throbber
Orca Security Ltd.
`Exhibit 2149
`Wiz v. Orca
`IPR2024-01109, -01190, -01191
`Ex. 2149-001
`
`

`

`Doc Code: TR.PROV
`Document Description: Provisional Cover Sheet (SB16)
`
`PTO/SB/16 (02-18)
`Approved for use through 11/30/2020. OMB 0651-0032
`U.S. Patent and Trademark Office: U.S. DEPARTMENT OF COMMERCE
`Under the Paperwork Reduction Act of 1995, no persons are required to respondto a collection of information unless it displays a valid OMB control number
`
`Entity Status
`Applicant asserts small entity status under 37 CFR 1.27 or applicant certifies micro entity status under 37 CFR 1.29
`
`@) Applicant asserts small entity status under 37 CFR 1.27
`
`C) Applicant certifies micro entity status under 37 CFR 1.29. Applicant must attach form PTO/SB/15A or B or equivalent.
`
`
`
`Warning
`
`Petitioner/applicant is cautioned to avoid submitting personal information in documentsfiled in a patent application that may
`contribute to identity theft. Personal information such as social security numbers, bank account numbers, or credit card
`numbers (other than a check or credit card authorization form PTO-2038 submitted for payment purposes) is never required
`by the USPTO to support a petition or an application.
`If this type of personal information is included in documents submitted
`to the USPTO, petitioners/applicants should consider redacting such personal information from the documents before
`submitting them to USPTO. Petitioner/applicant is advised that the record of a patent application is available to the public
`after publication of the application (unless a non-publication request in compliance with 37 CFR 1.213(a) is made in the
`application) or issuance of a patent. Furthermore, the record from an abandoned application may also be available to the
`public if the application is referenced in a published application or an issued patent (see 37 CFR1.14}. Checks and credit
`card authorization forms PTO-2038 submitted for payment purposes are not retained in the application file and therefore are
`not publicly available.
`
`Signature
`
`Please see 37 CFR 1.4(d} for the form of the signature.
`
`Signature Date (YYYY-MM-DD) pors-o12|01-28Michael Ben-Shimon/
`
`
`
`First Name fer-stimon|fer-stimon|Registration Number feo|(If appropriate}Last Name
`
`
`This collection of information is required by 37 CFR 1.51. The information is required to obtain or retain a benefit by the public which is to
`file (and by the USPTOto process) an application. Confidentiality is governed by 35 U.S.C. 122 and 37 CFR 1.11 and 1.14. This collection
`is estimated to take 8 hours to complete, including gathering, preparing, and submitting the completed application form to the USPTO.
`Time will vary depending upon the individual case. Any comments on the amountof time you require to complete this form and/or
`suggestions for reducing this burden, should be sent to the Chief Information Officer, U.S. Patent and Trademark Office, U.S. Department
`of Commerce, P.O. Box 1450, Alexandria, VA 22313-1450. DO NOT SEND FEES OR COMPLETED FORMSTO THIS ADDRESS. This
`form can only be used when in conjunction with EFS-Web. If this form is mailed to the USPTO, it may cause delays in handling
`the provisional application.
`
`EFS - Web 1.0.2
`
`Ex. 2149-002
`
`Ex. 2149-002
`
`

