×

Application-layer security method and system

  • US 7,313,822 B2
  • Filed: 03/16/2001
  • Issued: 12/25/2007
  • Est. Priority Date: 03/16/2001
  • Status: Expired due to Term
First Claim
Patent Images

1. A method for protecting an application from executing an illegal or harmful operation request received from a distributed environment, the method comprising the steps of:

  • determining whether an operation request is illegal or harmful to an environment of an application,preventing said application from executing an illegal or harmful operation request, wherein said step of preventing comprises the step of modifying said illegal or harmful operation request into a legal or harmless operation request,comparing said operation request against stored known vulnerability patterns to determine a match, andblocking said operation request if said match is found,wherein said step of comparing comprises the steps of;

    converting every consecutive specified number of characters in said operation request into n-bits of binary code;

    computing a hash value for said every consecutive specified number of characters in said operation request; and

    comparing every hash value to stored hash values representing vulnerability patterns.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×