The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Nov. 05, 2019

Filed:

May. 05, 2017
Applicant:

Auburn University, Auburn, AL (US);

Inventors:

Chwan-Hwa Wu, Auburn, AL (US);

J. David Irwin, Auburn, AL (US);

Daoqi Hou, Auburn, AL (US);

Assignee:

Auburn University, Auburn, AL (US);

Attorneys:
Primary Examiner:
Int. Cl.
CPC ...
H04L 9/08 (2006.01); H04L 29/06 (2006.01); H04L 9/06 (2006.01); H04L 9/32 (2006.01); G06F 21/54 (2013.01);
U.S. Cl.
CPC ...
H04L 9/0819 (2013.01); G06F 21/54 (2013.01); H04L 9/0637 (2013.01); H04L 9/0869 (2013.01); H04L 9/0891 (2013.01); H04L 9/0894 (2013.01); H04L 9/3242 (2013.01); H04L 63/0428 (2013.01); H04L 63/1416 (2013.01); H04L 63/1483 (2013.01); H04L 2209/80 (2013.01);
Abstract

The present system and method allow for preemptive, self-healing computer security. The system includes a user device processor and a PSS server processor. The two processors perform an initial Data Structure & Key Mutation (DSKM) method and an interval DSKM method at a given interval to protect secret information and prevent its exposure by attackers. When a user requests a site or service that is an attractive target for attackers, such as a bank site or monetary transfer service, the processors perform a Man in the Browser attack prevention method. When a packet is received or generated, the processors perform a Deep Protocol and Stateful Inspection and Prevention method to prevent receipt of malicious packets or the loss of sensitive information. Various forensics modules allow accurate forensic examination of the type, scope, and method of attack, as well as real-time protection of cloud-based services.


Find Patent Forward Citations

Loading…