A security component determines whether a request for a resource poses a security risk to a computing device and verifies the integrity of the requested resource before the request is allowed. For a request having arguments and a resource path with a filename that identifies the resource, the securi
A security component determines whether a request for a resource poses a security risk to a computing device and verifies the integrity of the requested resource before the request is allowed. For a request having arguments and a resource path with a filename that identifies the resource, the security component determines that the request does not pose a security risk if the resource path does not exceed a maximum number of characters, individual arguments do not exceed a maximum number of characters, the arguments combined do not exceed a maximum number of characters, and the filename has a valid extension. The security component verifies the integrity of a requested resource by formulating a descriptor corresponding to the resource and comparing the descriptor with a cached descriptor corresponding to the resource.
대표청구항▼
We claim: 1. A network system, comprising: a first device to maintain an original resource; a second device to maintain a replica resource remotely from the first device, the replica resource being replicated from the original resource; memory to store a cached descriptor corresponding to the origi
We claim: 1. A network system, comprising: a first device to maintain an original resource; a second device to maintain a replica resource remotely from the first device, the replica resource being replicated from the original resource; memory to store a cached descriptor corresponding to the original resource; a security component to determine whether a request for the replica resource will pose a security risk comprising a buffer overrun to the second device where the request designates a resource locator, wherein the request further designates the resource locator having a plurality of arguments, and wherein the security component determines that the request is not a security risk if individual arguments do not exceed a maximum number of characters, and if a total number of characters defining all of the arguments do not exceed a maximum number of characters, the security component further configured to determine whether the replica resource will pose a security risk to the second device upon receipt of a request for the replica resource, the security component configured to: formulate a descriptor corresponding to the replica resource and compare the formulated descriptor with the cached descriptor; and if the formulated descriptor and the cached descriptor are not equivalent, formulate a second descriptor corresponding to the original resource and compare the formulated descriptor with the second descriptor. 2. A network system as recited in claim 1, wherein the security component determines that the replica resource is not a security risk if the formulated descriptor and the cached descriptor are equivalent. 3. A network system as recited in claim 1, wherein, if the formulated descriptor and the cached descriptor are not equivalent, and if the formulated descriptor and the second descriptor are equivalent, the security component determines that the replica resource is not a security risk. 4. A network system as recited in claim 1, wherein, if the formulated descriptor and the cached descriptor are not equivalent, and if the formulated descriptor and the second descriptor are equivalent, the security component determines that the replica resource is not a security risk, and the cached descriptor is replaced with the second descriptor. 5. A network system as recited in claim 1, wherein, if the formulated descriptor and the cached descriptor are not equivalent, and if the formulated descriptor and the second descriptor are not equivalent, the security component determines that the replica resource is a security risk, and the replica resource is replaced with a copy of the original resource. 6. A network system as recited in claim 1, wherein, if the formulated descriptor and the cached descriptor are not equivalent, and if the formulated descriptor and the second descriptor are not equivalent, the security component determines that the replica resource is a security risk, the replica resource is replaced with a copy of the original resource, and the cached descriptor is replaced with the second descriptor. 7. A network system as recited in claim 1, wherein the security component formulates the cached descriptor when the original resource is replicated to create the replica resource. 8. A network system as recited in claim 1, wherein the request further designates the resource locator having a resource identifier, and wherein the security component determines that the request is not a security risk if the resource identifier has a valid file extension. 9. A network system as recited in claim 1, wherein: the request further designates the resource locator having a resource path and one or more arguments, the resource path identifying a location of the replica resource and the resource path having a resource identifier; the security component determines that the request is not a security risk if: the resource path does not exceed a maximum number of characters; individual arguments do not exceed a maximum number of characters; a total number of characters defining all of the arguments do not exceed a maximum number of characters; and the resource identifier has a valid file extension. 