Data processing: database and file management or data structures – Database design – Data structure types
Reexamination Certificate
2006-08-01
2006-08-01
Alam, Shahid (Department: 2162)
Data processing: database and file management or data structures
Database design
Data structure types
C707S793000, C707S793000, C709S225000, C711S100000
Reexamination Certificate
active
07085780
ABSTRACT:
Techniques are provided for monitoring a database system. A set of data elements may be read from a database system into a device. The device may be external to the database system. From the device, a set of analysis operations are performed on the data elements in order to identify if any of the date elements satisfy a criteria for being considered potentially anomalous. A notification is signaled if potentially anomalous data is identified.
REFERENCES:
patent: 5878420 (1999-03-01), de la Salle
patent: 5933604 (1999-08-01), Inakoshi
patent: 6041327 (2000-03-01), Glitho et al.
patent: 6122633 (2000-09-01), Leymann et al.
patent: 6282570 (2001-08-01), Leung et al.
patent: 6473760 (2002-10-01), Klatt et al.
patent: 6597777 (2003-07-01), Ho
patent: 6697810 (2004-02-01), Kumar et al.
patent: 2005/0203881 (2005-03-01), Sakamoto
patent: 0999490 (2000-05-01), None
patent: 1315065 (2003-05-01), None
patent: WO2005/093546 (2005-10-01), None
Jia-Ling Lin, et al., “Abstraction-Based Misuse Detection: High-Level Specifications and Adaptable Strategies,” The IEEE Computer Security Foundations Workshop, Jun. 1998, XP002938218, pp. 190-201.
E. Biermann, et al., “A comparison of Intrusion Detection systems,” Computers & Security, vol. 20, No. 8, Dec. 1, 2001, XP004329578, pp. 676-683.
Noelle McAuliffe, et al., “Is Your Computer Being Misused? A Survey of Current Intrusion Detection System Technology,” 1990, IEEE, pp. 260-272.
Can Türker, et al., “Semantic integrity support in SQL:1999 and commercial (object-) relational database management systems,” The VLDB Journal, Dec. 2001, vol. 10, No. 4, XP-002262248, pp. 241-269.
Erhard Rahm, “Recovery Concepts for Data Sharing Systems,” 1991, IEEE, XP000242728, pp. 368-375.
Christina Yip Chung, et al., “DEMIDS: A Misuse Detection System for Database Systems,” 2000, XP-002262247, pp. 1-21.
International Preliminary Examining Authority, “Notification of Transmittal of the International Preliminary Examination Report,” Jul. 20, 2004, 13 pages.
Current claims from PCT application, International Application No. PCT/US03/05673, 7 pages.
International Searching Authority, “notification of Transmittal of the International Search Report and the Written Opinion of the International Searching Authority, or the Declaration,” PCT/US2005/004934, dated May 13, 2005, 12 pages.
Current Claims, PCT/US2005/004934, 8 pages.
Denning, Dorothy E., “An Intrusion-Detection model,” IEEE Transactions on Software Engineering, IEEE Inc., vol. SE-13, No. 2, Feb. 1, 1987, XP00039382, pp. 222-232.
Lunt, Teresa F. et al., “Knowledge-Based Intrusion Detection,” Proceedings of the annual AI Systems in Government Conference, Washington, D.C. Mar. 27-31, 1989, IEEE, XP10015634, pp. 102-107.
E-mail dated Apr. 23, 2003 frp, Sesh Raj to Van Mahamedi, subject is “Re:iplocks,” 2 pages.
ILOG, Inc., “ILOG—World leader in software components for optimization, business rules and visuali . . . ,” http://www.ilog.com, printed Jun. 3, 2003, 1 page.
“The page cannot be found,” http://www.heroix-international.com/Downloads/pdf/Datasheet—Oracle/Monitor.pdf, printed Jun. 2, 2003, 1 page.
SC Online Magazine, “Symantec ManHunt,” http://www.scmagazine.com/scmagazine/2003—01/test—nss/05.html, printed Jun. 2, 2003, pp. 1-3.
Thomas A. Foster, “Extending the Reach of Global Logistics Systems Throughout the Enterprise,” SupplyChainBrain.com, http://www.supplychainbrain.com/archives/03.03.merge.htm?adcode=90, printed Jun. 2, 2003, pp. 1-7.
FusionApps, “FusionApps Experience - Toysrus.com,” http://www.fusionapps.com/content/experience/dsp—toysrus.cfm, printed Jun. 2, 2003, pp. 1-2.
Scott W. Ambler, “www.agiledata.org: Implementing Security Access Control,” http://www.agiledata.org/essays/accessControl.html, printed Jun. 2, 2003, pp. 1-12.
Gaia Maselli, et al., “Design and Implementation of an Anomaly Detection System: an Empirical Approach,” undated, http://luca.ntop.org/ADS.pdf, pp. 1-20.
Google, “Google Search: rule engine+flag anomalies+data,” http://www.google.com/search?hl=en&lr==ie=UTF-8&oe=UTF-8&q=rule+engine%2Bflag..., printed Jun. 2, 2003, pp. 1-2.
Mukherjee Amarnath
Raj Seshan S.
Sakamoto Akio
Sudia Frank
Alam Shahid
Brokaw Christopher J.
Fleurantin Jean Bolte
Hickman Palermo & Truong & Becker LLP
IPLocks, Inc.
LandOfFree
Method and apparatus for monitoring a database system does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and apparatus for monitoring a database system, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for monitoring a database system will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3685906