Access authorization having embedded policies

Information security – Policy

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

Reexamination Certificate

active

07921451

ABSTRACT:
A facility for receiving an embedded policy is provided. The facility checks an application program image for the presence of an embedded policy. If an embedded policy is detected, the facility extracts the policy from within the application program image. The facility may then apply the extracted policy to the application program image before the application program image is loaded and/or executed. Moreover, the facility may check the application program image's integrity prior to extracting the embedded policy.

REFERENCES:
patent: 4584639 (1986-04-01), Hardy
patent: 5187790 (1993-02-01), East et al.
patent: 7103914 (2006-09-01), Focke et al.
patent: 2002/0188568 (2002-12-01), Nickolaisen et al.
patent: 2003/0009675 (2003-01-01), Rygaard
patent: 2003/0115179 (2003-06-01), Prabakaran et al.
patent: 2004/0139202 (2004-07-01), Talwar et al.
patent: 2005/0097353 (2005-05-01), Patrick et al.
patent: 2006/0075464 (2006-04-01), Golan et al.
patent: 1 320 010 (2003-06-01), None
patent: WO00/56027 (2000-09-01), None
Ashley, P. et al., “Applying Authorization to Intranets: Architectures, Issues and APIs,” Computer Communications, Elsevier Science Publishers BV, Amsterdam, NL, vol. 23, No. 17, Nov. 1, 2000.
Sandhu, Ravi S., and Samarati, Pierangela, “Access Control: Principles and Practice,” IEEE Communications Magazine 32, Sep. 1994, No. 9.
International Telecommunication Union, ITU-T, Data Networks and Open System Communications Security, Information Technology—Open Systems Interconnection—Security Frameworks for Open Systems: Access Control Framework, Nov. 1995.
European Search Report for EP Patent Application No. 05108704.7, Microsoft Corporation, Mar. 3, 2006.
Ashley, P., et a., “Applying Authorization to Intranets: Architectures, Issues and APIs,” Computer Communications, vol. 23, No. 17, Nov. 1, 2000 (pp. 1613-1620).
International Telecommunication Union, ITU-T Recommendation X.812, Data Networks and Open System Communications Security, Nov. 1995 (pp. 1-30).
Ryutov, Tatyana, et al., “Integrated Access Control and Intrusion Detection for Web Servers,” IEEE Transactions on Parallel and Distributed Systems, vol. 14, No. 9, Sep. 2003 (pp. 841-850).
Sandhu, Ravi S., and Samarati, Pierangela, “Access Control: Principles and Practice,” IEEE Communications Magazine, 32(Sep. 1994) , No. 9 (pp. 40-48).
Godik S., et al., OASIS, Extensible Access Control Markup Language (XACML), Version 1.0, OASIS Standard, Feb. 18, 2003.
European Search Report, European Patent Application No. 05 10 8704, Microsoft Corporation, Sep. 15, 2006.
The Authoritative Dictionary of IEEE Standards and Terms (7th ed., 2000), pp. 101-102.
Microsoft Press Computer Dictionary: The Comprehensive Standard for Business, School, Library, and Home (2d ed., 1994), pp. 43-44.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Access authorization having embedded policies does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Access authorization having embedded policies, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Access authorization having embedded policies will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2702272

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.