`

`Privacy Act Statement
`
`The Privacy Act of 1974 (P.L. 93-579) requires that you be given certain information in connection with your submission of
`the attached form related to a patent application or paten. Accordingly, pursuant to the requirements of the Act, please be
`advised that :
`(1) the general authority for the collection of this information is 35 U.S.C. 2(b)(2); (2) furnishing of the
`information solicited is voluntary; and (3) the principal purpose for which the information is used by the U_S_. Patent and
`Trademark Office is to process and/or examine your submission related to a patent application or patent.
`If you do not
`furnish the requested information, the U.S. Patent and Trademark Office may not be able to process and/or examine your
`submission, which may result in termination of proceedings or abandonmentof the application or expiration of the patent.
`
`The information provided by you in this form will be subject to the following routine uses:
`
`1.
`
`The information on this form will be treated confidentially to the extent allowed under the Freedom of Information
`Act (5 U.S.C. 552) and the Privacy Act (5 U.S.C 552a). Records from this system of records may be disclosed to the
`Departmentof Justice to determine whether disclosure of these records is required by the Freedom of Information
`Act.
`
`A record from this system of records may be disclosed, as a routine use, in the course of presenting evidence to
`a court, magistrate, or administrative tribunal, including disclosures to opposing counsel in the course of settlement
`negotiations.
`A record in this system of records may be disclosed, as a routine use, to a Member of Congress submitting a
`requestinvolving an individual, to whom the record pertains, when the individual has requested assistance from the
`Member with respect to the subject matter of the record.
`A record in this system of records may be disclosed, as a routine use, to a contractor of the Agency having need
`for the information in order to perform a contract. Recipients of information shall be required to comply with the
`requirements of the Privacy Act of 1974, as amended, pursuant to 5 U.S.C. 552a(m).
`A record related to an International Application filed under the Patent Cooperation Treaty in this system of
`records may be disclosed, as a routine use, to the International Bureau of the World Intellectual Property
`Organization, pursuant to the Patent Cooperation Treaty.
`Arecordin this system of records may be disclosed, as a routine use, to an other federal agency for purposes
`of National Security review (35 U.S.C. 181) and for review pursuant to the Atomic Energy Act (42 U.S.C. 218(c)).
`A record from this system of records may be disclosed, as a routine use, to the Administrator, General Services,
`or his/her designee, during an inspection of records conducted by GSA aspart of that agency's responsibility to
`recommend improvements in records managementpractices and programs, under authority of 44 U.S.C. 2904 and
`2906. Such disclosure shall be made in accordance with the GSA requlations governing inspection of records for this
`purpose, and any other relevant(i-e., GSA or Commerce) directive. Such disclosure shall not be used to make
`determinations aboutindividuals.
`
`A record from this system of records may be disclosed, as a routine use, to the public after either publication of
`the application pursuant to 35 U.S.C. 122(b) or issuance of a patent pursuant to 35 U_S_C_ 151. Further, a record
`may be disclosed, subject to the limitations of 37 CFR 1.14, as a routine use, to the public if the record wasfiled in an
`application which became abandonedor in which the proceedings were terminated and which application is
`referenced by either a published application, an application open to public inspection or an
`issued patent.
`A record from this system of records may be disclosed, as a routine use, to a Federal, State, or local law
`enforcement agency,if the USPTO becomes awareof a violation or potential violation of law or regulation.
`
`Ex. 2149-003
`
`Ex. 2149-003
`
`

`

`ORCA P1414P
`
`TECHNIQUES FOR SECURING VIRTUAL MACHINES
`
`TECHNICAL FIELD
`
`[001] This disclosure relates generally to cyber-security systems and, more specifically,
`
`to techniques for securing virtual machines.
`
`BACKGROUND
`
`[002] Organizations have increasingly adapted their applications to be run from multiple
`
`cloud computing platforms. Some leading public cloud service providers include
`
`Amazon®, Microsoft®, Google®, and thelike.
`
`[003] Virtualization is a key role in a cloud computing, allowing multiple applications and
`
`users to share the same cloud computing infrastructure. For example, a cloud storage
`
`service can maintain data of multiple different users.
`
`[004]
`
`In one instance, virtualization can be achieved by means ofvirtual machines. A
`
`virtual machine emulates a number of “computers” or instances, all within a single
`
`physical device. In more detail, virtual machines provide the ability to emulate a separate
`
`operating system (OS), also referred to as a guest OS, and therefore a separate
`
`computer, from an existing OS (the host). This independentinstanceis typically isolated
`
`as a completely standalone environment.
`
`[005] Modernvirtualization technologies are also adapted by cloud computing platforms.
`
`Examples for such technologies include virtual machines, software container and
`
`serverless functions. With their computing advantages, applications and virtual machines
`
`running on top of virtualization technologies are also vulnerable to some cyber threats.
`
`For example, virtual machines can execute vulnerable software applications or infected
`
`operating systems.
`
`[006] Protection of a cloud computing infrastructure, and particularly of virtual machines
`
`is can be achieved via inspection oftraffic. Traditionally, traffic inspection is performed by
`
`a network device connected between a client and a server (deployed in a cloud computing
`
`platform or a data center) hosing virtual machines. Traffic inspection may not provide an
`
`accurate indication on the security status of the server due to inherent limitations, such
`
`as encryption and whether the necessary data is exposed in the communication.
`
`Furthermore,
`
`inspecting computing infrastructure may be performed by a network
`
`Page 1 of 15
`
`Ex. 2149-004
`
`Ex. 2149-004
`
`

