Information security – Policy
Reexamination Certificate
2004-10-01
2010-10-19
Korzuch, William R (Department: 2431)
Information security
Policy
C726S003000, C726S004000, C726S014000, C726S026000, C726S022000, C726S027000, C380S044000, C382S115000, C705S035000, C705S054000, C707S793000, C709S241000, C711S163000, C713S156000, C713S166000, C713S188000, C713S190000, C713S152000, C715S734000, C717S172000, C719S331000
Reexamination Certificate
active
07818781
ABSTRACT:
A facility for setting and revoking policies is provided. The facility receives a request from a controlling process a request to set a policy on a controlled process, and determines whether the controlling process has privilege to set the policy on the controlled process. If the facility determines that the controlling process has privilege to set the policy on the controlled process, the facility sets the policy on the controlled process, which causes the policy to be applied to the controlled process to determine whether the controlled process has authorization to access one or more resources.
REFERENCES:
patent: 4584639 (1986-04-01), Hardy
patent: 5187790 (1993-02-01), East et al.
patent: 5974549 (1999-10-01), Golan
patent: 6691232 (2004-02-01), Wood et al.
patent: 7103914 (2006-09-01), Focke et al.
patent: 2002/0091798 (2002-07-01), Joshi et al.
patent: 2002/0099952 (2002-07-01), Lambert et al.
patent: 2002/0188568 (2002-12-01), Nickolaisen et al.
patent: 2003/0115179 (2003-06-01), Prabakaran et al.
patent: 2004/0139202 (2004-07-01), Talwar et al.
patent: 2005/0097353 (2005-05-01), Patrick et al.
patent: 2005/0256664 (2005-11-01), Blumfield et al.
patent: 2005/0257207 (2005-11-01), Blumfield et al.
patent: 2005/0257208 (2005-11-01), Blumfield et al.
patent: 2006/0005227 (2006-01-01), Samuelsson et al.
patent: 2006/0075461 (2006-04-01), Vayman
patent: 2006/0075469 (2006-04-01), Vayman
patent: 2006/0075492 (2006-04-01), Golan et al.
patent: 1 320 010 (2003-06-01), None
patent: WO00/56027 (2000-09-01), None
Ashley, P. et al., “Applying Authorization to Intranets: Architectures, Issues and APIs,” Computer Communications, Elsevier Science Publishers BV, Amsterdam, NL, vol. 23, No. 17, Nov. 1, 2000.
Sandhu, Ravi S., and Samarati, Pierangela, “Access Control: Principles and Practice,” IEEE Communications Magazine 32, Sep. 1994, No. 9.
International Telecommunication Union, ITU-T, Data Networks and Open System Communications Security, Information Technology—Open Systems Interconnection—Security Frameworks for Open Systems: Access Control Framework, Nov. 1995.
European Search Report for EP Patent Application No. 05108704.7, Microsoft Corporation, Mar. 3, 2006.
Ashley, P., et a., “Applying Authorization to Intranets: Architectures, Issues and APIs,” Computer Communications, vol. 23, No. 17, Nov. 1, 2000 (pp. 1613-1620).
International Telecommunication Union, ITU-T Recommendation X.812, Data Networks and Open System Communications Security, Nov. 1995 (pp. 1-30).
Ryutov, Tatyana, et al., “Integrated Access Control and Intrusion Detection for Web Servers,” IEEE Transactions on Parallel and Distributed Systems, vol. 14, No. 9, Sep. 2003 (pp. 841-850).
Sandhu, Ravi S., and Samarati, Pierangela, “Access Control: Principles and Practice,” IEEE Communications Magazine, 32(1994) , September, No. 9 (pp. 40-48).
Godik S., et al., OASIS, Extensible Access Control Markup Language (XACML), Version 1.0, OASIS Standard, Feb. 18, 2003.
European Search Report, European Patent Application No. 05 10 8704, Microsoft Corporation, Sep. 15, 2006.
Field Scott A.
Golan Gilad
Vayman Mark
Korzuch William R
Microsoft Corporation
Perkins Coie LLP
Wright Bryan
LandOfFree
Behavior blocking access control does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Behavior blocking access control, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Behavior blocking access control will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4177343