Detecting ransomware in secondary copies of client computing devices

An information management system includes one or more client computing devices in communication with a storage manager and a secondary storage computing device. The storage manager manages the primary data of the one or more client computing devices and the secondary storage computing device manages...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Gadhave, Pratima Laxman, dos Reis Mansano, Marcelo, Upadhyay, Mrityunjay, Bhagi, Sri Karthik, Bedhapudi, PurnaChandra Sekhar, Ramkumar, Shyam Sundar
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Gadhave, Pratima Laxman
dos Reis Mansano, Marcelo
Upadhyay, Mrityunjay
Bhagi, Sri Karthik
Bedhapudi, PurnaChandra Sekhar
Ramkumar, Shyam Sundar
description An information management system includes one or more client computing devices in communication with a storage manager and a secondary storage computing device. The storage manager manages the primary data of the one or more client computing devices and the secondary storage computing device manages secondary copies of the primary data of the one or more client computing devices. Each client computing device may be configured with a ransomware protection monitoring application that monitors for changes in their primary data. The ransomware protection monitoring application may input the changes detected in the primary data into a machine-learning classifier, where the classifier generates an output indicative of whether a client computing device has been affected by malware and/or ransomware. Using a virtual machine host, a virtual machine copy of an affected client computing device may be instantiated using a secondary copy of primary data of the affected client computing device.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US12026252B2</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US12026252B2</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US12026252B23</originalsourceid><addsrcrecordid>eNrjZHBxSS1JTS7JzEtXKErMK87PLU8sSlXIzFMoTk3Oz0tJLKpUSM4vyEwtVshPU0jOyUzNKwEK5BaUgrWkpJZlJqcW8zCwpiXmFKfyQmluBkU31xBnD93Ugvz41OKCxOTUvNSS-NBgQyMDIzMjUyMnI2Ni1AAA6OgzTA</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Detecting ransomware in secondary copies of client computing devices</title><source>esp@cenet</source><creator>Gadhave, Pratima Laxman ; dos Reis Mansano, Marcelo ; Upadhyay, Mrityunjay ; Bhagi, Sri Karthik ; Bedhapudi, PurnaChandra Sekhar ; Ramkumar, Shyam Sundar</creator><creatorcontrib>Gadhave, Pratima Laxman ; dos Reis Mansano, Marcelo ; Upadhyay, Mrityunjay ; Bhagi, Sri Karthik ; Bedhapudi, PurnaChandra Sekhar ; Ramkumar, Shyam Sundar</creatorcontrib><description>An information management system includes one or more client computing devices in communication with a storage manager and a secondary storage computing device. The storage manager manages the primary data of the one or more client computing devices and the secondary storage computing device manages secondary copies of the primary data of the one or more client computing devices. Each client computing device may be configured with a ransomware protection monitoring application that monitors for changes in their primary data. The ransomware protection monitoring application may input the changes detected in the primary data into a machine-learning classifier, where the classifier generates an output indicative of whether a client computing device has been affected by malware and/or ransomware. Using a virtual machine host, a virtual machine copy of an affected client computing device may be instantiated using a secondary copy of primary data of the affected client computing device.</description><language>eng</language><subject>CALCULATING ; COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS ; COMPUTING ; COUNTING ; ELECTRIC DIGITAL DATA PROCESSING ; PHYSICS</subject><creationdate>2024</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20240702&amp;DB=EPODOC&amp;CC=US&amp;NR=12026252B2$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25562,76317</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20240702&amp;DB=EPODOC&amp;CC=US&amp;NR=12026252B2$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Gadhave, Pratima Laxman</creatorcontrib><creatorcontrib>dos Reis Mansano, Marcelo</creatorcontrib><creatorcontrib>Upadhyay, Mrityunjay</creatorcontrib><creatorcontrib>Bhagi, Sri Karthik</creatorcontrib><creatorcontrib>Bedhapudi, PurnaChandra Sekhar</creatorcontrib><creatorcontrib>Ramkumar, Shyam Sundar</creatorcontrib><title>Detecting ransomware in secondary copies of client computing devices</title><description>An