`

`ORCA P1414P
`
`scanner deployed out of path. The scanner queries the server to determine if the server
`
`executes an application that possess a security threat, such as vulnerability in it. The
`
`disadvantage of such a scanner is that the server may not respond to all queries by the
`
`scanner, or not expose the necessary data in the response. Further, the network scanner
`
`usually communicates with the server, and the network configuration may prevent it. In
`
`addition, some types of queries may require credentials to access the server. Such
`
`credentials may not be available to the scanner.
`
`[007] Traffic inspection may also be performedbya traffic monitor that listens to traffic
`
`flows between clients and the server. The traffic monitor can detect some cyber threats,
`
`€.g., based on the volume oftraffic. However, the monitor can detect threats only based
`
`the monitoredtraffic. For example, misconfiguration of the server may not be detected by
`
`the traffic monitor. As such, traffic monitoring would not allow to detect vulnerabilities in
`
`software executed by the server.
`
`[008] To overcome the limitations of traffic inspection solutions, some cyber-security
`
`solutions, such as vulnerability management and security assessment solutions are
`
`based on agents installed in each server in a cloud computing platform or data center.
`
`Using agents is cumbersome solution for a number of reasons, including IT resources
`
`management, governance, and performance. For example, installing agents in a large
`
`data center may take months.
`
`[009]
`
`It would therefore be advantageous to provide a security solution that would
`
`overcome the deficiencies noted above.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`[0010] The foregoing and other objects, features, and advantages of the disclosed
`
`embodiments will be apparent from the following detailed description taken in conjunction
`
`with the accompanying drawings.
`
`[0011] Figures 1 are network diagrams utilized to describe the various embodiments.
`
`[0012]Figure 2 is a flowchart
`
`illustrating a method detecting cyber threats including
`
`potential vulnerabilities in virtual machines executed in a cloud computing platform
`
`according to some embodiments.
`
`Page 2 of 15
`
`Ex. 2149-005
`
`Ex. 2149-005
`
`

`

`ORCA P1414P
`
`[0013] Figure 3 is an example block diagram of the security system according to an
`
`embodiment.
`
`DETAILED DESCRIPTION
`[0014]It is important to note that the embodiments disclosed herein are only examples of
`
`the many advantageous uses of the innovative teachings herein. In general, statements
`
`made in the specification of the present application do not necessarily limit any of the
`
`various claimed embodiments. Moreover, some statements may apply to some inventive
`
`features but not to others. In general, unless otherwise indicated, singular elements may
`
`be in plural and vice versa with no loss of generality. In the drawings, like numerals refer
`
`to like parts through several views.
`
`[0015] Figs. 1A and 1B show an example network diagram 100 utilized to describe the
`
`various embodiments. A cloud computing platform 110 is communicably connected to a
`
`network 120. Examples of the cloud computing platform 110 mayinclude, but are not
`
`limited to, AWS® by Amazon®, Azure® Microsoft Azure®, Google Cloud Google®, and
`
`the like. The network 120 maybe the Internet, the world-wide-web (WWW), a local area
`
`network (LAN), a wide area network (WAN), and other networks.
`
`[0016] The arrangement of the example cloud computing platform 110 is shown in
`
`Fig. 1B. Asillustrated, the platform 110 includes a server 115 and a storage 117, serving
`
`as the storage space for the server 115. The server 115 is a physical device hosting at
`
`least one virtual machine (VM) 119. The storage 117 emulates virtual discs for the VMs
`
`executedin by the server 115. The storage 117 is typically connected to the server 115
`
`through a high-speed connection, such as optic fiber allowing fast retrieval of data.
`
`In
`
`other configurations, the storage 117 may be part of the server 115.
`
`In this example
`
`illustrated in Fig. 1B, virtual disc 118-1 is allocated for the VM 119. The server 115, and
`
`hence the VM 119 may be executed in a client environment 130 within the platform 110.
`
`[0017] The client environment 130 is an environment within the cloud computing platform
`
`110 utilized to execute cloud-hosted applications of the client. A client may belong to a
`
`specific tenant. In some example embodiment, the client environment 130 maybe part of
`
`a virtualized environment or on-premises virtualization solutions, such as VMware®
`
`based solution.
`
`Page 3 of 15
`
`Ex. 2149-006
`
`Ex. 2149-006
`
`

