Please download the dossier by clicking on the dossier button x
×

Testing cloud application integrations, data, and protocols

  • US 10,713,365 B2
  • Filed: 09/28/2018
  • Issued: 07/14/2020
  • Est. Priority Date: 09/28/2017
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method comprising, at a computer system of a security management system:

  • obtaining activity data from a service provider system, wherein the activity data includes a list of actions performed during use of a cloud service, wherein actions in the list of actions are performed by one or more users associated with a tenant, wherein the service provider system provides the tenant with a tenant account, and wherein the tenant account enables the one or more users to use the cloud service;

    parsing an action from the list of actions to determine a list of fields included in the action;

    identifying a field from the list of fields, wherein an identity of the field describes data included in the field;

    generating a template for the action, the template including a data structure storing the identity of the field, wherein the template further includes a data structure describing a format of the action;

    generating a configuration associated with a test scenario, the configuration including a reference to the template and a description of an action associated with the test scenario;

    generating a simulated action for the action described in the configuration, wherein generating the simulated action includes using the template to determine fields for the action and an output structure for the action, and wherein generating the simulated action includes using a test description to select values for the fields;

    generating simulated activity data that includes the simulated action, wherein the simulated activity data has a same format as the activity data; and

    inputting the simulated activity data into the security management system, wherein the security management system operates on the simulated activity data to determine whether actions included in the simulated activity data include use of the cloud service that constitutes a security risk, and wherein the simulated action causes the security management system to perform a particular operation, wherein the particular operation is associated with the test scenario.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×