×

System for tracking and analyzing the integrity of an application

  • US 7,805,419 B2
  • Filed: 07/10/2006
  • Issued: 09/28/2010
  • Est. Priority Date: 07/11/2005
  • Status: Active Grant
First Claim
Patent Images

1. A method for detecting modifications in an application executing on a computer system comprising:

  • connecting to the application on the computer system;

    inventorying the application in order to discover a baseline inventory of existing items in the application, wherein the baseline inventory of existing items in the application includes a set of stored procedures, the set of stored procedures including user-defined stored procedures and system stored procedures, the step of inventorying comprising the step of running commands or requests in order to enumerate the items in the application;

    storing the baseline inventory to persistent storage;

    collecting a second inventory list of items in the application by running commands or requests in order to enumerate a second set of items in the application;

    comparing the second inventory list of items with the baseline inventory of the application to determine a set of differences between them by enumerating each item in the second inventory with items in the baseline inventory, determining if any item exists in the baseline inventory but not in the second inventory, determining if any item exists in the second inventory but not in the baseline inventory, determining if any item in both the baseline inventory and the second inventory has been changed;

    reporting out the set of differences between the baseline inventory and the second inventory to enable a determination of whether unauthorized activity has occurred at the application level;

    determining from the set of differences between the baseline inventory and the second inventory an instance of unauthorized activity; and

    authorizing or rejecting the instance of unauthorized activity.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×