`

`ORCA P1414P
`
`[0018]Also deployed in the cloud computing platform 110 is a security system 140
`
`configured to perform the various disclosed embodiments.
`
`In some embodiments, the
`
`system 140 may be part of the client environment 130.
`
`In an embodiment, the security
`
`system 140 may be realized as a physical machine configured to execute a plurality of
`
`virtual instances, such as, but notlimited to virtual machines. In yet another embodiment,
`
`the security system 140 maybe realized as a virtual machine executed by a host server.
`
`Such a host server is a physical machine (device) and may be either the server 115,
`
`dedicated server, a different shared server, or other virtualization-based compute entity,
`
`such as serverless functions.
`
`[0019]
`
`In an embodiment, the interface between the client environment 130 and the
`
`security system 140 can be realized using APls or services provided by the cloud
`
`computing platform 110. For example, in AWS, a cross account policy service can be
`
`utilized to allow interfacing the client environment 130 with the security system 140.
`
`[0020] In the deployment, illustrated in Fig. 1, the configuration of resources of the cloud
`
`computing platform 110 is performed by means of the management console 150. As such,
`
`the management console 150 may be queried on the current deployment and settings of
`
`resources in the cloud computing platform 110. Specifically, the management console
`
`150 may be queried, by the security system 140, about as the location (e.g., virtual
`
`address) of the virtual disc 118-1 in the storage 117. The system 140 is configured to
`
`interface with the management console 150 through, for example, an API.
`
`[0021] ln some example embodiments, the security system 140 mayfurther interface with
`
`the cloud computing platform 110 and external systems 170. The external systems may
`
`include intelligence systems, security information and event management
`
`(SIEM)
`
`systems, and mitigations tools. The external intelligence systems may include common
`
`vulnerabilities and exposures (CVE®) databases, reputation services, security systems
`
`(providing feeds on discovered threats), and so on. The information provided by the
`
`intelligence systems may detect certain known vulnerabilities identified in, for example, a
`
`CVE database.
`
`[0022] According to the disclosed embodiments, the security system 140 is configured to
`
`detect vulnerabilities and other cyber threats related to the execution VM 119. The
`
`detection is performed while the VM 119 is live, without using any agent installed in the
`
`Page 40f 15
`
`Ex. 2149-007
`
`Ex. 2149-007
`
`

`

`ORCA P1414P
`
`server 115 or the VM 119, and without relying on cooperation from VM 119 guest OS.
`
`Specifically, the security system 140 can scan and detect vulnerable software, non-
`
`secure configuration, exploitation attempts, compromised asserts, data leaks, data
`
`mining, and so on. The security system 140 may befurther utilized to provide security
`
`services, such as incident response, anti-ransomware, and cyber insurance by accessing
`
`the security posture.
`
`[0023]In some embodiment, the security system 140 is configured to query the cloud
`
`management console 150 as the address of the virtual disc 118-1 serving the VM 119
`
`and a location of the snapshot. Then, a snapshot of the VM 119 as savedofthe virtual
`
`disk 118-1 is accessed by the system 140.
`
`In an embodiment, the VM’s 119 snapshot
`
`may be copied to the system 140. If such a snapshot does not exist, the system 140 may
`
`take a new snapshot, or request for such an action. The snapshots may be taken at a
`
`predefined schedule or upon predefine events (e.g., a network event or abnormal event).
`
`Further, the snapshots may be accessor copied predefined schedule or upon predefine
`
`events.
`
`It should be noted that when the snapshotis taken or copied, the VM 119 still
`
`runs. It should be noted that the snapshotof the virtual disk 118-1 may not be necessary
`
`stored in the storage 117, but for ease of the discussion it is assumed that the snapshot
`
`is saved in the storage 117. It should be further noted that the snapshot is being accessed
`
`without cooperation of the guest, virtual OS of the virtual machine.
`
`[0024] The snapshot is parsed and analyzed by the security system 140 to detect
`
`vulnerabilities. This analysis of the snapshot does not require any interaction and/or
`
`information from the VM 119. As further demonstrated herein,
`
`the analysis of the
`
`snapshotby the system 140 does not require any agent installed on the server 115 or VM
`
`119.
`
`[0025] Various techniques can be utilized to analyze the snapshots, and depends on the
`
`type of vulnerability and cyber threats to be detected. Following are some example
`
`embodiments for techniques that may be implemented by the security system 140.
`
`[0026] In an embodiment, the security system 140 is configured to detect whether there
`
`is vulnerable code executed by the VM 119. To this end, the security system 140 is
`
`configured to match installed application list with their respective versions to a knownlist
`
`of vulnerable applications. Further, the security system 140 may be configured to match
`
`Page 50f 15
`
`Ex. 2149-008
`
`Ex. 2149-008
`
`

