System, method, and computer program product for securing data on a server based on a heuristic analysis
First Claim
Patent Images
1. A method, comprising:
- recording information associated with attempts to access data on a server, wherein the attempts are provided remotely over a network to which the server is coupled;
heuristically analyzing the information associated with the attempts in order to identify a pattern associated with data leakage; and
securing the data on the server for a predefined period of time based on the pattern, wherein an action to secure the data is determined based on a type of access attempted, such that different actions are associated with different types of access attempts, and wherein at least one of the different actions includes securing an access control list (ACL) based on a number of modifications to the ACL, and wherein the data is accessible using an identification file that comprises a private key that can be associated with a public key for accessing the data on the server.
10 Assignments
0 Petitions
Accused Products
Abstract
A system, method, and computer program product are provided for securing data on a server based on a heuristic analysis. In use, information associated with attempts to access data on a server is recorded. Additionally, the information is heuristically analyzed. Further, the data is secured on the server based on the heuristic analysis.
22 Citations
21 Claims
-
1. A method, comprising:
-
recording information associated with attempts to access data on a server, wherein the attempts are provided remotely over a network to which the server is coupled; heuristically analyzing the information associated with the attempts in order to identify a pattern associated with data leakage; and securing the data on the server for a predefined period of time based on the pattern, wherein an action to secure the data is determined based on a type of access attempted, such that different actions are associated with different types of access attempts, and wherein at least one of the different actions includes securing an access control list (ACL) based on a number of modifications to the ACL, and wherein the data is accessible using an identification file that comprises a private key that can be associated with a public key for accessing the data on the server. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A computer program product embodied on a non-transitory computer readable medium for:
-
recording information associated with attempts to access data on a server, wherein the attempts are provided remotely over a network to which the server is coupled; heuristically analyzing the information associated with the attempts in order to identify a pattern associated with data leakage; and securing the data on the server for a predefined period of time based on the pattern, wherein an action to secure the data is determined based on a type of access attempted, such that different actions are associated with different types of access attempts, and wherein at least one of the different actions includes securing an access control list (ACL) based on a number of modifications to the ACL, and wherein the data is accessible using an identification file that comprises a private key that can be associated with a public key for accessing the data on the server.
-
-
20. A system, comprising:
a processor, wherein the system is configured for; recording information associated with attempts to access data on a server, heuristically analyze the information associated with the attempts in order to identify a pattern associated with data leakage; securing the data on the server for a predefined period of time based on the pattern, wherein an action to secure the data is determined based on a type of access attempted, such that different actions are associated with different types of access attempts, and wherein at least one of the different actions includes securing an access control list (ACL) based on a number of modifications to the ACL, and wherein the data is accessible using an identification file that comprises a private key that can be associated with a public key for accessing the data on the server. - View Dependent Claims (21)
Specification