×

Computer code intrusion detection system based on acceptable retrievals

  • US 7,406,714 B1
  • Filed: 07/31/2003
  • Issued: 07/29/2008
  • Est. Priority Date: 07/01/2003
  • Status: Expired due to Fees
First Claim
Patent Images

1. A computer-implemented method for protecting computer code from malicious retrievers, the method comprising the steps of:

  • observing a plurality of retrieval commands that access the computer code;

    observing responses to the plurality of retrieval commands generated by the computer code;

    deriving from the plurality of retrieval commands and the responses a set of retrieval information, the set of retrieval information comprising input vectors characterizing the plurality of retrieval commands;

    converting the set of retrieval information into at least one rule for determining whether retrieval commands are acceptable;

    generating retrieval information characteristic of data sent to a retriever by the computer code in response to a retrieval command issued by the retriever, the retrieval information comprising an input vector characterizing the retrieval command;

    determining whether the retrieval command is acceptable using at least some of the retrieval information as an input to the at least one rule; and

    responsive to the retrieval command being not acceptable, performing at least one of the following;

    restricting the retrieval command from accessing the computer code,allowing the retrieval command limited access to the computer code,augmenting the command, andinvestigating a sender of the command.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×