System, method, and computer program product for securing data on a server based on a heuristic analysis
First Claim
Patent Images
1. A method, comprising:
- recording information associated with attempts to access data on a server, wherein the attempts are provided remotely over a network to which the server is coupled;
heuristically analyzing the information, which includes comparing a previous attempt to access the data with a latest attempt to access the data in order to identify a pattern associated with data leakage; and
securing the data on the server such that access to the data is prevented for a predefined period of time based on the pattern.
9 Assignments
0 Petitions
Accused Products
Abstract
A system, method, and computer program product are provided for securing data on a server based on a heuristic analysis. In use, information associated with attempts to access data on a server is recorded. Additionally, the information is heuristically analyzed. Further, the data is secured on the server based on the heuristic analysis.
20 Citations
30 Claims
-
1. A method, comprising:
-
recording information associated with attempts to access data on a server, wherein the attempts are provided remotely over a network to which the server is coupled; heuristically analyzing the information, which includes comparing a previous attempt to access the data with a latest attempt to access the data in order to identify a pattern associated with data leakage; and securing the data on the server such that access to the data is prevented for a predefined period of time based on the pattern. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A server, comprising:
a processor coupled to a memory such that the server is configured to; record information associated with attempts to access data on the server, wherein the attempts are provided remotely over a network to which the server is coupled; analyze the information, which includes comparing a previous attempt to access the data with a latest attempt to access the data in order to identify a pattern associated with data leakage; and secure the data on the server such that access to the data is prevented for a predefined period of time based on the pattern. - View Dependent Claims (14, 15, 16, 17, 18)
-
19. A computer program product embodied on a non-transitory computer readable medium for:
-
recording information associated with attempts to access data on a server, wherein the attempts are provided remotely over a network to which the server is coupled; heuristically analyzing the information, which includes comparing a previous attempt to access the data with a latest attempt to access the data in order to identify a pattern associated with data leakage; and securing the data on the server such that access to the data is prevented for a predefined period of time based on the pattern. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30)
-
Specification