Information security – Prevention of unauthorized use of data including prevention... – Access control
Reexamination Certificate
2006-07-11
2006-07-11
Zand, Kambiz (Department: 2132)
Information security
Prevention of unauthorized use of data including prevention...
Access control
C726S022000, C726S026000, C726S027000, C713S167000
Reexamination Certificate
active
07076804
ABSTRACT:
This invention provides methods and apparatus for determining a set of authorization usage for collection of code. By using a program graph, the present invention identifies the code within in bounded paths in the program graph that use authorization. The level of precision is able to identify authorization usage to the level of basic blocks, methods, classes or other collections of code. By using the analysis technique described in this invention, we can determine the authorizations needed by collections code, including Java applets, servlets, and Enterprise JavaBeans. By using the present invention, it is possible, prior to loading the mobile code, to prompt the administrator or end-user to authorize or deny the code access to restricted the resources, or determine whether authorization testing will be required.
REFERENCES:
patent: 5313616 (1994-05-01), Cline et al.
patent: 5485409 (1996-01-01), Gupta et al.
patent: 5915085 (1999-06-01), Koved
patent: 6044467 (2000-03-01), Gong
patent: 6047377 (2000-04-01), Gong
patent: 6125447 (2000-09-01), Gong
patent: 6138238 (2000-10-01), Scheifler et al.
patent: 6192476 (2001-02-01), Gong
patent: 6381735 (2002-04-01), Hunt
patent: 6389540 (2002-05-01), Scheifler et al.
Nyanchama et al.; “The Role Graph Model and Conflict of Interest”; Feb. 1999; ACM Transactions on Information and System Security, vol. 2, No. 1; pp. 3-33.
Schmidt, David; “Data Flow Analysis is Model Checking of Abstract Interpretations”; Jan. 1998; ACM Proceedings of the 25th ACM SIGPLAN-SIGACT symposium on Principles of programming languages; pp. 38-48.
Gong, Li; “JAVA Security Architecture (JDK 1.2)”; Dec. 6, 1998; Sun Microsystems, Inc.; pp. 1-61.
Gong et al.; “Implementing Protection Domains in the JAVA Development Kit 1.2”; 1998; JavaSoft, Sun Microsystems, Inc.; pp. 1-10.
Kershenbaum Aaron
Koved Lawrence
Pistoia Marco
International Business Machines - Corporation
Kim Jung
Tuchman Ido
Yamonaco Lisa M.
Zand Kambiz
LandOfFree
Automated program resource identification and association does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Automated program resource identification and association, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Automated program resource identification and association will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3535854