information management system includes one or more client computing devices in communication with a storage manager and a secondary storage computing device. The storage manager manages the primary data of the one or more client computing devices and the secondary storage computing device manages secondary copies of the primary data of the one or more client computing devices. Each client computing device may be configured with a ransomware protection monitoring application that monitors for changes in their primary data. The ransomware protection monitoring application may input the changes detected in the primary data into a machine-learning classifier, where the classifier generates an output indicative of whether a client computing device has been affected by malware and/or ransomware. Using a virtual machine host, a virtual machine copy of an affected client computing device may be instantiated using a secondary copy of primary data of the affected client computing device.</description><subject>CALCULATING</subject><subject>COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>PHYSICS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2024</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZHBxSS1JTS7JzEtXKErMK87PLU8sSlXIzFMoTk3Oz0tJLKpUSM4vyEwtVshPU0jOyUzNKwEK5BaUgrWkpJZlJqcW8zCwpiXmFKfyQmluBkU31xBnD93Ugvz41OKCxOTUvNSS-NBgQyMDIzMjUyMnI2Ni1AAA6OgzTA</recordid><startdate>20240702</startdate><enddate>20240702</enddate><creator>Gadhave, Pratima Laxman</creator><creator>dos Reis Mansano, Marcelo</creator><creator>Upadhyay, Mrityunjay</creator><creator>Bhagi, Sri Karthik</creator><creator>Bedhapudi, PurnaChandra Sekhar</creator><creator>Ramkumar, Shyam Sundar</creator><scope>EVB</scope></search><sort><creationdate>20240702</creationdate><title>Detecting ransomware in secondary copies of client computing devices</title><author>Gadhave, Pratima Laxman ; dos Reis Mansano, Marcelo ; Upadhyay, Mrityunjay ; Bhagi, Sri Karthik ; Bedhapudi, PurnaChandra Sekhar ; Ramkumar, Shyam Sundar</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US12026252B23</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2024</creationdate><topic>CALCULATING</topic><topic>COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>PHYSICS</topic><toplevel>online_resources</toplevel><creatorcontrib>Gadhave, Pratima Laxman</creatorcontrib><creatorcontrib>dos Reis Mansano, Marcelo</creatorcontrib><creatorcontrib>Upadhyay, Mrityunjay</creatorcontrib><creatorcontrib>Bhagi, Sri Karthik</creatorcontrib><creatorcontrib>Bedhapudi, PurnaChandra Sekhar</creatorcontrib><creatorcontrib>Ramkumar, Shyam Sundar</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Gadhave, Pratima Laxman</au><au>dos Reis Mansano, Marcelo</au><au>Upadhyay, Mrityunjay</au><au>Bhagi, Sri Karthik</au><au>Bedhapudi, PurnaChandra Sekhar</au><au>Ramkumar, Shyam Sundar</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Detecting ransomware in secondary copies of client computing devices</title><date>2024-07-02</date><risdate>2024</risdate><abstract>An information management system includes one or more client computing devices in communication with a storage manager and a secondary storage computing device. The storage manager manages the primary data of the one or more client computing devices and the secondary storage computing device manages secondary copies of the primary data of the one or more client computing devices. Each client computing device may be configured with a ransomware protection monitoring application that monitors for changes in their primary data. The ransomware protection monitoring application may input the changes detected in the primary data into a machine-learning classifier, where the classifier generates an output indicative of whether a client computing device has been affected by malware and/or ransomware. Using a virtual machine host, a virtual machine copy of an affected client computing device may be instantiated using a secondary copy of primary data of the affected client computing device.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_epo_espacenet_US12026252B2
source esp@cenet
subjects CALCULATING
COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
COMPUTING
COUNTING
ELECTRIC DIGITAL DATA PROCESSING
PHYSICS
title Detecting ransomware in secondary copies of client computing devices
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-14T08%3A20%3A55IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Gadhave,%20Pratima%20Laxman&rft.date=2024-07-02&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS12026252B2%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true