Methods and systems for implementing a self defending/repairing database
First Claim
1. A method of self defending and repairing a database, the method comprising:
- installing, at a database server, a database security component;
configuring the database security component in a self-defense mode to monitor database management applications and/or software running on the database server and to immediately identify and repair any modifications to the database management applications and/or software;
initializing the database security component, wherein the initializing of the database security component includes;
storing a secure mirror copy of the original source code in a secure, read-only and encrypted storage location, wherein the database security component is configured to monitor the code modifications and replace the modified code with the original code;
replacing the modified code with the original code prior to executing of the modified code;
continuously monitoring, at the database server by the security component, for any code modifications to the database management applications and/or software, wherein the database management applications and/or software are configured to maintain the database;
determining that a code modification has occurred to the database management applications and/or software;
checking the code modification for the presence of an authorization key;
in response to an invalid or non-existent authorization key, determining that the code modification is unauthorized;
quarantining the modified code in a secure storage location; and
automatically accessing the original code of the database management applications and/or software from the secure mirror copy of the original source code and replacing the modified code with code from the secure mirror copy of the original code of the database management applications and/or software.
1 Assignment
0 Petitions
Accused Products
Abstract
This disclosure describes, generally, methods and systems for self defending and repairing a database. The method includes monitoring, at a database server, code modifications to a database management application. The database management application is configured to maintain the database. The method further includes determining that a code modification has occurred to the database management application. The method further includes checking the code modification for the presence of an authorization key, and in response to an invalid or non-existent authorization key, determining that the code modification is unauthorized. Further, the method includes quarantining the modified code in a secure storage location, and automatically accessing original code of the database management application and replacing the modified code with code from the original code of the database management application.
-
Citations
10 Claims
-
1. A method of self defending and repairing a database, the method comprising:
-
installing, at a database server, a database security component; configuring the database security component in a self-defense mode to monitor database management applications and/or software running on the database server and to immediately identify and repair any modifications to the database management applications and/or software; initializing the database security component, wherein the initializing of the database security component includes; storing a secure mirror copy of the original source code in a secure, read-only and encrypted storage location, wherein the database security component is configured to monitor the code modifications and replace the modified code with the original code; replacing the modified code with the original code prior to executing of the modified code; continuously monitoring, at the database server by the security component, for any code modifications to the database management applications and/or software, wherein the database management applications and/or software are configured to maintain the database; determining that a code modification has occurred to the database management applications and/or software; checking the code modification for the presence of an authorization key; in response to an invalid or non-existent authorization key, determining that the code modification is unauthorized; quarantining the modified code in a secure storage location; and automatically accessing the original code of the database management applications and/or software from the secure mirror copy of the original source code and replacing the modified code with code from the secure mirror copy of the original code of the database management applications and/or software. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A system for self defending and repairing a database, the system comprising:
-
a database configured to store data; a secure storage location; and a database server coupled with the database and the secure storage location, the database server including a security component, wherein the database server is configured to install the database security component, configure the database security component in a self-defense mode to monitor database management applications and/or software running on the database server and to immediately identify and repair any modifications to the database management applications and/or software, initialize the database security component, wherein the initializing of the database security component includes storing a secure mirror copy of the original source code in a secure, read-only and encrypted storage location, wherein the database security component is configured to monitor the code modifications and replace the modified code with the original code, replace the modified code with the original code prior to executing of the modified code, and wherein the security component is configured to continuously monitor code modifications to the database management applications and/or software, wherein the database management applications and/or software are configured to maintain the database, determine that a code modification has occurred to the database management applications and/or software, check the code modification for the presence of an authorization key, in response to an invalid or non-existent authorization key, determine that the code modification is unauthorized, quarantine the modified code in the secure storage location, and automatically access the original code of the database management applications and/or software from the secure mirror copy of the original source code and replace the modified code with code from the secure mirror copy of the original code of the database management applications and/or software.
-
-
8. A non-transitory machine-readable medium having sets of instructions stored thereon for self defending and repairing a database which, when executed by a machine, cause the machine to:
-
install, at a database server, a database security component; configure the database security component in a self-defense mode to monitor database management applications and/or software running on the database server and to immediately identify and repair any modifications to the database management applications and/or software; initialize the database security component, wherein the initializing of the database security component includes; store a secure mirror copy of the original source code in a secure, read-only and encrypted storage location, wherein the database security component is configured to monitor the code modifications and replace the modified code with the original code; replace the modified code with the original code prior to executing of the modified code; continuously monitor, at the database server by the security component, for any code modifications to the database management applications and/or software, wherein the database management applications and/or software are configured to maintain the database; determine that a code modification has occurred to the database management applications and/or software; check the code modification for the presence of an authorization key; in response to an invalid or non-existent authorization key, determine that the code modification is unauthorized; quarantine the modified code in a secure storage location; and automatically access the original code of the database management applications and/or software from the secure mirror copy of the original source code and replacing the modified code with code from the secure mirror copy of the original code of the database management applications and/or software. - View Dependent Claims (9, 10)
-
Specification