×

Method and device for detecting computer intrusion

  • US 7,797,744 B2
  • Filed: 06/17/2003
  • Issued: 09/14/2010
  • Est. Priority Date: 06/17/2002
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method for computer intrusion detection on a computer system including a target server accessible by a client and administered by a system administrator capable of authorizing attempts to execute software on the target server, a client and a monitoring server coupled to the target server, the method comprising steps of:

  • running on the target server a monitored latent software performing a latent software function upon successful completion of authorization by the monitoring server;

    creating, via the system administrator, an authorization on the monitoring server prior to an attempt to execute the monitored latent software, wherein the authorization comprises an authorized client and a time interval;

    receiving the attempt to execute the monitored latent software on the target server from the client, wherein said client is located remotely from said target server and said monitored latent software is monitored by the monitoring server that is physically separated from the target server and the client;

    sending a query from the target server to the monitoring server to receive authorization to execute the monitored latent software;

    after sending the query, suspending execution of the monitored latent software until a response is received by the target server from the monitoring server;

    determining by the monitoring server whether the client is authorized to execute the monitored latent software by determining that the client is the authorized client and the attempt occurs during the time interval in the authorization; and

    sending a message to the system administrator indicating detection of an intrusion when the attempt to execute the monitored latent software is not authorized, wherein the monitored latent software includes an implementing subroutine for performing the latent software function and a nested authorization subroutine for determining if the attempt to access the monitored latent software is authorized, wherein the implementing subroutine is resident entirely on the target server and the authorization subroutine includes a portion resident on the target server and a portion resident on the monitoring server.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×