Data security system and method responsive to electronic attacks
First Claim
1. A method of securing data in a computer network against a plurality of computer events with an electronic attack monitor generating a corresponding plurality of attack warnings, said data, sought to be secured, having one or more security sensitive words, characters, icons or data objects, said computer network having, interconnected together, a plurality of computers for a plurality of users having a corresponding a plurality of security levels each with a respective security clearance, one of said plurality of computers designated as a data input computer and each of said plurality of computers having a memory therein, a first and a second memory designated as a remainder store and an extract store in one or more computers of said plurality of computers, comprising:
- filtering data input from said data input computer dependent upon respective ones of said plurality of attack warnings and extracting said security sensitive words, characters, icons or data objects from said data to obtain extracted data and remainder data, the degree of extraction dependent upon respective ones of said plurality of attack warnings;
storing said extracted data and said remainder data in said extract store and said remainder store based upon respective ones of said plurality of attack warnings; and
, permitting reconstruction of some or all of said data via said extracted data and remainder data only in the presence of a predetermined security clearance of said plurality of security levels.
2 Assignments
0 Petitions
Accused Products
Abstract
An adaptive method, system and program for securing data against a plurality of electronic and environmental events directed at computers utilizes a hacking monitor which generates attack warnings (such as a hacking warning) dependent upon the severity of the attack. Based upon these warnings, data is filtered to extract security sensitive words etc. and the extract and remainder data (if necessary) is stored in assigned memory. Full or partial reconstruction is permitted, manually or automatically, with a security clearance. Encryption is typically used dependent upon the warning. The information processing system includes a filter which is adjusted based upon the degree of attack warning to extract security sensitive words. A storage system stores extracted data and remainder data (if necessary) based upon the level of the warning and a compiler is used to reconstruct the data in the presence of the appropriate security clearance level.
88 Citations
67 Claims
-
1. A method of securing data in a computer network against a plurality of computer events with an electronic attack monitor generating a corresponding plurality of attack warnings, said data, sought to be secured, having one or more security sensitive words, characters, icons or data objects, said computer network having, interconnected together, a plurality of computers for a plurality of users having a corresponding a plurality of security levels each with a respective security clearance, one of said plurality of computers designated as a data input computer and each of said plurality of computers having a memory therein, a first and a second memory designated as a remainder store and an extract store in one or more computers of said plurality of computers, comprising:
-
filtering data input from said data input computer dependent upon respective ones of said plurality of attack warnings and extracting said security sensitive words, characters, icons or data objects from said data to obtain extracted data and remainder data, the degree of extraction dependent upon respective ones of said plurality of attack warnings;
storing said extracted data and said remainder data in said extract store and said remainder store based upon respective ones of said plurality of attack warnings; and
,permitting reconstruction of some or all of said data via said extracted data and remainder data only in the presence of a predetermined security clearance of said plurality of security levels. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67)
-
-
23. A computer readable medium containing programming instructions for securing data in a computer network against a plurality of computer events with an electronic attack monitor generating a corresponding plurality of attack warnings, said data, sought to be secured, having one or more security sensitive words, characters, icons or data objects, said computer network having, interconnected together, a plurality of computers for a plurality of users having a corresponding a plurality of security levels each with a respective security clearance, one of said plurality of computers designated as a data input computer and each of said plurality of computers having a memory therein, a first and a second memory designated as a remainder store and an extract store in one or more computers of said plurality of computers, the programming instructions comprising:
-
filtering data input from said data input computer dependent upon respective ones of said plurality of attack warnings and extracting said security sensitive words, characters, icons or data objects from said data to obtain extracted data and remainder data, the degree of extraction dependent upon respective ones of said plurality of attack warnings;
storing said extracted data and said remainder data in said extract store and said remainder store based upon respective ones of said plurality of attack warnings; and
,permitting reconstruction of some or all of said data via said extracted data and remainder data only in the presence of a predetermined security clearance of said plurality of security levels.
-
-
46. An information processing system for securing data in a computer network against a plurality of computer hacking events with a hacking monitor generating a corresponding plurality of hack warnings, said data, sought to be secured, having one or more security sensitive words, characters, icons or data objects, said computer network having, interconnected together, a plurality of computers for a plurality of users having a corresponding a plurality of security levels each with a respective security clearance, one of said plurality of computers designated as a data input computer and each of said plurality of computers having a memory therein, a first and a second memory designated as a remainder store and an extract store in one or more computers of said plurality of computers, comprising:
-
means for filtering data input from said data input computer dependent upon respective ones of said plurality of attack warnings and extracting said security sensitive words, characters, icons or data objects from said data to obtain extracted data and remainder data, the degree of extraction dependent upon respective ones of said plurality of attack warnings;
means for storing said extracted data and said remainder data in said extract store and said remainder store based upon respective ones of said plurality of attack warnings; and
,means for permitting reconstruction of some or all of said data via said extracted data and remainder data only in the presence of a predetermined security clearance of said plurality of security levels.
-
Specification