Error and exception message handling framework

Information security – Prevention of unauthorized use of data including prevention...

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

Reexamination Certificate

active

07966664

ABSTRACT:
Described are systems and methods for counteracting attempts at unauthorized use of information systems. An error message generated in response to an error in the information system is received, where the error message includes a set of information describing the error. The received error message is then translated into an obfuscated message, where the obfuscated message replaces at least a portion of the set of information describing the error with a set of alternative information. The obfuscated message is then presented to a user via a user interface.

REFERENCES:
patent: 6408391 (2002-06-01), Huff et al.
patent: 6954133 (2005-10-01), McGregor et al.
patent: 2005/0041789 (2005-02-01), Warren-Smith et al.
“Exception Handling,” Wikipedia, [online],<http://en.wikipedia.org/wiki/Exception—handling>, retrieved Jan. 5, 2009, 9 pages.
Illco of Mayday Software Productions, “C++Exception Handling,” [online], <http://www.eastcoastgames.com/articles/cppexception.html>, retrieved Jan. 5, 2009, 3 pages.
“Java beginner.com,Understanding Java Exceptions,” [online], <http://www.javabeginner.com/learn-java/understanding-java-exceptions>, retrieved Jan. 16, 2009, 5 pages.
“Obfuscated Code,” Wikipedia, [online], <http://en.wikipedia.org/wiki/Obfuscated—code>, retrieved Feb. 6, 2009, 11 pages.
PreEmptive Solutions, “NET Obfuscator and Java Obfuscator—Code Protection and Application Hardening,” [online], <http://preemptive.com/obfuscator.html>, retrieved Mar. 23, 2009, 2 pages.
Intrusion Detection FAQ: What is a Honeypot?, [online], <http://www.sans.org/resources/idfaq/honeypot3.php>, retrieved Mar. 23, 2009, 4 pages.
Honeypots, Intrusion Detection, Incident Response, “Intrusion Detection, Honeypots and Incident Handling Resources,” [online], <http://www.honeypots.net/>, retrieved Mar. 23, 2009, 2 pages.
Spitzner, Lance, “Honeypots, Definitions and Value of Honeypots,” May 29, 2003, Online, <http://www.tracking-hackers.com/papers/honeypots.html>, retrieved Mar. 31, 2008, 6 pages.
Spitzner, Lance, “Problems and Challenges with Honeypots,” Jan. 14, 2004, Online, <http://www.securityfocus.com/print/infocus/1757>, retrieved Mar. 26, 2008, 4 pages.
“Honeypot(computing),”Wikipedia, Online, <http://en.wikipedia.org/w/index.php?title+Honeypot—%28computing%29&printable=yes>, retrieved Mar. 18, 2008, 6 pages.
Levine, John, et al, “The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks,” Proceedings of the 2003 IEEE Workshop on Information Assurance, United States Military Academy, West Point, NY, Jun. 2003, 8 pages.
Spitzner, Lance, “Honeypots: Simple, Cost-Effective Detection,” Apr. 30, 2003 Online,<http://www.securityfocus.com/print/infocus/1690>, retrieved Mar. 31, 2008, 5 pages.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Error and exception message handling framework does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Error and exception message handling framework, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Error and exception message handling framework will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2656897

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.