defining at least one intrusion detection policy for the database;
associating each user with one of the defined policies;
receiving a database query from a user;
determining if the results of the query violate the intrusion detection policy; and
altering the user’s authorization if the intrusion detection policy has been violated.
Defendant Motion for Judgment on the Pleadings.
“[L]imiting access to information based on access policies or suspicious requests.”
“Here, the independent claims merely describe, in broad strokes, the implementation of an abstract idea in a general purpose computer environment.”
Date: Oct. 19, 2015
Court: N.D. Cal.
Disposition: Motion granted
Reviewed Claim(s): Claim 1
Category: Organizing Human Activity
Method for intrusion detection in a database system