Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer
Reexamination Certificate
2004-08-27
2010-10-12
Moazzami, Nasser (Department: 2436)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Protection at a particular protocol layer
C713S166000, C726S022000, C717S117000, C717S124000, C717S127000, C718S100000
Reexamination Certificate
active
07814308
ABSTRACT:
A system and method that allows developers to debug a component while it is restricted by any arbitrary set of specific permissions, or restricted by an existing permission set associated with a security “zone.” A security sandbox is mimicked within the development environment so that developers can study how applications perform inside the sandbox. Developers are able create any sandbox and debug inside it, where violating any bound of the artificial sandbox will throw a security exception and drop the user out on the exact line of code which generated the error, as well as provide helpful information about how to correct the error.
REFERENCES:
patent: 5583988 (1996-12-01), Crank et al.
patent: 6567918 (2003-05-01), Flynn et al.
patent: 6691230 (2004-02-01), Bardon
patent: 6708276 (2004-03-01), Yarsa et al.
patent: 6981281 (2005-12-01), LaMacchia et al.
patent: 7003762 (2006-02-01), Krueger
patent: 7076557 (2006-07-01), LaMacchia et al.
patent: 7131111 (2006-10-01), Passanisi
patent: 7418697 (2008-08-01), Gryko et al.
patent: 2002/0099952 (2002-07-01), Lambert et al.
patent: 2003/0028685 (2003-02-01), Smith et al.
patent: 2003/0041267 (2003-02-01), Fee et al.
patent: 2003/0221185 (2003-11-01), Bates et al.
patent: 2004/0148514 (2004-07-01), Fee et al.
patent: 2004/0237064 (2004-11-01), Liu et al.
patent: 2004/0250175 (2004-12-01), Draine et al.
patent: 2005/0097440 (2005-05-01), Lusk et al.
patent: 2005/0108521 (2005-05-01), Silhavy et al.
patent: 2005/0246773 (2005-11-01), Draine et al.
patent: 2005/0278790 (2005-12-01), Birk et al.
Support@iona.com, Running Orbix Java Clients, www.iona.com, 2000, pp. 1-7.
Peterson et al, A Flexible Containment Mechanism for Executing Untrusted Code, USENIX, 2002, pp. 1-19.
Valentin Razmov, Security in Untrusted Code Environments: Missing Pieces of the Puzzle, University of Washington, 2002, pp. 1-22.
Downing et al, Dictionary of Computer and Internet Terms, 2000, pp. 1-3, 68-69, 122-123, 166-167, 290-291, 424-425, 468-469, 492-493.
Aviel D. Rubin et al, Mobile Code Security, pp. 30-34, 1998 IEEE.
David L. Black et al, “The Mach Exception Handling Facility”, pp. 45-56, ACM SIGPLAN and SIGOPS workshop, 1988.
Aviel D. Rubin, “Mobile Code Security”, pp. 30-34, Internet Computing, IEEE, 1998.
David M. Wheeler, “Java Security Extensions for a Java Server in a Hostile Environment”, pp. 1-10 , Computer Security Applications Conference, 2001.
Li Gong, Java 2 Platform Security Architecture, Version 1.0, pp. 1-70, Sun Microsystems, Inc., Oct. 1998.
Jaeger, T. et al., “Policy Management Using Access Control Spaces”,ACM Transactions on Information and System Security, Aug. 2003, 6(3), 327-364.
Koved, L. et al., “Access Rights Analysis for Java”,OOPSLA, 2002, 359-372.
Swift, M.M. et al, Improving the Granularity of Access Control for Windows 2000,ACM Transactions on Information and System Security, Nov. 2002, 5(4), 398-437.
Cantwell James Gordon
Draine Sean Conway
Eng Michael
Fee Gregory Darrell
Gryko Izydor
Abedin Shanto M
Microsoft Corporation
Moazzami Nasser
Woodcock & Washburn LLP
LandOfFree
Debugging applications under different permissions does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Debugging applications under different permissions, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Debugging applications under different permissions will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4179747