Automatically hiding sensitive information obtainable from a...

Information security – Prevention of unauthorized use of data including prevention...

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S027000, C726S030000

Reexamination Certificate

active

07827614

ABSTRACT:
The present invention provides a system and method for automatically hiding sensitive information, obtainable from a process table, from other processes that should not access the sensitive information. The system and method include a sensitive command attribute table that is used by a system administrator to designate the commands and command attributes that will typically be associated with sensitive information. The sensitive command attribute table is used when a command is entered that requests information from the process table to be displayed or output. In response, a search of the process table entries is made to determine if a command and/or its attribute in the process table matches an entry in the sensitive command attribute table. If so, the command, its attributes, and/or its attribute values are blanked from the output of the process table information.

REFERENCES:
Approach to Data Table Decomposition Based on Rough Set Attribute Selection Measure; Wenbing Jin; Genetic and Evolutionary Computing, 2008. WGEC '08. Second International Conference on Publication Year: 2008 , pp. 543-548.
A Fast Enumeration Algorithm for Attribute Reduction Based on Grouping; Xiao Wei; Ning Xu; Computer Science and Computational Technology, 2008. ISCSCT '08. International Symposium on vol. 1; Publication Year: 2008 , pp. 476-479.
A Reduction Algorithm for Multi-decision-making Table of Rough Sets; Qingqiang Guo; Qiqiang Li; Xiuhong Wang; Ran Ding; Information Acquisition, 2006 IEEE International Conference on Publication Year: 2006 , pp. 776-780.
Kilor, “Hacking Webpages”, retrieved Aug. 28, 2007, http://www.totse.com/en/hack/hack—attack/164400.html, pp. 1-6.
Lum, “One-Way Web Hacking”, Mar. 9, 2004, pp. 1-17.
Ganesan et al., “Look-Up Table Based Chaotic Encryption of Audio Files”, Circuits and Systems, 2006, APCCAS 2006, IEEE Asia Pacific Conference on Dec. 4-7, 2006, pp. 1951-1954.
Xiao et al., “Improving the Security of a Dynamic Look-Up Table Based Chaotic Cryptosystem”, Circuits and Systems II: Express Briefs, IEEE Transactions on [see also Circuits and Systems II: Analog and Digital Signal Processing, IEEE Transactions on], vol. 53, Issue 6, Jun. 2006, pp. 502-506.
Doshi, “A Prefix Space Partitioning Approach to Scalable Peer Gateway Discovery in Secure Virtual Private Networks”, Military Communications Conference, 2005. MILCOM 2005. IEEE, Oct. 17-20, 2005, vol. 5 pp. 2735-2741.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Automatically hiding sensitive information obtainable from a... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Automatically hiding sensitive information obtainable from a..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Automatically hiding sensitive information obtainable from a... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4217349

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.