Methods, systems and computer program products for...

Electrical computers and digital processing systems: support – Data processing protection using cryptography – Tamper resistant

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S188000, C713S189000, C713S193000

Reexamination Certificate

active

10785132

ABSTRACT:
Methods, systems and computer program products are disclosed for monitoring user behavior for a server application in a computer network. The methods, systems, and computer program products can monitor communication data between a server application and a client. The methods, systems, and computer program products can also include applying one or more detectors to the communication data to identify a variety of predetermined activity. Further, the methods, systems, and computer program products can include generating a threat score associated with the predetermined activity by comparing the identified predetermined activity with a security threshold criteria.

REFERENCES:
patent: 5956709 (1999-09-01), Xue
patent: 6052730 (2000-04-01), Felciano et al.
patent: 6240450 (2001-05-01), Sharples et al.
patent: 6281790 (2001-08-01), Kimmel et al.
patent: 6286046 (2001-09-01), Bryant
patent: 6405318 (2002-06-01), Rowland
patent: 6549208 (2003-04-01), Maloney et al.
patent: 6609246 (2003-08-01), Guhr et al.
patent: 2001/0037358 (2001-11-01), Clubb et al.
patent: 2001/0044309 (2001-11-01), Bar et al.
patent: 2002/0023108 (2002-02-01), Daswani et al.
patent: 2002/0032725 (2002-03-01), Araujo et al.
patent: 2002/0032731 (2002-03-01), Qian et al.
patent: 2002/0035498 (2002-03-01), Kehoe et al.
patent: 2002/0042821 (2002-04-01), Muret et al.
patent: 2002/0046350 (2002-04-01), Lordemann et al.
patent: 2002/0059528 (2002-05-01), Dapp
patent: 2002/0066035 (2002-05-01), Dapp
patent: 2002/0078382 (2002-06-01), Sheikh et al.
patent: 2002/0093527 (2002-07-01), Sherlock et al.
patent: 2002/0103896 (2002-08-01), Lemon
patent: 2002/0124047 (2002-09-01), Gartner et al.
patent: 2002/0124075 (2002-09-01), Venkatesan
patent: 2002/0137524 (2002-09-01), Bade et al.
patent: 2002/0143813 (2002-10-01), Jellum et al.
patent: 2002/0143931 (2002-10-01), Smith et al.
patent: 2002/0144156 (2002-10-01), Copeland, III
patent: 2002/0147570 (2002-10-01), Kraft et al.
patent: 2002/0152284 (2002-10-01), Cambray et al.
patent: 2002/0162017 (2002-10-01), Sorkin et al.
patent: 2002/0165954 (2002-11-01), Eshghi et al.
patent: 2002/0174174 (2002-11-01), Ramraj et al.
patent: 2002/0188864 (2002-12-01), Jackson
patent: 2003/0036886 (2003-02-01), Stone
patent: 2003/0060212 (2003-03-01), Thomas
patent: 2003/0074400 (2003-04-01), Brooks et al.
patent: 2003/0088663 (2003-05-01), Battat et al.
patent: 2003/0135509 (2003-07-01), Davis et al.
patent: 2003/0135759 (2003-07-01), Kim et al.
patent: 2003/0135865 (2003-07-01), Jung
patent: 2003/0139990 (2003-07-01), Greco
patent: 2003/0149887 (2003-08-01), Yadav
patent: 2003/0149888 (2003-08-01), Yadav
patent: 2003/0163730 (2003-08-01), Roskind et al.
patent: 2003/0195803 (2003-10-01), Ketonen
patent: 2003/0204719 (2003-10-01), Ben-Itzhaki
patent: 2003/0208533 (2003-11-01), Farquharson et al.
patent: 2383431 (2001-03-01), None
patent: 2352110 (2001-04-01), None
patent: 2388389 (2001-05-01), None
patent: 2441230 (2002-09-01), None
patent: 1139221 (2001-04-01), None
patent: 2357679 (2001-06-01), None
patent: 2357680 (2001-06-01), None
patent: 2360608 (2001-09-01), None
patent: 10254732 (1998-09-01), None
patent: 10333940 (1998-12-01), None
patent: 11355759 (1999-12-01), None
patent: 2000172607 (2000-06-01), None
patent: 2000250844 (2000-09-01), None
patent: 2001125853 (2001-05-01), None
patent: 2001218192 (2001-08-01), None
patent: 2001312429 (2001-11-01), None
patent: 2001325680 (2001-11-01), None
patent: 2002034029 (2002-01-01), None
patent: 2002049537 (2002-02-01), None
patent: 2002158995 (2002-05-01), None
patent: 2002163161 (2002-06-01), None
patent: 2002183853 (2002-06-01), None
patent: 2002197564 (2002-07-01), None
patent: 2002259237 (2002-09-01), None
patent: 2002262371 (2002-09-01), None
patent: 2002268733 (2002-09-01), None
patent: 2002281573 (2002-09-01), None
patent: 2003005837 (2003-01-01), None
patent: 2003067330 (2003-03-01), None
patent: 2003114812 (2003-04-01), None
patent: 05/32010 (2003-05-01), None
patent: 99/18532 (1999-04-01), None
patent: 00/27088 (2000-05-01), None
patent: 00/60467 (2000-10-01), None
patent: 01/16912 (2001-03-01), None
patent: 01/20503 (2001-03-01), None
patent: 01/24475 (2001-04-01), None
patent: 01/25896 (2001-04-01), None
patent: 01/31852 (2001-05-01), None
patent: 01/48505 (2001-07-01), None
patent: 01/71498 (2001-09-01), None
patent: 01/80494 (2001-10-01), None
patent: 02/01381 (2002-01-01), None
patent: 02/50703 (2002-06-01), None
patent: 02/075547 (2002-09-01), None
patent: 02/077867 (2002-10-01), None
patent: 02/077869 (2002-10-01), None
patent: 00/54458 (2003-03-01), None
patent: 03/056430 (2003-07-01), None
Lam et al., “Multivariate Data Analysis Software for Enhancing System Security,” J. Systems Software, p. 267-275 (1995).
Wu et al., “SpeedTracer: A Web Usage Mining and Analysis Tool,” IBM Systems Journal, vol. 37, No. 1, p. 89-105, (1998).
Iguchi et al., “Network Surveillance for Detecting Intrusions,” IEEE, p. 99-106 (1999).
Ko, “Logic Induction of Valid Behavior Specifications for Intrusion Detection,” IEEE, p. 142-153 (2000).
Seleznyov et al., “Learning Temporal Regularities of User Behavior for Anomaly Detection,” Information Assurance in Computer Networks, p. 143-152. (2001).
Bauer et al., “Detecting Anamalous Behavior: Optimization of Network Traffic Parameters Via an Evolution Strategy”, IEEE, p. 34-39 (2001).
Singh et al., “Investigating and Evaluating Behavioural Profiling and Intrusion Detection Using Data Mining,” Information Assurance in Computer Networks, p. 153-158 (2001).
Wenhui, “A Novel Intrusion Detection System Model for Securing Web-based Database Systems”, IEEE, p. 249-254 (2001).
Ganger, “Position Summary: Authentication Confidences”, IEEE Workshop on Hot Topics in Operating Systems HOTOS 8th, p. 169 (May 2001).
Wei-Min et al., “The Intrusion Detection Based on Genetic Algorithms,” Journal of Shanghai University, vol. 5, Suppl. p. 66-69 (Sep. 2001).
Cansian et al., “An Attack Signature Model to Computers Security Intrusion Detection,” IEEE, p. 1368-1373, (2002).
Mukkamala et al., “Intrusion Detection Using Neural Networks and Support Vector Machines”, IEEE, p. 1702-1707 (2002).
Chauhan, “Blocking Attacks on Applications,” SC Magazine (May 2003).

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Methods, systems and computer program products for... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Methods, systems and computer program products for..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Methods, systems and computer program products for... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3911710

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.