SYSTEM AND USER CONTEXT IN ENTERPRISE THREAT DETECTION
First Claim
Patent Images
1. A computer-implemented method, comprising:
- executing a transfer of master data in a backend computing system, wherein the master data includes user data and system data, and wherein the transfer of master data comprises;
receiving user data associated with a particular user id in the backend computing system;
transferring the received user data to an event stream processor (ESP);
receiving system data associated with a particular log providing computing system in the backend computing system;
transferring the received user data to the ESP; and
executing a transfer of log data associated with logs of computing systems connected to the backend computing system.
1 Assignment
0 Petitions
Accused Products
Abstract
A transfer of master data is executed in a backend computing system. The master data includes user data and system data. The transfer of master data includes receiving user data associated with a particular user identifier in the backend computing system, transferring the received user data to an event stream processor, receiving system data associated with a particular log providing computing system in the backend computing system, transferring the received user data to the event stream processor, and executing a transfer of log data associated with logs of computing systems connected to the backend computing system.
-
Citations
20 Claims
-
1. A computer-implemented method, comprising:
-
executing a transfer of master data in a backend computing system, wherein the master data includes user data and system data, and wherein the transfer of master data comprises; receiving user data associated with a particular user id in the backend computing system; transferring the received user data to an event stream processor (ESP); receiving system data associated with a particular log providing computing system in the backend computing system; transferring the received user data to the ESP; and executing a transfer of log data associated with logs of computing systems connected to the backend computing system. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A non-transitory, computer-readable medium storing computer-readable instructions, the instructions executable by a computer and configured to:
-
execute a transfer of master data in a backend computing system, wherein the master data includes user data and system data, and wherein the transfer of master data comprises; receive user data associated with a particular user id in the backend computing system; transfer the received user data to an event stream processor (ESP); receive system data associated with a particular log providing computing system in the backend computing system; transfer the received user data to the ESP; and execute a transfer of log data associated with logs of computing systems connected to the backend computing system. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A system, comprising:
-
a memory; at least one hardware processor interoperably coupled with the memory and configured to; execute a transfer of master data in a backend computing system, wherein the master data includes user data and system data, and wherein the transfer of master data comprises; receive user data associated with a particular user id in the backend computing system; transfer the received user data to an event stream processor (ESP); receive system data associated with a particular log providing computing system in the backend computing system; transfer the received user data to the ESP; and execute a transfer of log data associated with logs of computing systems connected to the backend computing system. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification