Reactive anti-tampering system for protected services in an enterprise computing system
An enterprise computing system may utilize a management infrastructure that interacts with protected services in the system. The management infrastructure accepts requests through an anti-tamper procedure that specifies a tamper event, a crucial service to be protected, and a remedial action that ma...
Saved in:
Main Authors | , , |
---|---|
Format | Patent |
Language | English |
Published |
17.06.2014
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | An enterprise computing system may utilize a management infrastructure that interacts with protected services in the system. The management infrastructure accepts requests through an anti-tamper procedure that specifies a tamper event, a crucial service to be protected, and a remedial action that may be applied when the tamper event occurs on the protected service. The anti-tamper procedure may be created by a system administrator and distributed to one or more client devices in the system. The management infrastructure monitors a protected service in accordance with the operations and actions specified in the anti-tamper procedure thereby ensuring that the integrity of the system is preserved. |
---|---|
Bibliography: | Application Number: US201113283635 |