Systems and methods for enhancing electronic communication security
First Claim
Patent Images
1. An application layer security system, the system comprising:
- a) at least one application server system communication interface communicatively coupling the security system to one or more application server systems;
b) a system data store capable of storing an electronic communication and accumulated data associated with received electronic communications; and
c) a system processor in communication with the system data store and the at least one application server system communication interface, wherein the system processor comprises one or more processing elements and wherein the system processor;
i) receives an electronic communication directed to or from a selected application server system;
ii) applies one or more tests to the received electronic communication, wherein each of the one or more tests evaluates the received electronic communication for a particular security risk;
iii) stores in the system data store a risk profile associated with the received electronic communication based upon the applied one or more tests;
iv) determines whether an anomaly exists with respect to the received electronic communication based upon the stored risk profile and accumulated data associated with received electronic communications from the system data store; and
v) outputs an anomaly indicator signal if an anomaly is determined to exist.
14 Assignments
0 Petitions
Accused Products
Abstract
The present invention is directed to systems and methods for enhancing electronic communication security. An electronic communication related to an application is received and stored. One or more risk assessments are made with respect to the received communication thereby generating a risk profile associated with the communication. The risk profile is analyzed with respect to data associated with previously received communications to determine if the received communication is anomalous. If the received communication is determined to be anomalous, an anomaly indicator signal is output.
286 Citations
65 Claims
-
1. An application layer security system, the system comprising:
-
a) at least one application server system communication interface communicatively coupling the security system to one or more application server systems;
b) a system data store capable of storing an electronic communication and accumulated data associated with received electronic communications; and
c) a system processor in communication with the system data store and the at least one application server system communication interface, wherein the system processor comprises one or more processing elements and wherein the system processor;
i) receives an electronic communication directed to or from a selected application server system;
ii) applies one or more tests to the received electronic communication, wherein each of the one or more tests evaluates the received electronic communication for a particular security risk;
iii) stores in the system data store a risk profile associated with the received electronic communication based upon the applied one or more tests;
iv) determines whether an anomaly exists with respect to the received electronic communication based upon the stored risk profile and accumulated data associated with received electronic communications from the system data store; and
v) outputs an anomaly indicator signal if an anomaly is determined to exist. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42)
-
-
43. A method for enhancing application layer communication security, the method comprising the steps of:
-
a) receiving an electronic communication directed to or from a selected application server system, wherein the received electronic communication is an application layer communication;
b) applying one or more tests to the received electronic communication, wherein each of the one or more tests evaluates the received electronic communication for a particular security risk;
c) determining whether an anomaly exists with respect to the received electronic communication based upon the applied one or more tests; and
d) outputting an anomaly indicator signal if an anomaly is determined to exist. - View Dependent Claims (44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56)
-
-
57. Computer readable storage media storing instructions that upon execution by a system processor cause the system processor to provide application layer security, the media having stored instruction that cause the system processor to perform the steps comprising of:
-
a) receiving an electronic communication directed to or from a selected application server system, wherein the received electronic communication is an application layer communication;
b) applying one or more tests to the received electronic communication, wherein each of the one or more tests evaluates the received electronic communication for a particular security risk, thereby generating at least one risk profile associated with the electronic communication;
c) determining whether an anomaly exists with respect to the received electronic communication based upon the at least one risk profile; and
d) outputting an anomaly indicator signal if an anomaly is determined to exist. - View Dependent Claims (58, 59, 60, 61, 62, 63, 64)
-
-
65. An application layer security system, the system comprising:
-
a) receiving means for receiving an application layer electronic communication;
b) storing means for storing an electronic communication and accumulated data associated with received electronic communications;
c) assessment means for applying one or more tests to the received electronic communication, wherein each of the one or more tests evaluates the received electronic communication for a particular security risk, and for storing a risk profile in the storing means, wherein the risk profile was generated from applying the one or more tests to the received electronic communication;
d) anomaly determining means for determining whether an anomaly exists with respect to the received communication based upon the risk profile and accumulated data associated with the received electronic communications in the storing means; and
e) output means for outputting an anomaly indicator signal if an anomaly was determined to exist by the anomaly determining means.
-
Specification