Identification of an attacker in an electronic system
First Claim
1. A method for identifying a particular component of an electronic system that accessed a resource of said electronic system comprising:
- (a) creating an electronic security value unit that is used as payment to access said resource;
(b) distributing said electronic security value unit to said component;
(c) creating a first association between said component and said electronic security value unit, wherein said first association indicates said electronic security value unit was distributed to said component;
(d) providing said electronic security value unit from said component to a resource manager in exchange for access to said resource;
(e) creating a second association between said electronic security value unit and said access to said resource, wherein said second association indicates said electronic security value unit was used to access said resource; and
(f) analyzing said first association and said second association to determine that said component accessed said resource.
2 Assignments
0 Petitions
Accused Products
Abstract
A method for identifying a particular component of an electronic system that accesses a resource of the electronic system using electronic security value units is described. First, electronic security value units are selectively distributing to a plurality of components, such as to a client, of the electronic system. Next, a unique first association is created with each individual component to which the security electronic security value units are distributed. Further, upon a particular access to a resource, a unique second association is created between particular ones of security electronic security value units and the particular access to the resource. In addition, the unique second association is analyzed to determine which particular security electronic security value units were used to access the particular resource. Then, the first association of the particular security electronic security value units is analyzed to determine the identity of the component which accessed the resource.
-
Citations
21 Claims
-
1. A method for identifying a particular component of an electronic system that accessed a resource of said electronic system comprising:
-
(a) creating an electronic security value unit that is used as payment to access said resource; (b) distributing said electronic security value unit to said component; (c) creating a first association between said component and said electronic security value unit, wherein said first association indicates said electronic security value unit was distributed to said component; (d) providing said electronic security value unit from said component to a resource manager in exchange for access to said resource; (e) creating a second association between said electronic security value unit and said access to said resource, wherein said second association indicates said electronic security value unit was used to access said resource; and (f) analyzing said first association and said second association to determine that said component accessed said resource. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system, comprising:
-
a resource; a component; and a resource manager; and
wherein the system;creates an electronic security value unit that is used as payment to access said resource; distributes said electronic security value unit to said component; creates a first association between said component and said electronic security value unit, wherein said first association indicates said electronic security value unit was distributed to said component; provides said electronic security value unit from said component to said resource manager in exchange for access to said resource; creates a second association between said electronic security value unit and said access to said resource, wherein said second association indicates said electronic security value unit was used to access said resource; and analyzes said first association and said second association to determine that said component accessed said resource. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. At least one computer readable medium comprising instructions for executing on a computer system, the instructions including software applications for identifying a particular component of the computer system that accessed a resource of said computer system, the instructions for implementing:
-
(a) creating an electronic security value unit that is used as payment to access said resource; (b) distributing said electronic security value unit to said component; (c) creating a first association between said component and said electronic security value unit, wherein said first association indicates said electronic security value unit was distributed to said component; (d) providing said electronic security value unit from said component to a resource manager in exchange for access to said resource; (e) creating a second association between said electronic security value unit and said access to said resource, wherein said second association indicates said electronic security value unit was used to access said resource; and (f) analyzing said first association and said second association to determine that said component accessed said resource. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
Specification