`

`ORCA P1414P
`
`the application files, either directly (using binary comparison) or by computing a
`
`cryptographic hash against databaseof files in vulnerable applications. The matching
`
`may be also on sub-modules of an application. Alternatively, the security system 140 may
`
`read installation logs of package managers usedto install the packages of the application.
`
`[0027] In yet another embodiment, the security system 140 is configured to verify whether
`
`the vulnerability is relevant to the VM 119. For example, if there is a vulnerable version
`
`or module not being in used. The priority of that issue is reduced dramatically.
`
`[0028] To this end, security system 140 may be configured to check the configuration files
`
`of the applications and operation system of the VM 119; verify accesstimes to files by the
`
`operating system; analyzing the active application and/or system logs in order to deduce
`
`what applications and modules are running.
`
`[0029] In yet another embodiment, the security system 140 mayinstantiate a copy of the
`
`VM 119 or a subset of applications of the VM 119 on the server 115 or a separate server
`
`and monitor all activity performed by the instance of the VM. The execution of the instance
`
`of the VM is an isolated sandbox, which can be a full VM or subsetofit, such as docker.
`
`[0030]In order to determine if the vulnerability is relevant to the VM 119, the security
`
`system 140 is configured to analyze the machine memory, as reflected in the page file.
`
`The page file is saved in the snapshot and extends how much system-committed memory
`
`(also known as “virtual memory”) a system can back.
`
`In an embodiment, analyzing the
`
`page file allows to deduce running applications and modules by the VM 119.
`
`[0031]In an embodiment,
`
`the security system 140 is configured to read process
`
`identification number (PID) files and check their accessor write times, which are matched
`
`against process descriptors. The PID can be used to deduce which processes are
`
`running, and hence the priority of vulnerabilities detected in processes existing on the
`
`disk. It should be noted the PID files are also maintained in the snapshot.
`
`[0032] In yet another embodiment, the security system 140 is configured to detect cyber
`
`threats that do not represent vulnerabilities. For example, the security system 140 may
`
`detect and alert on sensitive data not being encrypted on the logical disk, private keys
`
`found on the disks, system credentials stored clearly on the disk, risky application features
`
`(e.g., support of weak cipher suites or authentication methods), weak passwords, weak
`
`encryption schemes, a disable address space layout randomization (ASLR) feature,
`
`Page 6 of 15
`
`Ex. 2149-009
`
`Ex. 2149-009
`
`

`

`ORCA P1414P
`
`suspicious manipulation to a boot record, and suspicious PATH, LD_LIBRARY_PATH, or
`
`LD_PRELOAD definitions, services running on startup, and the like.
`
`[0033] In an embodiment, the security system 140 may further monitoring for changes in
`
`sensitive machine areas, and alert on unexpected changes (e.g., added or changed
`
`application file without installation). In an example embodiment, this can be achieved by
`
`computing a cryptographic hashof the sensitive areasin the virtual disk and checking for
`
`differences over time.
`
`[0034] In some embodiment, the all detected cyber threats (including vulnerabilities) are
`
`reported to a user console 180 and/or a security information and event management
`
`(SIEM) system (not shown). The reported cyber threats may be filtered or prioritized
`
`based in part on their determinedrisk. Further, the reported cyber threats may befiltered
`
`or prioritized basedin part on the risk level of the machine. This also to reduce the number
`
`of alerts reported to the user.
`
`[0035] In an embodiment, any detected cyber threats related to sensitive data (including
`
`personally identifiable information, PIl) is reported at a higher priority. In an embodiment,
`
`such data is determined by searching for the PIl, analyzing the application logs to
`
`determine whether the machine accessed PII/PII containing servers, or whether the logs
`
`themselves contain Pll, and searching the machine memory, as reflected in the page file,
`
`for PIl.
`
`[0036] In an embodiment, the security system 140 may determine the risk of the VM 119
`
`based on communication with an untrusted network. This can be achieved by analyzing
`
`the VM’s 119 logs as saved in the virtual disk and can be derived from the snapshot.
`
`[0037] In an example embodiment, the security system 140 may cause an execution of
`
`one or more mitigation actions. Example for such actions may include blocking traffic from
`
`untrusted networks, halting the operation of the VM, quarantining an infected VM, and the
`
`like. The mitigation actions may be performed by a mitigation tool and not the system 140.
`
`[0038] It should be noted that the example implementation shownin Fig.
`
`1
`
`is described
`
`with respect to a single cloud computing platform 110 hosting a single VM 119 in a single
`
`server 115, merely for simplicity purposes and without
`
`limitation on the disclosed
`
`embodiments. Typically, virtual machines are deployed and executedin a single cloud
`
`computing platform or data center and maybe protected without departing from the scope
`
`Page 7 of 15
`
`Ex. 2149-010
`
`Ex. 2149-010
`
`

`

`ORCA P1414P
`
`of the disclosure. It should be further noted that the disclosed embodiments can operate
`
`using multiple security systems 140, each of which may operate in a different client
`
`environment.
`
`[0039] Fig. 2 shows an example flowchart 200 illustrating a method for detecting cyber
`
`threats including potential vulnerabilities in virtual machines executed in a cloud
`
`computing platform according to some embodiments. The method may be performed by
`
`the security system 140.
`
`[0040] At S210, a request, for example, to scan a VM for vulnerabilities is received. The
`
`request may be received, or otherwise triggered every predefined time interval or upon
`
`detection of an external event. The request mayat least designate an identifier of the VM
`
`to be scanned.
`
`[0041] At S220, a location of a snapshot of a virtual disk of the VM to be scannedis
`
`determined. In an embodiment, S220 may include determining the virtual disk allocated
`
`for the VM, prior to determining the location of the snapshot. As noted above, this can be
`
`achieved by querying a cloud management console.
`
`[0042] At S230, a snapshotof the virtual disk is accessed, or otherwise copied.
`
`[0043] At S240,
`
`the snapshot
`
`is analyzed to detect cyber
`
`threats and potential
`
`vulnerabilities.
`
`In an embodiment, S240 may include comparing the snapshot to some
`
`baseline (e.g.,
`
`list of applications, pervious snapshots), analyzing logs of the VMs,
`
`instantiating a copy of the VM and executing the instance or applications executed by the
`
`VM in a sandbox, analyzing the machine memory, as reflected in the page file, or any
`
`combination of
`
`these techniques. Some example embodiments for analyzing the
`
`snapshots and the types of detected vulnerabilities and threats are provided above.
`
`[0044] At S250, the detected threats and vulnerabilities are reported, for example, as
`
`alerts. In an embodiment, S250 mayincludefiltering and prioritizing the reported alerts.
`
`[0045] At optional S260, a mitigation action may be triggered to mitigate a detected threat
`
`or vulnerability. A mitigation action may be executed by a mitigation tool and triggered by
`
`the system 140. Such an action may include blocking traffic from untrusted networks,
`
`halting the operation of the VM, quarantining an infected VM, and the like.
`
`[0046] Fig. 3 is an example block diagram of the security system 140 according to an
`
`embodiment. The security system 140 includes a processing circuitry 310 coupled to a
`
`Page 8 of 15
`
`Ex. 2149-011
`
`Ex. 2149-011
`
`

