US 12,293,234 B2
System and method for generating time-based contextual graph in cloud computing environment
Murugesan Guruswamy, San Jose, CA (US); Griffin Maxwell Brome, Concord, CA (US); Kaixin Huang, Arcadia, CA (US); Sahaj Tushar Gandhi, Sunnyvale, CA (US); Shashank Tiwari, Palo Alto, CA (US); Stephanie Yuen-Kwan Knill, Pitt Meadows (CA); and Sukhvir Singh, San Jose, CA (US)
Assigned to UNO.AI, INC., Palo Alto, CA (US)
Filed by UNO.AI, INC., Palo Alto, CA (US)
Filed on Jun. 15, 2023, as Appl. No. 18/335,199.
Claims priority of provisional application 63/370,530, filed on Aug. 5, 2022.
Prior Publication US 2024/0045734 A1, Feb. 8, 2024
Int. Cl. G06F 9/50 (2006.01)
CPC G06F 9/5077 (2013.01) [G06F 9/5072 (2013.01)] 20 Claims
OG exemplary drawing
 
10. A computer-implemented method for generating a time-based contextual graph in a cloud computing environment, the computer-implemented method comprising:
receiving, by a processor, from one or more computing devices, one or more requests corresponding to security anomaly analysis associated with at least one of cloud infrastructure-based resources and cloud infrastructure-based applications in a cloud computing environment;
identifying, by the processor, a parent node and one or more node attributes corresponding to the parent node in at least one of the cloud infrastructure-based resources and the cloud infrastructure-based applications, based on the one or more requests;
determining, by the processor, one or more hierarchical node relationships between the parent node and one or more child nodes, based on the identified one or more node attributes;
analyzing, by the processor, one or more risks in context of the security anomaly associated with at least one of cloud infrastructure-based resources and cloud infrastructure-based applications, based on the one or more hierarchical node relationships between the parent node and the one or more child nodes;
generating, by the processor, a time-based contextual graph corresponding to the analyzed one or more risks in the context of the security anomaly, based on the determined one or more hierarchical node relationships between the parent node and one or more child nodes; and
outputting, by the processor, on a display associated with the one or more computing devices, a result corresponding to the analyzed one or more risks in context of the security anomaly using the generated time-based contextual graph.