Identifying potential intruders on a server
First Claim
Patent Images
1. A method of identifying an intruder on a server, comprising the steps of:
- providing one or more lightly protected subdirectories on said server, each of said subdirectories having files with attractive names simulating content of interest to an intruder having a processor;
providing an agent within one or more of said files, adapted to be launched on said processor when said intruder downloads from said server, a file having said agent; and
receiving from said processor via a non-erasable transfer initiated by said agent, data of address book entries, custom word processing templates, e-mail files, letterheads, closure files, or signature files, said data being first encrypted by said agent prior to said non-erasable transfer.
5 Assignments
0 Petitions
Accused Products
Abstract
An intruder on a server is identified by providing files having attractive names in a subdirectory of the server. An agent is provided within one or more of the files. The agent is launched on an intruder'"'"'s processor after the file containing the agent is downloaded. The agent locates various files and data on the intruder'"'"'s processor and sends copies of the files and data to the server thus allowing a network administrator at the server to identify the intruder.
-
Citations
20 Claims
-
1. A method of identifying an intruder on a server, comprising the steps of:
-
providing one or more lightly protected subdirectories on said server, each of said subdirectories having files with attractive names simulating content of interest to an intruder having a processor; providing an agent within one or more of said files, adapted to be launched on said processor when said intruder downloads from said server, a file having said agent; and receiving from said processor via a non-erasable transfer initiated by said agent, data of address book entries, custom word processing templates, e-mail files, letterheads, closure files, or signature files, said data being first encrypted by said agent prior to said non-erasable transfer. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer system for identifying an intruder on a server, comprising:
-
a server; means for providing one or more lightly protected subdirectories on said server, each of said subdirectories having files with attractive names simulating content of interest to an intruder having a processor; an agent within one or more of said files, adapted to be launched on said processor when said intruder downloads from said server, a file having said agent; and means for receiving from said processor via a non-erasable transfer initiated by said agent, data, encrypted by said agent, of address book entries, custom word processing templates, e-mail files, letterheads, closure files, or signature files. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A computer program product for instructing a processor to identify an intruder on a server, said computer program product comprising:
-
a computer readable medium; first program instruction means for providing one or more lightly protected subdirectories on said server, each of said subdirectories having files with attractive names simulating content of interest to an intruder having a processor; second program instruction means for providing an agent within one or more of said files, adapted to be launched on said processor when said intruder downloads from said server, a file having said agent; and third program instruction means for receiving from said processor via a non-erasable transfer initiated by said agent, data, encrypted by said agent, of address book entries, custom word processing templates, e-mail files, letterheads, closure files, or signature files; and wherein all said program instruction means are recorded on said medium. - View Dependent Claims (20)
-
Specification