Closed loop monitoring based privileged access control
In some examples, closed loop monitoring based privileged access control may include identifying a ticket that includes a specification of an incident that is to be remedied and determining an intent of the ticket. A privileged access command library may be analyzed to determine a plurality of privi...
Gespeichert in:
Hauptverfasser: | , , , , , , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | Choudhury, Sayon Roy Kulshrestha, Chetan Renuse, Anil Vilas Shukla, Sanjeev Tandon, Gaurav Ploehn, Catherine Marie-Luise Panda, Alok |
description | In some examples, closed loop monitoring based privileged access control may include identifying a ticket that includes a specification of an incident that is to be remedied and determining an intent of the ticket. A privileged access command library may be analyzed to determine a plurality of privileged access steps that can be performed to remedy the incident. A source file associated with procedures that were performed to remedy the incident may be analyzed. A plurality of events may be identified using the source file and filtered based on the plurality of privileged access steps that can be performed to remedy the incident. At least one event that includes at least one other privileged access step that is not one of the plurality of privileged access steps that can be performed to remedy the incident may be identified, and instructions may be generated to remedy the identified event. |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US11368377B2</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US11368377B2</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US11368377B23</originalsourceid><addsrcrecordid>eNrjZDBzzskvTk1RyMnPL1DIzc_LLMkvysxLV0hKBIkWFGWWZeakpgOZicnJqcXFCsn5eSVF-Tk8DKxpiTnFqbxQmptB0c01xNlDN7UgPz61uCAxOTUvtSQ-NNjQ0NjMwtjc3MnImBg1AMIBLhA</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Closed loop monitoring based privileged access control</title><source>esp@cenet</source><creator>Choudhury, Sayon Roy ; Kulshrestha, Chetan ; Renuse, Anil Vilas ; Shukla, Sanjeev ; Tandon, Gaurav ; Ploehn, Catherine Marie-Luise ; Panda, Alok</creator><creatorcontrib>Choudhury, Sayon Roy ; Kulshrestha, Chetan ; Renuse, Anil Vilas ; Shukla, Sanjeev ; Tandon, Gaurav ; Ploehn, Catherine Marie-Luise ; Panda, Alok</creatorcontrib><description>In some examples, closed loop monitoring based privileged access control may include identifying a ticket that includes a specification of an incident that is to be remedied and determining an intent of the ticket. A privileged access command library may be analyzed to determine a plurality of privileged access steps that can be performed to remedy the incident. A source file associated with procedures that were performed to remedy the incident may be analyzed. A plurality of events may be identified using the source file and filtered based on the plurality of privileged access steps that can be performed to remedy the incident. At least one event that includes at least one other privileged access step that is not one of the plurality of privileged access steps that can be performed to remedy the incident may be identified, and instructions may be generated to remedy the identified event.</description><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRIC DIGITAL DATA PROCESSING ; ELECTRICITY ; PHYSICS ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2022</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20220621&DB=EPODOC&CC=US&NR=11368377B2$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20220621&DB=EPODOC&CC=US&NR=11368377B2$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Choudhury, Sayon Roy</creatorcontrib><creatorcontrib>Kulshrestha, Chetan</creatorcontrib><creatorcontrib>Renuse, Anil Vilas</creatorcontrib><creatorcontrib>Shukla, Sanjeev</creatorcontrib><creatorcontrib>Tandon, Gaurav</creatorcontrib><creatorcontrib>Ploehn, Catherine Marie-Luise</creatorcontrib><creatorcontrib>Panda, Alok</creatorcontrib><title>Closed loop monitoring based privileged access control</title><description>In some examples, closed loop monitoring based privileged access control may include identifying a ticket that includes a specification of an incident that is to be remedied and determining an intent of the ticket. A privileged access command library may be analyzed to determine a plurality of privileged access steps that can be performed to remedy the incident. A source file associated with procedures that were performed to remedy the incident may be analyzed. A plurality of events may be identified using the source file and filtered based on the plurality of privileged access steps that can be performed to remedy the incident. At least one event that includes at least one other privileged access step that is not one of the plurality of privileged access steps that can be performed to remedy the incident may be identified, and instructions may be generated to remedy the identified event.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>ELECTRICITY</subject><subject>PHYSICS</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2022</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZDBzzskvTk1RyMnPL1DIzc_LLMkvysxLV0hKBIkWFGWWZeakpgOZicnJqcXFCsn5eSVF-Tk8DKxpiTnFqbxQmptB0c01xNlDN7UgPz61uCAxOTUvtSQ-NNjQ0NjMwtjc3MnImBg1AMIBLhA</recordid><startdate>20220621</startdate><enddate>20220621</enddate><creator>Choudhury, Sayon Roy</creator><creator>Kulshrestha, Chetan</creator><creator>Renuse, Anil Vilas</creator><creator>Shukla, Sanjeev</creator><creator>Tandon, Gaurav</creator><creator>Ploehn, Catherine Marie-Luise</creator><creator>Panda, Alok</creator><scope>EVB</scope></search><sort><creationdate>20220621</creationdate><title>Closed loop monitoring based privileged access control</title><author>Choudhury, Sayon Roy ; Kulshrestha, Chetan ; Renuse, Anil Vilas ; Shukla, Sanjeev ; Tandon, Gaurav ; Ploehn, Catherine Marie-Luise ; Panda, Alok</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US11368377B23</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2022</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>ELECTRICITY</topic><topic>PHYSICS</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>Choudhury, Sayon Roy</creatorcontrib><creatorcontrib>Kulshrestha, Chetan</creatorcontrib><creatorcontrib>Renuse, Anil Vilas</creatorcontrib><creatorcontrib>Shukla, Sanjeev</creatorcontrib><creatorcontrib>Tandon, Gaurav</creatorcontrib><creatorcontrib>Ploehn, Catherine Marie-Luise</creatorcontrib><creatorcontrib>Panda, Alok</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Choudhury, Sayon Roy</au><au>Kulshrestha, Chetan</au><au>Renuse, Anil Vilas</au><au>Shukla, Sanjeev</au><au>Tandon, Gaurav</au><au>Ploehn, Catherine Marie-Luise</au><au>Panda, Alok</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Closed loop monitoring based privileged access control</title><date>2022-06-21</date><risdate>2022</risdate><abstract>In some examples, closed loop monitoring based privileged access control may include identifying a ticket that includes a specification of an incident that is to be remedied and determining an intent of the ticket. A privileged access command library may be analyzed to determine a plurality of privileged access steps that can be performed to remedy the incident. A source file associated with procedures that were performed to remedy the incident may be analyzed. A plurality of events may be identified using the source file and filtered based on the plurality of privileged access steps that can be performed to remedy the incident. At least one event that includes at least one other privileged access step that is not one of the plurality of privileged access steps that can be performed to remedy the incident may be identified, and instructions may be generated to remedy the identified event.</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng |
recordid | cdi_epo_espacenet_US11368377B2 |
source | esp@cenet |
subjects | CALCULATING COMPUTING COUNTING ELECTRIC COMMUNICATION TECHNIQUE ELECTRIC DIGITAL DATA PROCESSING ELECTRICITY PHYSICS TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION |
title | Closed loop monitoring based privileged access control |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-05T15%3A59%3A13IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Choudhury,%20Sayon%20Roy&rft.date=2022-06-21&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS11368377B2%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |