Electrical computers and digital processing systems: support – Data processing protection using cryptography – Tamper resistant
Reexamination Certificate
2008-05-13
2008-05-13
Peeso, Thomas R. (Department: 2132)
Electrical computers and digital processing systems: support
Data processing protection using cryptography
Tamper resistant
C713S188000, C713S189000, C713S193000
Reexamination Certificate
active
07373524
ABSTRACT:
Methods, systems and computer program products are disclosed for monitoring user behavior for a server application in a computer network. The methods, systems, and computer program products can monitor communication data between a server application and a client. The methods, systems, and computer program products can also include applying one or more detectors to the communication data to identify a variety of predetermined activity. Further, the methods, systems, and computer program products can include generating a threat score associated with the predetermined activity by comparing the identified predetermined activity with a security threshold criteria.
REFERENCES:
patent: 5956709 (1999-09-01), Xue
patent: 6052730 (2000-04-01), Felciano et al.
patent: 6240450 (2001-05-01), Sharples et al.
patent: 6281790 (2001-08-01), Kimmel et al.
patent: 6286046 (2001-09-01), Bryant
patent: 6405318 (2002-06-01), Rowland
patent: 6549208 (2003-04-01), Maloney et al.
patent: 6609246 (2003-08-01), Guhr et al.
patent: 2001/0037358 (2001-11-01), Clubb et al.
patent: 2001/0044309 (2001-11-01), Bar et al.
patent: 2002/0023108 (2002-02-01), Daswani et al.
patent: 2002/0032725 (2002-03-01), Araujo et al.
patent: 2002/0032731 (2002-03-01), Qian et al.
patent: 2002/0035498 (2002-03-01), Kehoe et al.
patent: 2002/0042821 (2002-04-01), Muret et al.
patent: 2002/0046350 (2002-04-01), Lordemann et al.
patent: 2002/0059528 (2002-05-01), Dapp
patent: 2002/0066035 (2002-05-01), Dapp
patent: 2002/0078382 (2002-06-01), Sheikh et al.
patent: 2002/0093527 (2002-07-01), Sherlock et al.
patent: 2002/0103896 (2002-08-01), Lemon
patent: 2002/0124047 (2002-09-01), Gartner et al.
patent: 2002/0124075 (2002-09-01), Venkatesan
patent: 2002/0137524 (2002-09-01), Bade et al.
patent: 2002/0143813 (2002-10-01), Jellum et al.
patent: 2002/0143931 (2002-10-01), Smith et al.
patent: 2002/0144156 (2002-10-01), Copeland, III
patent: 2002/0147570 (2002-10-01), Kraft et al.
patent: 2002/0152284 (2002-10-01), Cambray et al.
patent: 2002/0162017 (2002-10-01), Sorkin et al.
patent: 2002/0165954 (2002-11-01), Eshghi et al.
patent: 2002/0174174 (2002-11-01), Ramraj et al.
patent: 2002/0188864 (2002-12-01), Jackson
patent: 2003/0036886 (2003-02-01), Stone
patent: 2003/0060212 (2003-03-01), Thomas
patent: 2003/0074400 (2003-04-01), Brooks et al.
patent: 2003/0088663 (2003-05-01), Battat et al.
patent: 2003/0135509 (2003-07-01), Davis et al.
patent: 2003/0135759 (2003-07-01), Kim et al.
patent: 2003/0135865 (2003-07-01), Jung
patent: 2003/0139990 (2003-07-01), Greco
patent: 2003/0149887 (2003-08-01), Yadav
patent: 2003/0149888 (2003-08-01), Yadav
patent: 2003/0163730 (2003-08-01), Roskind et al.
patent: 2003/0195803 (2003-10-01), Ketonen
patent: 2003/0204719 (2003-10-01), Ben-Itzhaki
patent: 2003/0208533 (2003-11-01), Farquharson et al.
patent: 2383431 (2001-03-01), None
patent: 2352110 (2001-04-01), None
patent: 2388389 (2001-05-01), None
patent: 2441230 (2002-09-01), None
patent: 1139221 (2001-04-01), None
patent: 2357679 (2001-06-01), None
patent: 2357680 (2001-06-01), None
patent: 2360608 (2001-09-01), None
patent: 10254732 (1998-09-01), None
patent: 10333940 (1998-12-01), None
patent: 11355759 (1999-12-01), None
patent: 2000172607 (2000-06-01), None
patent: 2000250844 (2000-09-01), None
patent: 2001125853 (2001-05-01), None
patent: 2001218192 (2001-08-01), None
patent: 2001312429 (2001-11-01), None
patent: 2001325680 (2001-11-01), None
patent: 2002034029 (2002-01-01), None
patent: 2002049537 (2002-02-01), None
patent: 2002158995 (2002-05-01), None
patent: 2002163161 (2002-06-01), None
patent: 2002183853 (2002-06-01), None
patent: 2002197564 (2002-07-01), None
patent: 2002259237 (2002-09-01), None
patent: 2002262371 (2002-09-01), None
patent: 2002268733 (2002-09-01), None
patent: 2002281573 (2002-09-01), None
patent: 2003005837 (2003-01-01), None
patent: 2003067330 (2003-03-01), None
patent: 2003114812 (2003-04-01), None
patent: 05/32010 (2003-05-01), None
patent: 99/18532 (1999-04-01), None
patent: 00/27088 (2000-05-01), None
patent: 00/60467 (2000-10-01), None
patent: 01/16912 (2001-03-01), None
patent: 01/20503 (2001-03-01), None
patent: 01/24475 (2001-04-01), None
patent: 01/25896 (2001-04-01), None
patent: 01/31852 (2001-05-01), None
patent: 01/48505 (2001-07-01), None
patent: 01/71498 (2001-09-01), None
patent: 01/80494 (2001-10-01), None
patent: 02/01381 (2002-01-01), None
patent: 02/50703 (2002-06-01), None
patent: 02/075547 (2002-09-01), None
patent: 02/077867 (2002-10-01), None
patent: 02/077869 (2002-10-01), None
patent: 00/54458 (2003-03-01), None
patent: 03/056430 (2003-07-01), None
Lam et al., “Multivariate Data Analysis Software for Enhancing System Security,” J. Systems Software, p. 267-275 (1995).
Wu et al., “SpeedTracer: A Web Usage Mining and Analysis Tool,” IBM Systems Journal, vol. 37, No. 1, p. 89-105, (1998).
Iguchi et al., “Network Surveillance for Detecting Intrusions,” IEEE, p. 99-106 (1999).
Ko, “Logic Induction of Valid Behavior Specifications for Intrusion Detection,” IEEE, p. 142-153 (2000).
Seleznyov et al., “Learning Temporal Regularities of User Behavior for Anomaly Detection,” Information Assurance in Computer Networks, p. 143-152. (2001).
Bauer et al., “Detecting Anamalous Behavior: Optimization of Network Traffic Parameters Via an Evolution Strategy”, IEEE, p. 34-39 (2001).
Singh et al., “Investigating and Evaluating Behavioural Profiling and Intrusion Detection Using Data Mining,” Information Assurance in Computer Networks, p. 153-158 (2001).
Wenhui, “A Novel Intrusion Detection System Model for Securing Web-based Database Systems”, IEEE, p. 249-254 (2001).
Ganger, “Position Summary: Authentication Confidences”, IEEE Workshop on Hot Topics in Operating Systems HOTOS 8th, p. 169 (May 2001).
Wei-Min et al., “The Intrusion Detection Based on Genetic Algorithms,” Journal of Shanghai University, vol. 5, Suppl. p. 66-69 (Sep. 2001).
Cansian et al., “An Attack Signature Model to Computers Security Intrusion Detection,” IEEE, p. 1368-1373, (2002).
Mukkamala et al., “Intrusion Detection Using Neural Networks and Support Vector Machines”, IEEE, p. 1702-1707 (2002).
Chauhan, “Blocking Attacks on Applications,” SC Magazine (May 2003).
Choy Albert Ming
Gramley Kenneth Robert
Hargett Byron Lee
Hester Douglas Wayne
Logan David Byron
Covelight Systems, Inc.
Jenkins Wilson Taylor & Hunt, P.A.
Peeso Thomas R.
LandOfFree
Methods, systems and computer program products for... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Methods, systems and computer program products for..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Methods, systems and computer program products for... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2754452