Debugging applications under different permissions

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S166000, C726S022000, C717S117000, C717S124000, C717S127000, C718S100000

Reexamination Certificate

active

07814308

ABSTRACT:
A system and method that allows developers to debug a component while it is restricted by any arbitrary set of specific permissions, or restricted by an existing permission set associated with a security “zone.” A security sandbox is mimicked within the development environment so that developers can study how applications perform inside the sandbox. Developers are able create any sandbox and debug inside it, where violating any bound of the artificial sandbox will throw a security exception and drop the user out on the exact line of code which generated the error, as well as provide helpful information about how to correct the error.

REFERENCES:
patent: 5583988 (1996-12-01), Crank et al.
patent: 6567918 (2003-05-01), Flynn et al.
patent: 6691230 (2004-02-01), Bardon
patent: 6708276 (2004-03-01), Yarsa et al.
patent: 6981281 (2005-12-01), LaMacchia et al.
patent: 7003762 (2006-02-01), Krueger
patent: 7076557 (2006-07-01), LaMacchia et al.
patent: 7131111 (2006-10-01), Passanisi
patent: 7418697 (2008-08-01), Gryko et al.
patent: 2002/0099952 (2002-07-01), Lambert et al.
patent: 2003/0028685 (2003-02-01), Smith et al.
patent: 2003/0041267 (2003-02-01), Fee et al.
patent: 2003/0221185 (2003-11-01), Bates et al.
patent: 2004/0148514 (2004-07-01), Fee et al.
patent: 2004/0237064 (2004-11-01), Liu et al.
patent: 2004/0250175 (2004-12-01), Draine et al.
patent: 2005/0097440 (2005-05-01), Lusk et al.
patent: 2005/0108521 (2005-05-01), Silhavy et al.
patent: 2005/0246773 (2005-11-01), Draine et al.
patent: 2005/0278790 (2005-12-01), Birk et al.
Support@iona.com, Running Orbix Java Clients, www.iona.com, 2000, pp. 1-7.
Peterson et al, A Flexible Containment Mechanism for Executing Untrusted Code, USENIX, 2002, pp. 1-19.
Valentin Razmov, Security in Untrusted Code Environments: Missing Pieces of the Puzzle, University of Washington, 2002, pp. 1-22.
Downing et al, Dictionary of Computer and Internet Terms, 2000, pp. 1-3, 68-69, 122-123, 166-167, 290-291, 424-425, 468-469, 492-493.
Aviel D. Rubin et al, Mobile Code Security, pp. 30-34, 1998 IEEE.
David L. Black et al, “The Mach Exception Handling Facility”, pp. 45-56, ACM SIGPLAN and SIGOPS workshop, 1988.
Aviel D. Rubin, “Mobile Code Security”, pp. 30-34, Internet Computing, IEEE, 1998.
David M. Wheeler, “Java Security Extensions for a Java Server in a Hostile Environment”, pp. 1-10 , Computer Security Applications Conference, 2001.
Li Gong, Java 2 Platform Security Architecture, Version 1.0, pp. 1-70, Sun Microsystems, Inc., Oct. 1998.
Jaeger, T. et al., “Policy Management Using Access Control Spaces”,ACM Transactions on Information and System Security, Aug. 2003, 6(3), 327-364.
Koved, L. et al., “Access Rights Analysis for Java”,OOPSLA, 2002, 359-372.
Swift, M.M. et al, Improving the Granularity of Access Control for Windows 2000,ACM Transactions on Information and System Security, Nov. 2002, 5(4), 398-437.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Debugging applications under different permissions does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Debugging applications under different permissions, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Debugging applications under different permissions will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4179747

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.