×

Network intrusion blocking security overlay

  • US 8,261,326 B2
  • Filed: 04/25/2008
  • Issued: 09/04/2012
  • Est. Priority Date: 04/25/2008
  • Status: Active Grant
First Claim
Patent Images

1. A method of scrutinizing database connections comprising:

  • receiving a transaction requesting to access a database, the transaction received on a connection, the connection being between the database and an access portal of a server operable to access the database;

    identifying, via a lightweight check, a set of connection attributes corresponding to the connection and determining a level of scrutiny to be applied to the connection based on the connection attributes, wherein the connection attributes indicate the level of scrutiny;

    selectively transmitting, based on the connection attributes being indicative of a need to analyze the connection, the received transaction to an evaluator, the evaluator operable to apply a set of access rules for determining a verdict specifying whether the received transaction is a suspect transaction indicative of undesirable access, the selectively transmitting further comprising;

    computing the verdict at the evaluator by applying the set of access rules to the received transaction, the evaluator distinct from the server operable to access the database and having separate computing resources; and

    receiving the verdict, the verdict indicative of a responsive action based on applying the set of access rules to the received transaction;

    computing, from the connection attributes, the responsive action when the connection attributes do not indicate that the received transaction is a suspect transaction indicative of undesirable access and the need for analyzing the received transaction at the evaluator; and

    applying the responsive action to the received transaction.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×