Automated program resource identification and association

Information security – Prevention of unauthorized use of data including prevention... – Access control

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S022000, C726S026000, C726S027000, C713S167000

Reexamination Certificate

active

07076804

ABSTRACT:
This invention provides methods and apparatus for determining a set of authorization usage for collection of code. By using a program graph, the present invention identifies the code within in bounded paths in the program graph that use authorization. The level of precision is able to identify authorization usage to the level of basic blocks, methods, classes or other collections of code. By using the analysis technique described in this invention, we can determine the authorizations needed by collections code, including Java applets, servlets, and Enterprise JavaBeans. By using the present invention, it is possible, prior to loading the mobile code, to prompt the administrator or end-user to authorize or deny the code access to restricted the resources, or determine whether authorization testing will be required.

REFERENCES:
patent: 5313616 (1994-05-01), Cline et al.
patent: 5485409 (1996-01-01), Gupta et al.
patent: 5915085 (1999-06-01), Koved
patent: 6044467 (2000-03-01), Gong
patent: 6047377 (2000-04-01), Gong
patent: 6125447 (2000-09-01), Gong
patent: 6138238 (2000-10-01), Scheifler et al.
patent: 6192476 (2001-02-01), Gong
patent: 6381735 (2002-04-01), Hunt
patent: 6389540 (2002-05-01), Scheifler et al.
Nyanchama et al.; “The Role Graph Model and Conflict of Interest”; Feb. 1999; ACM Transactions on Information and System Security, vol. 2, No. 1; pp. 3-33.
Schmidt, David; “Data Flow Analysis is Model Checking of Abstract Interpretations”; Jan. 1998; ACM Proceedings of the 25th ACM SIGPLAN-SIGACT symposium on Principles of programming languages; pp. 38-48.
Gong, Li; “JAVA Security Architecture (JDK 1.2)”; Dec. 6, 1998; Sun Microsystems, Inc.; pp. 1-61.
Gong et al.; “Implementing Protection Domains in the JAVA Development Kit 1.2”; 1998; JavaSoft, Sun Microsystems, Inc.; pp. 1-10.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Automated program resource identification and association does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Automated program resource identification and association, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Automated program resource identification and association will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3535854

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.