Preventing unauthorized access to an application server
First Claim
1. A computer-implemented method for preventing unauthorized access to an application server, the method comprising:
- collecting, by the application server, access data, the access data including instances of authorized requests for data fulfilled by the application server from users of a first organization and an identifying characteristic of each requested data;
anonymizing, by an anonymizing module, the access data to create anonymized access data;
creating at least one identifying key for the anonymized access data, the at least one identifying key being operable to match a datum of the anonymized access data to a respective user of the users of the first organization;
saving the at least one identifying key at a secure location associated with the first organization;
storing the anonymized access data in an access data warehouse, the access data warehouse additionally storing another anonymized access data associated with a second organization; and
performing an analysis on the stored anonymized access data using at least one analytic criterion, the stored anonymized access data being separated from the another anonymized access data using the at least one identifying key.
5 Assignments
0 Petitions
Accused Products
Abstract
A method and platform for preventing unauthorized access to an application server comprises collecting access data associated with an organization, anonymizing the access data, creating identifying keys which allow the anonymized access data to be matched to its associated users, storing the identifying keys at a secure location associated with the organization, transferring the anonymized access data to an access data warehouse, and performing an analysis on the anonymized access data. The access data warehouse can be maintained in a cloud computing environment, and may aggregate anonymized access data from a plurality of organizations. An organization may detect abnormal usage patterns by analyzing its usage data and the anonymized usage data of further organizations, and may use the abnormal usage patterns to predict future events, for example intrusion attempts. An organization can automatically generate protective measures against potential threats associated with abnormal usage patterns.
62 Citations
21 Claims
-
1. A computer-implemented method for preventing unauthorized access to an application server, the method comprising:
-
collecting, by the application server, access data, the access data including instances of authorized requests for data fulfilled by the application server from users of a first organization and an identifying characteristic of each requested data; anonymizing, by an anonymizing module, the access data to create anonymized access data; creating at least one identifying key for the anonymized access data, the at least one identifying key being operable to match a datum of the anonymized access data to a respective user of the users of the first organization; saving the at least one identifying key at a secure location associated with the first organization; storing the anonymized access data in an access data warehouse, the access data warehouse additionally storing another anonymized access data associated with a second organization; and performing an analysis on the stored anonymized access data using at least one analytic criterion, the stored anonymized access data being separated from the another anonymized access data using the at least one identifying key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. An unauthorized access prevention platform comprising:
-
a plug-in installed on a web server associated with a first organization, the plug-in being operable to collect access data, the access data including instances of authorized requests for data fulfilled by an application server from users of the first organization and an identifying characteristic of each requested data; a processor; a memory coupled to the processor, the memory storing instructions executable by the processor to; anonymize the access data to create anonymized access data; and create at least one identifying key for the anonymized access data, the at least one identifying key being operable to match a datum of the anonymized access data to a respective user of the users of the first organization; a secure location associated with the first organization, the secure location securely saving the at least one identifying key at the secure location associated with the first organization; an access data warehouse storing the anonymized access data, the access data warehouse additionally storing another anonymized access data associated with a second organization; and at least one analytics package analyzing the stored anonymized access data, the stored anonymized access data being separated from the another anonymized access data using the at least one identifying key. - View Dependent Claims (17, 18, 19, 20)
-
-
21. A non-transitory computer-readable storage medium having embodied thereon at least one program, the program being executable by a processor to perform a method for preventing unauthorized access to an application server, the method comprising:
-
collecting access data, the access data including instances of authorized requests for data fulfilled by the application server from users of a first organization and an identifying characteristic of each requested data; anonymizing the access data to create anonymized access data; creating at least one identifying key for the anonymized access data, the at least one identifying key being operable to match a datum of the anonymized access data to a respective user of the users of the first organization; saving the at least one identifying key at a secure location associated with the first organization; storing the anonymized access data in an access data warehouse, the access data warehouse additionally storing another anonymized access data associated with a second organization; and performing an analysis on the stored anonymized access data using at least one analytic criterion, the stored anonymized access data being separated from the another anonymized access data using the at least one identifying key.
-
Specification