Extensible security architecture for an interpretive...

Information security – Policy

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

Reexamination Certificate

active

07631341

ABSTRACT:
The Techniques and Mechanisms Described Herein are Directed to an Extensible security architecture that provides a security mechanism for minimizing security problems within interpretive environments. The extensible security architecture comprises a script engine configured to process a script and a security manager configured to monitor the processing of the script based on a security policy. The security manager determines whether to open an assembly associated with a command within the script, whether to process the command, whether to allow certain input to the command, and the like. The security policy may be implemented by overriding one or more methods of a base security class that are called when processing the script. The input may be an object passed via an object-based pipeline.

REFERENCES:
patent: 5404528 (1995-04-01), Mahajan
patent: 6078743 (2000-06-01), Apte et al.
patent: 6292936 (2001-09-01), Wang
patent: 6651241 (2003-11-01), Hernandez, III
patent: 6718371 (2004-04-01), Lowry et al.
patent: 6785685 (2004-08-01), Soetarman et al.
patent: 6823504 (2004-11-01), Sokolov
patent: 6848101 (2005-01-01), Maekawa et al.
patent: 6880125 (2005-04-01), Fry
patent: 6950866 (2005-09-01), Lowry et al.
patent: 7284274 (2007-10-01), Walls et al.
patent: 2002/0073330 (2002-06-01), Chandnani et al.
patent: 2002/0078382 (2002-06-01), Sheikh et al.
patent: 2003/0200349 (2003-10-01), Hansen
patent: 2004/0068715 (2004-04-01), Wong et al.
patent: 2004/0153967 (2004-08-01), Bender et al.
patent: 2004/0210828 (2004-10-01), Langer
patent: 2005/0071369 (2005-03-01), Lang et al.
patent: 2005/0108518 (2005-05-01), Pandya
patent: 2005/0182958 (2005-08-01), Pham et al.
Eric Flower, “Step-Up to MS-DOS 6.2: An Early Look at Microsoft's Latest Upgrade”, Computer in Libraries, vol. 14, No. 2, pp. 30-32, Feb. 1994.
Linthicum, D.S, “Java Development Environments Evolve”, Object Magazine, vol. 8, No. 4, pp. 45-46, 48-49, Jun. 1998.
Andrew Tucker, “Windows CE's CESH Utility”, Dr. Dobb's Journal, vol. 25, No. 5, http://www.ddj.com, pp. 74-80, May 2000.
“Command Line Tailors Software to Buying Operations”, Purchasing Software News, vol. 127, No. 4, pp. 153-156, Sep. 1999.
Brun et al., “ROOT-An Object Oriented Data Analysis Framework”, Nuclear Instruments & Methods in Physics Research, Section A, vol. 389, No. 1-2, pp. 81-86, Apr. 1997.
Dominic Olivastro, “Modifying DCL Commands in VAX/VMS: The Command Definition Utility”, The VAX Professional, vol. 8, pp. 50-53, Apr. 1986.
Sorzano, et al., “Command-Line Interfaces Can Be Efficiently Brought to Graphics: COLIMATE (the COmmand LIne MATE)”, Software-Practice and Experience, vol. 32, No. 9, pp. 873-887, Mar. 2002.
“No Time for GUI's”, Digital Systems Report, Computer Electronics, Inc., vol. 19, No. 4, pp. 1-4, Winter 1997.
Tom Yager, “Taking Command Of Windows NT”, Unix Review, vol. 15, No. 11, pp. 31-32, 34, 36, 38, 40, Oct. 1997.
Randy Dykhuis, “Beefing Up Dos with 4DOS”, Computers in Libraries, vol. 11, No. 4, pp. 35-37, Apr. 1991.
Giles Todd, “Installing MS-DOS Device Drivers from the Command Line”, EXE, vol. 4, No. 3, pp. 16-21, Aug. 1989.
Jaeger, et al, “Support for the File System Security Requriements of Computational E-Mail Systems”, ACM, 1994, pp. 1-9.
Kc, et al, “Countering Code-Injection Attacks with Instruction-Set Randomization”, ACM, CC'03, Oct. 27-31, 2003, pp. 272-280.
“Intro to Unix: Pipes and Filters”, Dec. 15, 2001, retrieved from the internet at http://web/archive/org/20011216234529/http://www.december.com/unix/tutor/pipesfilters.html on Jul. 28, 2008, 2 pgs.
Ramey, et al., “Bash Reference Manual”, retrieved from <<http://gd.tuwien.ac.at/utils/shells/bashref.pdf>> on Jul. 25, 2008, Nov. 2001, pp. 1-132.
Varian, “Plunging into Pipes”, Proceedings SHARE Europe AM91, Oct. 7, 1991, pp. 1087-1110.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Extensible security architecture for an interpretive... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Extensible security architecture for an interpretive..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Extensible security architecture for an interpretive... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4148572

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.