`

`ORCA P1414P
`
`memory 320, a storage 330, and a network interface 340.
`
`In an embodiment,
`
`the
`
`components of the security system 140 may be communicatively connected via a bus
`
`360.
`
`[0047] The processing circuitry 310 may be realized as one or more hardware logic
`
`components and circuits. For example, and without
`
`limitation,
`
`illustrative types of
`
`hardware logic components that can be used include field programmable gate arrays
`
`(FPGAs), application-specific integrated circuits (ASICs), application-specific standard
`
`products
`
`(ASSPs),
`
` system-on-a-chip
`
`systems
`
`(SOCs),
`
`general-purpose
`
`microprocessors, microcontrollers, digital signal processors (DSPs), and the like, or any
`
`other hardware logic components that can perform calculations or other manipulations of
`
`information.
`
`[0048] The memory 310 maybevolatile (e.g., RAM, etc.), non-volatile (e.g., ROM, flash
`
`memory, etc.), or a combination thereof.
`
`In one configuration, computer readable
`
`instructions to implement one or more embodiments disclosed herein may be stored in
`
`the storage 330.
`
`[0049] In another embodiment, the memory 320 is configured to store software. Software
`
`shall be construed broadly to mean any type of instructions, whether referred to as
`
`software, firmware, middleware, microcode, hardware description language, or otherwise.
`
`Instructions may include code (e.g.,
`
`in source code format, binary code format,
`
`executable code format, or any other suitable format of code). The instructions, when
`
`executed by the one or more processors, cause the processing circuitry 310 to perform
`
`the various processes described herein. Specifically, the instructions, when executed,
`
`cause the processing circuitry 310 to determine over-privileged roles vulnerabilities in
`
`serverless functions.
`
`[0050] The storage 330 may be magnetic storage, optical storage, and the like, and may
`
`be realized, for example, as flash memory or other memory technology, CD-ROM, Digital
`
`Versatile Disks (DVDs), hard-drives, SSD, or any other medium which can be used to
`
`store the desired information. The storage 330 may store communication consumption
`
`patterns associated with one or more communications devices.
`
`Page 9 of 15
`
`Ex. 2149-012
`
`Ex. 2149-012
`
`

`

`ORCA P1414P
`
`[0051] The networkinterface 340 allows the security system 140 to communicate with the
`
`external systems, such asintelligence systems, SIEM systems, mitigation systems, a
`
`cloud management console, a user console, and the like.
`
`[0052] It should be understood that the embodiments described herein are notlimited to
`
`the specific architecture illustrated in Fig. 3, and other architectures may be equally used
`
`without departing from the scope of the disclosed embodiments.
`
`[0053] The various embodiments disclosed herein can be implemented as hardware,
`
`firmware, software, or any combination thereof. Moreover, the software is preferably
`
`implemented as an application program tangibly embodied on a program storage unit or
`
`computer readable medium consisting of parts, or of certain devices and/or a combination
`
`of devices. The application program may be uploaded to, and executed by, a machine
`
`comprising any suitable architecture. Preferably,
`
`the machine is implemented on a
`
`computer platform having hardware such as one or more central processing units
`
`(“CPUs”), amemory, and input/output interfaces. The computer platform may also include
`
`an operating system and microinstruction code. The various processes and functions
`
`described herein maybeeither part of the microinstruction code or part of the application
`
`program, or any combination thereof, which may be executed by a CPU, whether or not
`
`such a computer or processor is explicitly shown.
`
`In addition, various other peripheral
`
`units may be connected to the computer platform such as an additional data storage unit
`
`and a printing unit. Furthermore, a non-transitory computer readable medium is any
`
`computer readable medium exceptfor a transitory propagating signal.
`
`[0054] As used herein, the phrase “at least one of” followed byalisting of items means that
`
`any of the listed items can be utilized individually, or any combination of two or more of
`
`the listed items can be utilized. For example, if a system is described as including “at least
`
`one of A, B, and C,” the system can include A alone; B alone; C alone; A andBin
`
`combination; B and C in combination; A and C in combination; or A, B, and C in
`
`combination.
`
`[0055] All examples and conditional language recited herein are intended for pedagogical
`
`purposes to aid the reader in understanding the principles of the disclosed embodiment
`
`and the concepts contributed by the inventor to furthering the art, and are to be construed
`
`as being without limitation to such specifically recited examples and conditions. Moreover,
`
`Page 10 of 15
`
`Ex. 2149-013
`
`Ex. 2149-013
`
`

`

`ORCA P1414P
`
`all statements herein reciting principles, aspects, and embodiments of the disclosed
`
`embodiments, as well as specific examples thereof, are intended to encompass both
`
`structural and functional equivalents thereof. Additionally,
`
`it
`
`is intended that such
`
`equivalents include both currently known equivalents as well as equivalents developed in
`
`the future, i.e., any elements developed that perform the same function, regardless of
`
`structure.
`
`Page 11 of 15
`
`Ex. 2149-014
`
`Ex. 2149-014
`
`

`

`ORCA P1414P
`
`100
`
`User Console
`
` External
`systems
`170
`
`180
`
`
`
`Management
`Console
`
`150
`
`
`Cloud Computing Platform
`110
`
`
`
`FIG. 1A
`
`Page 12 of 15
`
`Ex. 2149-015
`
`Ex. 2149-015
`
`

`

`ORCA P

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket