Closed loop monitoring based privileged access control

In some examples, closed loop monitoring based privileged access control may include identifying a ticket that includes a specification of an incident that is to be remedied and determining an intent of the ticket. A privileged access command library may be analyzed to determine a plurality of privi...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Choudhury, Sayon Roy, Kulshrestha, Chetan, Renuse, Anil Vilas, Shukla, Sanjeev, Tandon, Gaurav, Ploehn, Catherine Marie-Luise, Panda, Alok
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Choudhury, Sayon Roy
Kulshrestha, Chetan
Renuse, Anil Vilas
Shukla, Sanjeev
Tandon, Gaurav
Ploehn, Catherine Marie-Luise
Panda, Alok
description In some examples, closed loop monitoring based privileged access control may include identifying a ticket that includes a specification of an incident that is to be remedied and determining an intent of the ticket. A privileged access command library may be analyzed to determine a plurality of privileged access steps that can be performed to remedy the incident. A source file associated with procedures that were performed to remedy the incident may be analyzed. A plurality of events may be identified using the source file and filtered based on the plurality of privileged access steps that can be performed to remedy the incident. At least one event that includes at least one other privileged access step that is not one of the plurality of privileged access steps that can be performed to remedy the incident may be identified, and instructions may be generated to remedy the identified event.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US11368377B2</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US11368377B2</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US11368377B23</originalsourceid><addsrcrecordid>eNrjZDBzzskvTk1RyMnPL1DIzc_LLMkvysxLV0hKBIkWFGWWZeakpgOZicnJqcXFCsn5eSVF-Tk8DKxpiTnFqbxQmptB0c01xNlDN7UgPz61uCAxOTUvtSQ-NNjQ0NjMwtjc3MnImBg1AMIBLhA</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Closed loop monitoring based privileged access control</title><source>esp@cenet</source><creator>Choudhury, Sayon Roy ; Kulshrestha, Chetan ; Renuse, Anil Vilas ; Shukla, Sanjeev ; Tandon, Gaurav ; Ploehn, Catherine Marie-Luise ; Panda, Alok</creator><creatorcontrib>Choudhury, Sayon Roy ; Kulshrestha, Chetan ; Renuse, Anil Vilas ; Shukla, Sanjeev ; Tandon, Gaurav ; Ploehn, Catherine Marie-Luise ; Panda, Alok</creatorcontrib><description>In some examples, closed loop monitoring based privileged access control may include identifying a ticket that includes a specification of an incident that is to be remedied and determining an intent of the ticket. A privileged access command library may be analyzed to determine a plurality of privileged access steps that can be performed to remedy the incident. A source file associated with procedures that were performed to remedy the incident may be analyzed. A plurality of events may be identified using the source file and filtered based on the plurality of privileged access steps that can be performed to remedy the incident. At least one event that includes at least one other privileged access step that is not one of the plurality of privileged access steps that can be performed to remedy the incident may be identified, and instructions may be generated to remedy the identified event.</description><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRIC DIGITAL DATA PROCESSING ; ELECTRICITY ; PHYSICS ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2022</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20220621&amp;DB=EPODOC&amp;CC=US&amp;NR=11368377B2$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20220621&amp;DB=EPODOC&amp;CC=US&amp;NR=11368377B2$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Choudhury, Sayon Roy</creatorcontrib><creatorcontrib>Kulshrestha, Chetan</creatorcontrib><creatorcontrib>Renuse, Anil Vilas</creatorcontrib><creatorcontrib>Shukla, Sanjeev</creatorcontrib><creatorcontrib>Tandon, Gaurav</creatorcontrib><creatorcontrib>Ploehn, Catherine Marie-Luise</creatorcontrib><creatorcontrib>Panda, Alok</creatorcontrib><title>Closed loop monitoring based privileged access control</title><description>In some examples, closed loop monitoring based privileged access control may include identifying a ticket that includes a specification of an incident that is to be remedied and determining an intent of the ticket. A privileged access command library may be analyzed to determine a plurality of privileged access steps that can be performed to remedy the incident. A source file associated with procedures that were performed to remedy the incident may be analyzed. A plurality of events may be identified using the source file and filtered based on the plurality of privileged access steps that can be performed to remedy the incident. At least one event that includes at least one other privileged access step that is not one of the plurality of privileged access steps that can be performed to remedy the incident may be identified, and instructions may be generated to remedy the identified event.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>ELECTRICITY</subject><subject>PHYSICS</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2022</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZDBzzskvTk1RyMnPL1DIzc_LLMkvysxLV0hKBIkWFGWWZeakpgOZicnJqcXFCsn5eSVF-Tk8DKxpiTnFqbxQmptB0c01xNlDN7UgPz61uCAxOTUvtSQ-NNjQ0NjMwtjc3MnImBg1AMIBLhA</recordid><startdate>20220621</startdate><enddate>20220621</enddate><creator>Choudhury, Sayon Roy</creator><creator>Kulshrestha, Chetan</creator><creator>Renuse, Anil Vilas</creator><creator>Shukla, Sanjeev</creator><creator>Tandon, Gaurav</creator><creator>Ploehn, Catherine Marie-Luise</creator><creator>Panda, Alok</creator><scope>EVB</scope></search><sort><creationdate>20220621</creationdate><title>Closed loop monitoring based privileged access control</title><author>Choudhury, Sayon Roy ; Kulshrestha, Chetan ; Renuse, Anil Vilas ; Shukla, Sanjeev ; Tandon, Gaurav ; Ploehn, Catherine Marie-Luise ; Panda, Alok</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US11368377B23</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2022</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>ELECTRICITY</topic><topic>PHYSICS</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>Choudhury, Sayon Roy</creatorcontrib><creatorcontrib>Kulshrestha, Chetan</creatorcontrib><creatorcontrib>Renuse, Anil Vilas</creatorcontrib><creatorcontrib>Shukla, Sanjeev</creatorcontrib><creatorcontrib>Tandon, Gaurav</creatorcontrib><creatorcontrib>Ploehn, Catherine Marie-Luise</creatorcontrib><creatorcontrib>Panda, Alok</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Choudhury, Sayon Roy</au><au>Kulshrestha, Chetan</au><au>Renuse, Anil Vilas</au><au>Shukla, Sanjeev</au><au>Tandon, Gaurav</au><au>Ploehn, Catherine Marie-Luise</au><au>Panda, Alok</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Closed loop monitoring based privileged access control</title><date>2022-06-21</date><risdate>2022</risdate><abstract>In some examples, closed loop monitoring based privileged access control may include identifying a ticket that includes a specification of an incident that is to be remedied and determining an intent of the ticket. A privileged access command library may be analyzed to determine a plurality of privileged access steps that can be performed to remedy the incident. A source file associated with procedures that were performed to remedy the incident may be analyzed. A plurality of events may be identified using the source file and filtered based on the plurality of privileged access steps that can be performed to remedy the incident. At least one event that includes at least one other privileged access step that is not one of the plurality of privileged access steps that can be performed to remedy the incident may be identified, and instructions may be generated to remedy the identified event.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_epo_espacenet_US11368377B2
source esp@cenet
subjects CALCULATING
COMPUTING
COUNTING
ELECTRIC COMMUNICATION TECHNIQUE
ELECTRIC DIGITAL DATA PROCESSING
ELECTRICITY
PHYSICS
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
title Closed loop monitoring based privileged access control
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-05T15%3A59%3A13IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Choudhury,%20Sayon%20Roy&rft.date=2022-06-21&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS11368377B2%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true