METHODS AND SYSTEMS FOR IMPLEMENTING A SELF DEFENDING/REPAIRING DATABASE
First Claim
1. A method of self defending and repairing a database, the method comprising:
- monitoring, at a database server, code modifications to a database management application, wherein the database management application is configured to maintain the database;
determining that a code modification has occurred to the database management application;
checking the code modification for the presence of an authorization key;
in response to an invalid or non-existent authorization key, determining that the code modification is unauthorized;
quarantining the modified code in a secure storage location; and
automatically accessing original code of the database management application and replacing the modified code with code from the original code of the database management application.
1 Assignment
0 Petitions
Accused Products
Abstract
This disclosure describes, generally, methods and systems for self defending and repairing a database. The method includes monitoring, at a database server, code modifications to a database management application. The database management application is configured to maintain the database. The method further includes determining that a code modification has occurred to the database management application. The method further includes checking the code modification for the presence of an authorization key, and in response to an invalid or non-existent authorization key, determining that the code modification is unauthorized. Further, the method includes quarantining the modified code in a secure storage location, and automatically accessing original code of the database management application and replacing the modified code with code from the original code of the database management application.
6 Citations
20 Claims
-
1. A method of self defending and repairing a database, the method comprising:
-
monitoring, at a database server, code modifications to a database management application, wherein the database management application is configured to maintain the database; determining that a code modification has occurred to the database management application; checking the code modification for the presence of an authorization key; in response to an invalid or non-existent authorization key, determining that the code modification is unauthorized; quarantining the modified code in a secure storage location; and automatically accessing original code of the database management application and replacing the modified code with code from the original code of the database management application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A system for self defending and repairing a database, the system comprising:
-
a database configured to store data; a secure storage location; and a database server coupled with the database and the secure storage location, the database server including a security component, wherein the security component is configured to monitor code modifications to a database management application, wherein the database management application is configured to maintain the database, determine that a code modification has occurred to the database management application, check the code modification for the presence of an authorization key, in response to an invalid or non-existent authorization key, determine that the code modification is unauthorized, quarantining the modified code in the secure storage location, and automatically access original code of the database management application and replace the modified code with code from the original code of the database management application. - View Dependent Claims (15)
-
-
16. A machine-readable medium having sets of instructions stored thereon for self defending and repairing a database which, when executed by a machine, cause the machine to:
-
monitor, at a database server, code modifications to a database management application, wherein the database management application is configured to maintain the database; determine that a code modification has occurred to the database management application; check the code modification for the presence of an authorization key; in response to an invalid or non-existent authorization key, determine that the code modification is unauthorized; quarantine the modified code in a secure storage location; and automatically access original code of the database management application and replace the modified code with code from the original code of the database management application. - View Dependent Claims (17, 18)
-
- 19. The machine-readable medium of claim 19, wherein the sets of instructions, when further executed by the machine, cause the machine to store a secure mirror copy of the original source code.
Specification