10. A network server, comprising: a server component to receive a request for a resource maintained on the network server and, in response to the request, implement security policies to prevent unauthorized access to the resource; a memory to store a cached descriptor corresponding to the resource; and a security component that is registerable with the server component during run-time to determine whether the request will pose a security risk comprising a buffer overrun to the network server, the request posing the security risk if the resource has been corrupted and if execution of the resource will compromise the network server, the security component being configured to: formulate a replica descriptor corresponding to a replica of the resource and compare the replica descriptor with the cached descriptor; if the replica descriptor and the cached descriptor are not equivalent, formulate a second descriptor corresponding to the resource and compare the replica descriptor with the second descriptor; and wherein the request designates a resource locator having a resource path and one or more arguments, the resource path identifying a location of the resource and the resource path having a resource identifier, and wherein the security component determines that the request is not a security risk if a total number of characters defining all of the arguments do not exceed a maximum number of 2,068 characters and the resource identifier has a valid file extension. 11. A network server as recited in claim 10, wherein, if the security component determines that the request will pose a security risk to the network server, the security component redirects the request to indicate that the resource is not available. 12. A network server as recited in claim 10, wherein the request designates a resource locator having a resource path, the resource path identifying a location of the resource, and wherein the security component determines that the request is not a security risk if the resource path does not exceed a maximum number of characters. 13. A network server as recited in claim 10, wherein the request designates a resource locator having a resource identifier, and wherein the security component determines that the request is not a security risk if the resource identifier has a valid file extension. 14. A network server as recited in claim 10, wherein: the security component determines that the request is not a security risk if: the resource path does not exceed a maximum number of characters. 15. A network server system, comprising: a server component in a network server to receive a request for a resource maintained on the network server, the request designating a resource locator having a resource path that identifies a location of the resource, and, in response to the request, implement security policies to prevent unauthorized access to the resource; a memory to store a cached descriptor corresponding to the resource; and a security component in a computing device remote to the network server and registerable with the server component during run-time to determine whether the resource will pose a security risk to the network server upon receipt of the request, wherein the request further designates the resource locator having a plurality of arguments, and wherein the security component determines that the request is not a security risk if individual arguments do not exceed a maximum number of characters, and if a total number of characters defining all of the arguments do not exceed a maximum number of characters, the security component being configured to: formulate a replica descriptor corresponding to a replica of the resource and compare the replica descriptor with the cached descriptor; and if the replica descriptor and the cached descriptor are not equivalent, formulate a second descriptor corresponding to the resource and compare the replica descriptor with the second descriptor. 16. A network server system as recited in claim 15, wherein, if the security component determines that the resource will pose a security risk, the security component redirects the request to indicate that the resource is not available. 17. A network server system as recited in claim 15, wherein the security component: formulates a descriptor corresponding to the resource; compares the formulated descriptor with a cached descriptor, the cached descriptor corresponding to the resource and formulated when the resource is initially requested; and determines that the resource is not a security risk if the formulated descriptor and the cached descriptor are equivalent. 18. A network server system as recited in claim 15, wherein the security component: formulates a descriptor corresponding to the resource; compares the formulated descriptor with a cached descriptor, the cached descriptor corresponding to the resource and formulated when the resource is initially requested; if the formulated descriptor and the cached descriptor are not equivalent, formulates a second descriptor corresponding to an original resource maintained on a file server remotely located from the network server, the resource being replicated from the original resource; compares the formulated descriptor with the second descriptor; and determines that the resource is not a security risk if the formulated descriptor and the second descriptor are equivalent. 19. A network server system as recited in claim 15, wherein the security component: formulates a descriptor corresponding to the resource; compares the formulated descriptor with a cached descriptor, the cached descriptor corresponding to the resource and formulated when the resource is initially requested; if the formulated descriptor and the cached descriptor are not equivalent, formulates a second descriptor corresponding to an original resource maintained on a file server remotely located from the network server, the resource being replicated from the original resource; compares the formulated descriptor with the second descriptor; if the formulated descriptor and the second descriptor are not equivalent, initiates that the resource stored on the network server be replaced with a copy of the original resource maintained on the file server; and initiates that the cached descriptor be replaced with the second descriptor.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (1)
David A. Farber ; Ronald D. Lachman, Identifying and requesting data in network using identifiers which are based on contents of data.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.