The present invention relates to a data processing method and system for validating data, and more particularly to a secure, subscription-based data cleansing technique for input validation.
Software applications are faced with potential breaches of security that are instantiated through a flawed implementation of a data validation routine. In known applications, aspects of data input validation are hard-coded in the applications, thereby making updates to the data validation routines time-consuming and costly. Known Intrusion Detection Systems and Intrusion Protection Systems detect rogue input (e.g., buffer overflow, SQL injection, etc.), but provide for inelegant handling of security exceptions by resorting to ending a Transmission Control Protocol (TCP) connection with a reset flag. Further, a security audit of the individually developed validation modules is expensive because the audit must be performed on a per-application basis. Thus, there exists a need to overcome at least one of the preceding deficiencies and limitations of the related art.
Embodiments of the present invention provide a method of validating data. The method comprises:
a computer receiving data input to a plurality of software applications;
the computer receiving metadata specifying types of the received data;
the computer determining methods to cleanse the received data based on the received metadata;
the computer cleansing and validating the received data based on the received metadata and based on the methods to cleanse the received data, the cleansing and validating resulting from the computer running a software-based validation engine, and the validation engine being external to the plurality of software applications; and
the computer sending the validated data to the plurality of software applications for use by the plurality of software applications.
In one aspect of one or more of the aforementioned embodiments, the method further comprises:
the computer receiving code from a service provider for an update of the validation engine, wherein the update of the validation engine addresses a new event associated with input to a software application of the plurality of software applications, and wherein the receiving code is based on a subscription to the update of the validation engine;
the computer updating the validation engine with the received code; and
the computer running the updated validation engine to mitigate the new event associated with input to the software application without requiring the software application to be updated.
A system, program product and a process for supporting computing infrastructure where the process provides at least one support service are also described herein, where the system, program product and process for supporting computing infrastructure correspond to the aforementioned method.
Embodiments of the present invention provide a validation engine in a subsystem that is separate from the applications whose data is being validated by the validation engine. Being in a separate subsystem, a compromise of the validation engine does not compromise systems that have more sensitive data (e.g., a database utilized by one of the applications). Further, validation rules are updated quickly and efficiently without having to change core application code. Still further, a library of known valid input is used for validation throughout an enterprise, thereby reducing the amount of time spent in testing and certifying the applications. Further yet, performance of the applications can improve because the validation tasks are offloaded to a separate subsystem. Moreover, the validation engine may avoid subsequent runs of an expensive validation routine (e.g., a Luhn routine) by caching the validation result of input to a first application, and then providing the result to a second application that needs validation of the same input.
Embodiments of the present invention may provide a method and system for validating data being input to software applications, where the validation is performed by a validation engine residing in a subsystem that is external to the systems and/or subsystems that run the software applications. Rather than performing input validation themselves, the software applications send the input data along with metadata describing the type of input to the validation engine. A service provider may provide a subscription-based, dynamic updating of the validation engine, thereby flexibly allowing the validation engine to address newly identified events associated with input to the applications, without requiring an update of the code of the applications. The updated validation engine ensures that the latest best practices for secure input validation are available for each application. As used herein, an event is defined as a happening, action or circumstance that has the potential to breach security and cause harm to a system by exploiting a vulnerability of the system.
Externalized Data Validation System
Externalized Data Validation Process
In step 304, application 106-1 (see
In step 306, validation engine 104 (see
In step 308, validation engine 104 (see
In step 310, validation engine 104 (see
In step 312, validation engine 104 (see
In one embodiment, program code for cleansing and/or validating the data in step 310 is audited by auditing code that is included in validation engine 104 (see
In one embodiment, a cryptographic algorithm is included in code for performing the validating in step 310. The cryptographic algorithm may be certified by certifying code that is included in validation engine 104 (see
In one embodiment, step 310 includes validation engine 104 (see
For example, Application 1 may try to determine if 123456789 is a valid credit card number for XYZ Credit Card Company using a Luhn validation routine. The validation engine 104 (see
In step 404, service provider 108 (see
In step 406, service provider 108 (see
In step 408, computer system 102 (see
In step 410, the updated validation engine mitigates the event(s) identified in step 402 (e.g., by using updated and/or new validation rules to validate input) without requiring an update of program code of application 106-1 (see
Computer System
Memory 604 may comprise any known computer-readable storage medium, which is described below. In one embodiment, cache memory elements of memory 604 provide temporary storage of at least some program code (e.g., program code 614 and 616) in order to reduce the number of times code must be retrieved from bulk storage while instructions of the program code are carried out. Moreover, similar to CPU 602, memory 604 may reside at a single physical location, comprising one or more types of data storage, or be distributed across a plurality of physical systems in various forms. Further, memory 604 can include data distributed across, for example, a local area network (LAN) or a wide area network (WAN).
I/O interface 606 comprises any system for exchanging information to or from an external source. I/O devices 610 comprise any known type of external device, including a display device (e.g., monitor), keyboard, mouse, printer, speakers, handheld device, facsimile, etc. Bus 608 provides a communication link between each of the components in computer system 102, and may comprise any type of transmission link, including electrical, optical, wireless, etc.
I/O interface 606 also allows computer system 102 to store information (e.g., data or program instructions such as program code 614 and 616) on and retrieve the information from computer data storage unit 612 or another computer data storage unit (not shown). Computer data storage unit 612 may comprise any known computer-readable storage medium, which is described below. For example, computer data storage unit 612 may be a non-volatile data storage device, such as a magnetic disk drive (i.e., hard disk drive) or an optical disc drive (e.g., a CD-ROM drive which receives a CD-ROM disk).
