Enhancing computer system security via multiple user desktops

Information security – Access control or authentication – Stand-alone

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S017000, C726S018000, C726S020000, C726S021000, C713S167000

Reexamination Certificate

active

09524124

ABSTRACT:
Users can create multiple different desktops for themselves and easily switch between these desktops. These multiple desktops are “walled off” from one another, limiting the ability of processes and other subjects in one desktop from accessing objects, such as data files or other processes, in another desktop. According to one aspect, each time a process is launched it is associated with the desktop that it is launched in. Similarly, objects, such as data files or resources, are associated with the same desktop as the process that created them. The operating system allows a process to access only those objects that are either associated with the same desktop as the process or associated with no desktop.

REFERENCES:
patent: 5835722 (1998-11-01), Bradshaw et al.
patent: 6029246 (2000-02-01), Bahr
patent: 6505300 (2003-01-01), Chan et al.
Microsft Press, Microsoft Windows NT Workstation Resource Kit, 1996, Microsoft Press, Chapter 6.
Microsft Press, Microsoft Windows NT Workstation Resource Kit, 1996, Microsoft Press, Chapter 6pp. 147-161.
Butler Lampson, “Protection”, In Proceedings of the Fifth Princeton Symposium on Information Sciences and Systems, pp. 437-443, Princeton University, Mar. 1971.
D. Elliot Bell and Lenoard H. PaPadula. “Secure Computer System: Unified Exposition and Multics Interpretation”, Technical Report, MITRE Corporation, Mar. 1976.
Robert Wahbe, Steven Lucco, Thomas E. Anderson and Susan L. Graham. “Efficient Software-Based Fault Isolation”, In Proceedings of the Symposium on Operating System Principles, pp. 203-216, 1993.
Ian Goldberg, David Wagner, Randi Thomas and Eric A. Brewer, “A Secure Environment for Untrusted Helper Applications”, In Proceedings of the Sixth USENIX Security Symposium, 1996.
Ravi S. Sandhu, Edward J. Coyne, Hal L. Feinstein and Charles E. Youman, Role-Based Access Control Models, IEEE Computer, 29(2):38-47, 1996.
Kenneth M. Walker, Daniel F. Sterne, M. Lee Badger, Michael J. Petkac, David L. Sherman and Karen A. Oostendorp, “Confining Root Programs with Domain and Type Enforcement”, In Proceedings of the Sixth USENIX Security Symposium, 1996.
Qun Zhong, “Providing Secure Environments for Untrusted Network Applications- with Case Studies Using VirtualVault and Trusted Sendmail Proxy”, In Proceedings of Second IEEE International Workshop on Enterprise Security, pp. 277-283, Los Alamitos, California, 1997.
Qun Zhong and Nigel Edwards, “Security in the Large: Is Java's Sandbox Scalable?”, HP Laboratories Bristol, pp. 2-7, Apr. 1998.
Alma Whitten and J.D. Tygar, “Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0”, In Proceedings of the 8th USENIX Security Symposium, Washington, D.C., Aug. 1999.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Enhancing computer system security via multiple user desktops does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Enhancing computer system security via multiple user desktops, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Enhancing computer system security via multiple user desktops will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3743496

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.