Data leak protection system, method and apparatus
First Claim
Patent Images
1. A data leak protection method comprising:
- receiving a database query;
producing metrics, by an intrusion detection system (IDS), for said database query;
receiving the result set produced by said database query; and
limiting a response to said database query based upon;
a shape of said result set produced by said database query,said metrics, anda data leak protection policy specifying a set of limitations for a corresponding set of shapes and metrics.
2 Assignments
0 Petitions
Accused Products
Abstract
A method, system and apparatus for data leak prevention. An information system, such as a database system, which has been configured for data leak protection in accordance with the present invention can include an IDS coupled to the information system and a data leak protection system configured to apply a data leak protection policy for result sets produced by the information system in response to a database query. The data leak protection policy can include a listing of data shapes and corresponding remedial measures. The data leak protection policy further can include consideration for metrics produced by the IDS.
-
Citations
23 Claims
-
1. A data leak protection method comprising:
-
receiving a database query; producing metrics, by an intrusion detection system (IDS), for said database query; receiving the result set produced by said database query; and limiting a response to said database query based upon; a shape of said result set produced by said database query, said metrics, and a data leak protection policy specifying a set of limitations for a corresponding set of shapes and metrics. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A machine readable storage having stored thereon a computer program for data leak protection, the computer program comprising a routine set of instructions which when executed by a machine causes the machine to perform:
-
receiving a database query; producing metrics, by an intrusion detection system (IDS), for said database query; receiving the result set produced by said database query; and limiting a response to said database query based upon; a shape of said result set produced by said database query, said metrics, and a data leak protection policy specifying a set of limitations for a corresponding set of shapes and metrics. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. An information hardware system configured for data leak protection comprising:
-
a database server configured to receive a database query and produce a result set for the database query; an intrusion detection system (IDS) coupled to said database server; and
,a data leak protection system configured to limit a response to the database query based upon; a shape of the result set produced by said database query, a data leak protection policy specifying a set of limitations for a corresponding set of shapes and metrics. - View Dependent Claims (18, 19, 20, 21, 22, 23)
-
Specification