REACTIVE ANTI-TAMPERING SYSTEM
First Claim
1. A computer-implemented method, comprising:
- providing a protected service executing on a client device;
providing a management infrastructure having a capability to monitor the protected service for an occurrence of a tamper event and to initiate a remedial action in response to detecting occurrence of the tamper event;
defining at least one tamper event and a corresponding remedial action; and
utilizing the management infrastructure to monitor for an occurrence of the tamper event at the protected service and to apply the remedial action to the protected service upon detection of the occurrence of the tamper event.
2 Assignments
0 Petitions
Accused Products
Abstract
An enterprise computing system may utilize a management infrastructure that interacts with protected services in the system. The management infrastructure accepts requests through an anti-tamper procedure that specifies a tamper event, a crucial service to be protected, and a remedial action that may be applied when the tamper event occurs on the protected service. The anti-tamper procedure may be created by a system administrator and distributed to one or more client devices in the system. The management infrastructure monitors a protected service in accordance with the operations and actions specified in the anti-tamper procedure thereby ensuring that the integrity of the system is preserved.
37 Citations
20 Claims
-
1. A computer-implemented method, comprising:
-
providing a protected service executing on a client device; providing a management infrastructure having a capability to monitor the protected service for an occurrence of a tamper event and to initiate a remedial action in response to detecting occurrence of the tamper event; defining at least one tamper event and a corresponding remedial action; and utilizing the management infrastructure to monitor for an occurrence of the tamper event at the protected service and to apply the remedial action to the protected service upon detection of the occurrence of the tamper event. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer-readable storage medium storing thereon processor-executable instructions, comprising:
-
instructions, that when executed on a processor, receive a request to monitor a protected service; instructions, that when executed on a processor, request that a management infrastructure facilitate monitoring for occurrence of an event on a protected service; and instructions, that when executed on a processor, initiates a remedial action tailored to the event and the protected service. - View Dependent Claims (12, 13, 14, 15, 16)
-
-
17. A system, comprising:
-
at least one protected service operating on a client device; a management infrastructure, operating on the client device, having a programming interface that interacts with the protected service; a script file having a first set of executable instructions that requests the management infrastructure to monitor the protected service for occurrence of an event and a second set of executable instructions that specify a remedial action that the management infrastructure performs on a protected service; and a plurality of providers, each provider coupled to the management infrastructure and a protected service, the provider configured to receive instructions from the management infrastructure and to provide data in response to instructions. - View Dependent Claims (18, 19, 20)
-
Specification