Information security – Access control or authentication – Stand-alone
Reexamination Certificate
2011-08-30
2011-08-30
Zia, Syed (Department: 2431)
Information security
Access control or authentication
Stand-alone
C726S002000, C726S017000, C726S027000, C726S026000, C713S164000, C713S165000, C710S107000, C710S100000, C710S033000, C710S001000, C711S147000, C711S100000, C709S212000
Reexamination Certificate
active
08011006
ABSTRACT:
An access controller controls access to control target resources by a program. The access controller includes a function access detection unit and a resource access control unit. The function access detection unit detects loading of a control target function from the program and generates identification information to specify an access request issued from the detected control target function. The resource access control unit obtains a request of accessing the control target resources from the program and determines permission of the access request based on the identification information.
REFERENCES:
patent: 5335334 (1994-08-01), Takahashi et al.
patent: 5355334 (1994-10-01), Koga et al.
patent: 6308317 (2001-10-01), Wilkinson et al.
patent: 6584508 (2003-06-01), Epstein et al.
patent: 6745306 (2004-06-01), Willman et al.
patent: 7020772 (2006-03-01), England et al.
patent: 7191469 (2007-03-01), Erlingsson
patent: 7275028 (2007-09-01), Traut
patent: 7426644 (2008-09-01), Strongin et al.
patent: 7490072 (2009-02-01), Cowan et al.
patent: 7543335 (2009-06-01), England et al.
patent: 7673138 (2010-03-01), Hosokawa et al.
patent: 7788699 (2010-08-01), Largman et al.
patent: 7849360 (2010-12-01), Largman et al.
patent: 7853947 (2010-12-01), Laborczfalvi et al.
patent: 2004/0006706 (2004-01-01), Erlingsson
patent: 9-311821 (1997-12-01), None
“Ostia: a delegating architecture for secure system call interposition”, Feb. 5, 2006, Stanford Univ. Dept of Computer Science.
Crispin Cowan, et al., “SubDomainlm™: Parsimonious Server Security”, 2000 WireX Communications, Inc., pp. 1-20.
Albert Serra, et al., “DITools: Application-level Support for Dynamic Extension and Flexible Composition”, Proceedings of 2000 Usenix Annual Technical Conference, 2000, 14 pages.
Terrence Mitchem, “Using Kernel Hypervisors to Secure Applications”, Proceedings of the Annual Computer Security Application Conference, 1997, pp. 175-181.
Office Action issued Aug. 17, 2010 in JP Application No. 2005-071823 (With English Translation).
Fujimoto Hiroshi
Kinno Akira
Nakayama Takehiro
Suzuki Takashi
NTT Docomo Inc.
Oblon, Spivak McClelland, Maier & Neustadt, L.L.P.
Zia Syed
LandOfFree
Access controller and access control method does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Access controller and access control method, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Access controller and access control method will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2627025