Information security – Prevention of unauthorized use of data including prevention... – Access control
Reexamination Certificate
2011-04-19
2011-04-19
Kim, Jung (Department: 2432)
Information security
Prevention of unauthorized use of data including prevention...
Access control
C726S028000, C726S029000
Reexamination Certificate
active
07930760
ABSTRACT:
This disclosure describes techniques of using a centralized rule database to control the abilities of software processes to perform actions with regard to resources provided by a computer. As described herein, each software process executing in a computer executes within a chamber and each resource provided by the computer is associated with a canonical name that uniquely identifies the resource. Furthermore, the computer stores a set of security rules in a centralized rule database. In addition, this disclosure describes techniques of enforcing the rules stored in the centralized rule database.
REFERENCES:
patent: 6453419 (2002-09-01), Flint
patent: 6490624 (2002-12-01), Sampson
patent: 6766314 (2004-07-01), Burnett
patent: 6820082 (2004-11-01), Cook
patent: 7174563 (2007-02-01), Brownlie
patent: 7185357 (2007-02-01), Wong
patent: 7260718 (2007-08-01), Burnett
patent: 7272625 (2007-09-01), Hannel
patent: 7318237 (2008-01-01), Moriconi
patent: 2006/0085837 (2006-04-01), Pesati
patent: 2007/0050711 (2007-03-01), Walker
patent: 2007/0214144 (2007-09-01), Lawson
patent: 2007/0300297 (2007-12-01), Dawson
International Search Report and Written Opinion for PCT/US2009/035297, mailed Dec. 30, 2009, 10 pages.
“AppArmor Geeks”, accessed at: http://en.opensuse.org/AppArmor—Geeks, accessed on Jan. 24, 2008, 10 pages.
Sirer et al.; “Distributed Virtual Machines: A System Architecture for Network Computing”, accessed at: http://www.cs.cornell.edu/People/egs/papers/kimera-tr98-09-01.pdf, accessed on Jan. 23, 2008, 13 pages.
Spencer et al.; “The Flask Security Architecture: System Support for Diverse Security Policies”, accessed at: http://www.cs.cmu.edu/˜dga/papers/flask-usenixsec99.pdf, accessed on Jan. 23, 2008, 17 pages.
Coles Neil
Gopalan Yadhu
Jordan Christopher
Kohnfelder Loren M.
Lyons Matthew
Kim Jung
Merchant & Gould P.C.
Microsoft Corporation
Okeke Izunna
LandOfFree
Centralized enforcement of name-based computer system... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Centralized enforcement of name-based computer system..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Centralized enforcement of name-based computer system... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2637097