Memory 604 and/or storage unit 612 may store computer program code 614 and 616 that includes instructions that are carried out by CPU 602 via memory 604 to perform externalized data validation. Although
Further, memory 604 may include other systems not shown in
Storage unit 612 and/or one or more other computer data storage units (not shown) that are coupled to computer system 102 may store rules utilized by validation engine 104 (see
As will be appreciated by one skilled in the art, the present invention may be embodied as a system, method or computer program product. Accordingly, an aspect of an embodiment of the present invention may take the form of an entirely hardware aspect, an entirely software aspect (including firmware, resident software, micro-code, etc.) or an aspect combining software and hardware aspects that may all generally be referred to herein as a “module”. Furthermore, an embodiment of the present invention may take the form of a computer program product embodied in one or more computer-readable medium(s) (e.g., memory 604 and/or computer data storage unit 612) having computer-readable program code (e.g., program code 614 and 616) embodied or stored thereon.
Any combination of one or more computer-readable mediums (e.g., memory 604 and computer data storage unit 612) may be utilized. The computer readable medium may be a computer-readable signal medium or a computer-readable storage medium. In one embodiment the computer-readable storage medium is a computer-readable storage device or computer-readable storage apparatus. A computer-readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared or semiconductor system, apparatus, device or any suitable combination of the foregoing. A non-exhaustive list of more specific examples of the computer-readable storage medium includes: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer-readable storage medium may be a tangible medium that can contain or store a program (e.g., program 614 and program 616) for use by or in connection with a system, apparatus, or device for carrying out instructions.
A computer readable signal medium may include a propagated data signal with computer-readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated signal may take any of a variety of forms, including, but not limited to, electromagnetic, optical, or any suitable combination thereof. A computer-readable signal medium may be any computer-readable medium that is not a computer-readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with a system, apparatus, or device for carrying out instructions.
Program code (e.g., program code 614 and 616) embodied on a computer-readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Computer program code (e.g., program code 614 and 616) for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java®, Smalltalk, C++ or the like and conventional procedural programming languages, such as the “C” programming language or similar programming languages. Instructions of the program code may be carried out entirely on a user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server, where the aforementioned user's computer, remote computer and server may be, for example, computer system 102 or another computer system (not shown) having components analogous to the components of computer system 102 included in
Aspects of the present invention are described herein with reference to a work flow illustration (e.g.,
These computer program instructions may also be stored in a computer-readable medium (e.g., memory 604 or computer data storage unit 612) that can direct a computer (e.g., computer system 102), other programmable data processing apparatus, or other devices to function in a particular manner, such that the instructions (e.g., program 614 and 616) stored in the computer-readable medium produce an article of manufacture including instructions which implement the function/act specified in the flowchart and/or block diagram block or blocks.
The computer program instructions may also be loaded onto a computer (e.g., computer system 102), other programmable data processing apparatus, or other devices to cause a series of operational steps to be performed on the computer, other programmable apparatus, or other devices to produce a computer implemented process such that the instructions (e.g., program 614 and 616) which are carried out on the computer, other programmable apparatus, or other devices provide processes for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
Any of the components of an embodiment of the present invention can be deployed, managed, serviced, etc. by a service provider that offers to deploy or integrate computing infrastructure with respect to performing externalized data validation. Thus, an embodiment of the present invention discloses a process for supporting computer infrastructure, wherein the process comprises providing at least one support service for at least one of integrating, hosting, maintaining and deploying computer-readable code (e.g., program code 614 and 616) in a computer system (e.g., computer system 102) comprising one or more processors (e.g., CPU 602), wherein the processor(s) carry out instructions contained in the code causing the computer system to perform externalized data validation.
In another embodiment, the invention provides a method that performs the process steps of the invention on a subscription, advertising and/or fee basis. That is, a service provider, such as a Solution Integrator, can offer to create, maintain, support, etc. a process of performing externalized data validation. In this case, the service provider can create, maintain, support, etc. a computer infrastructure that performs the process steps of the invention for one or more customers. In return, the service provider can receive payment from the customer(s) under a subscription and/or fee agreement, and/or the service provider can receive payment from the sale of advertising content to one or more third parties.
The work flow in
While embodiments of the present invention have been described herein for purposes of illustration, many modifications and changes will become apparent to those skilled in the art. Accordingly, the appended claims are intended to encompass all such modifications and changes as fall within the true spirit and scope of this invention.
Number | Name | Date | Kind |
---|---|---|---|
7231661 | Villavicencio et al. | Jun 2007 | B1 |
7299408 | Daconta et al. | Nov 2007 | B1 |
7313812 | Robinson et al. | Dec 2007 | B2 |
7313822 | Ben-Itzhak | Dec 2007 | B2 |
7389539 | Kouznetsov | Jun 2008 | B1 |
7562388 | Hackenberger et al. | Jul 2009 | B2 |
7716727 | Phillips et al. | May 2010 | B2 |
7809882 | Liu et al. | Oct 2010 | B1 |
20070180126 | Merkh et al. | Aug 2007 | A1 |
20070220602 | Ricks et al. | Sep 2007 | A1 |
20080040790 | Kuo | Feb 2008 | A1 |
20090060197 | Taylor et al. | Mar 2009 | A1 |
20090240707 | Bucsa et al. | Sep 2009 | A1 |
20090300192 | Northrup | Dec 2009 | A1 |
20120136726 | Caller | May 2012 | A1 |
Number | Date | Country | |
---|---|---|---|
20120246124 A1 | Sep 2012 | US |