Access controller and access control method

Information security – Access control or authentication – Stand-alone

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S002000, C726S017000, C726S027000, C726S026000, C713S164000, C713S165000, C710S107000, C710S100000, C710S033000, C710S001000, C711S147000, C711S100000, C709S212000

Reexamination Certificate

active

08011006

ABSTRACT:
An access controller controls access to control target resources by a program. The access controller includes a function access detection unit and a resource access control unit. The function access detection unit detects loading of a control target function from the program and generates identification information to specify an access request issued from the detected control target function. The resource access control unit obtains a request of accessing the control target resources from the program and determines permission of the access request based on the identification information.

REFERENCES:
patent: 5335334 (1994-08-01), Takahashi et al.
patent: 5355334 (1994-10-01), Koga et al.
patent: 6308317 (2001-10-01), Wilkinson et al.
patent: 6584508 (2003-06-01), Epstein et al.
patent: 6745306 (2004-06-01), Willman et al.
patent: 7020772 (2006-03-01), England et al.
patent: 7191469 (2007-03-01), Erlingsson
patent: 7275028 (2007-09-01), Traut
patent: 7426644 (2008-09-01), Strongin et al.
patent: 7490072 (2009-02-01), Cowan et al.
patent: 7543335 (2009-06-01), England et al.
patent: 7673138 (2010-03-01), Hosokawa et al.
patent: 7788699 (2010-08-01), Largman et al.
patent: 7849360 (2010-12-01), Largman et al.
patent: 7853947 (2010-12-01), Laborczfalvi et al.
patent: 2004/0006706 (2004-01-01), Erlingsson
patent: 9-311821 (1997-12-01), None
“Ostia: a delegating architecture for secure system call interposition”, Feb. 5, 2006, Stanford Univ. Dept of Computer Science.
Crispin Cowan, et al., “SubDomainlm™: Parsimonious Server Security”, 2000 WireX Communications, Inc., pp. 1-20.
Albert Serra, et al., “DITools: Application-level Support for Dynamic Extension and Flexible Composition”, Proceedings of 2000 Usenix Annual Technical Conference, 2000, 14 pages.
Terrence Mitchem, “Using Kernel Hypervisors to Secure Applications”, Proceedings of the Annual Computer Security Application Conference, 1997, pp. 175-181.
Office Action issued Aug. 17, 2010 in JP Application No. 2005-071823 (With English Translation).

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Access controller and access control method does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Access controller and access control method, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Access controller and access control method will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2627025

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.