spreading to other applications and systems on a network. The isolation systems are physically and/or logically separated from other systems on the network. A plurality of virtual containers, which may be disposable and specific to each analyst, may be utilized to analyze the suspicious information within the isolation systems. Should a virtual container be infected with harmful information it may be discarded a new virtual container may be used to review the suspicious information. A non-native application may be used to transform the format of the suspicious information into a non-native format in order to aid preventing the harmful information from infecting the other systems on the network.

Patent Agency Ranking