Information security – Policy
Reexamination Certificate
2005-04-28
2009-12-08
Tran, Ellen (Department: 2433)
Information security
Policy
Reexamination Certificate
active
07631341
ABSTRACT:
The Techniques and Mechanisms Described Herein are Directed to an Extensible security architecture that provides a security mechanism for minimizing security problems within interpretive environments. The extensible security architecture comprises a script engine configured to process a script and a security manager configured to monitor the processing of the script based on a security policy. The security manager determines whether to open an assembly associated with a command within the script, whether to process the command, whether to allow certain input to the command, and the like. The security policy may be implemented by overriding one or more methods of a base security class that are called when processing the script. The input may be an object passed via an object-based pipeline.
REFERENCES:
patent: 5404528 (1995-04-01), Mahajan
patent: 6078743 (2000-06-01), Apte et al.
patent: 6292936 (2001-09-01), Wang
patent: 6651241 (2003-11-01), Hernandez, III
patent: 6718371 (2004-04-01), Lowry et al.
patent: 6785685 (2004-08-01), Soetarman et al.
patent: 6823504 (2004-11-01), Sokolov
patent: 6848101 (2005-01-01), Maekawa et al.
patent: 6880125 (2005-04-01), Fry
patent: 6950866 (2005-09-01), Lowry et al.
patent: 7284274 (2007-10-01), Walls et al.
patent: 2002/0073330 (2002-06-01), Chandnani et al.
patent: 2002/0078382 (2002-06-01), Sheikh et al.
patent: 2003/0200349 (2003-10-01), Hansen
patent: 2004/0068715 (2004-04-01), Wong et al.
patent: 2004/0153967 (2004-08-01), Bender et al.
patent: 2004/0210828 (2004-10-01), Langer
patent: 2005/0071369 (2005-03-01), Lang et al.
patent: 2005/0108518 (2005-05-01), Pandya
patent: 2005/0182958 (2005-08-01), Pham et al.
Eric Flower, “Step-Up to MS-DOS 6.2: An Early Look at Microsoft's Latest Upgrade”, Computer in Libraries, vol. 14, No. 2, pp. 30-32, Feb. 1994.
Linthicum, D.S, “Java Development Environments Evolve”, Object Magazine, vol. 8, No. 4, pp. 45-46, 48-49, Jun. 1998.
Andrew Tucker, “Windows CE's CESH Utility”, Dr. Dobb's Journal, vol. 25, No. 5, http://www.ddj.com, pp. 74-80, May 2000.
“Command Line Tailors Software to Buying Operations”, Purchasing Software News, vol. 127, No. 4, pp. 153-156, Sep. 1999.
Brun et al., “ROOT-An Object Oriented Data Analysis Framework”, Nuclear Instruments & Methods in Physics Research, Section A, vol. 389, No. 1-2, pp. 81-86, Apr. 1997.
Dominic Olivastro, “Modifying DCL Commands in VAX/VMS: The Command Definition Utility”, The VAX Professional, vol. 8, pp. 50-53, Apr. 1986.
Sorzano, et al., “Command-Line Interfaces Can Be Efficiently Brought to Graphics: COLIMATE (the COmmand LIne MATE)”, Software-Practice and Experience, vol. 32, No. 9, pp. 873-887, Mar. 2002.
“No Time for GUI's”, Digital Systems Report, Computer Electronics, Inc., vol. 19, No. 4, pp. 1-4, Winter 1997.
Tom Yager, “Taking Command Of Windows NT”, Unix Review, vol. 15, No. 11, pp. 31-32, 34, 36, 38, 40, Oct. 1997.
Randy Dykhuis, “Beefing Up Dos with 4DOS”, Computers in Libraries, vol. 11, No. 4, pp. 35-37, Apr. 1991.
Giles Todd, “Installing MS-DOS Device Drivers from the Command Line”, EXE, vol. 4, No. 3, pp. 16-21, Aug. 1989.
Jaeger, et al, “Support for the File System Security Requriements of Computational E-Mail Systems”, ACM, 1994, pp. 1-9.
Kc, et al, “Countering Code-Injection Attacks with Instruction-Set Randomization”, ACM, CC'03, Oct. 27-31, 2003, pp. 272-280.
“Intro to Unix: Pipes and Filters”, Dec. 15, 2001, retrieved from the internet at http://web/archive/org/20011216234529/http://www.december.com/unix/tutor/pipesfilters.html on Jul. 28, 2008, 2 pgs.
Ramey, et al., “Bash Reference Manual”, retrieved from <<http://gd.tuwien.ac.at/utils/shells/bashref.pdf>> on Jul. 25, 2008, Nov. 2001, pp. 1-132.
Varian, “Plunging into Pipes”, Proceedings SHARE Europe AM91, Oct. 7, 1991, pp. 1087-1110.
Pandit Bhalchandra S.
Snover Jeffrey P.
Truher, III James W.
Lee & Hayes PLLC
Microsoft Corporation
Tran Ellen
LandOfFree
Extensible security architecture for an interpretive... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Extensible security architecture for an interpretive..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Extensible security architecture for an interpretive... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4148572