Information security – Monitoring or scanning of software or data including attack...
Reexamination Certificate
2007-07-24
2007-07-24
Sheikh, Ayaz (Department: 2131)
Information security
Monitoring or scanning of software or data including attack...
C726S027000, C726S016000, C726S017000, C726S018000, C713S193000, C713S164000, C713S165000, C713S166000, C713S167000, C709S229000, C709S223000
Reexamination Certificate
active
10061701
ABSTRACT:
A method is disclosed for providing process-based security in a special purpose computer system, comprising the steps of: configuring the special purpose computer with an operating system and at least one application for operation as a computer appliance; associating a resource access table with the at least one application, addressable by the at least one application, containing statements corresponding to predetermined requests for access to at least a one specified resource during running of the at least one application wherein the resource access table statements include information defining an execution path for the at least one application; interpreting the resource access table statements upon a request for the specified resource by the at least one application, wherein at least one of the statements in the resource access table provides for performing a security check prior to granting access to the specified resource; and causing the execution of the at least one application, upon granting access to the requested resource, including the use of the requested resource according to the execution path statements in the resource access table.
REFERENCES:
patent: 4104718 (1978-08-01), Poublan et al.
patent: 4901231 (1990-02-01), Bishop et al.
patent: 4984272 (1991-01-01), McIlroy et al.
patent: 5032979 (1991-07-01), Hecht et al.
patent: 5109515 (1992-04-01), Laggis et al.
patent: 5113442 (1992-05-01), Moir
patent: 5200998 (1993-04-01), Bakaher et al.
patent: 5301337 (1994-04-01), Wells et al.
patent: 5327531 (1994-07-01), Bealkowski et al.
patent: 5469556 (1995-11-01), Clifton
patent: 5483596 (1996-01-01), Rosenow et al.
patent: 5504814 (1996-04-01), Miyahara
patent: 5572694 (1996-11-01), Uchino
patent: 5666415 (1997-09-01), Kaufman
patent: 5684951 (1997-11-01), Goldman et al.
patent: 5793943 (1998-08-01), Noll
patent: 5805882 (1998-09-01), Cooper et al.
patent: 5826242 (1998-10-01), Montulli
patent: 5925126 (1999-07-01), Hsieh
patent: 6038562 (2000-03-01), Anjur et al.
patent: 6061790 (2000-05-01), Bodnar
patent: 6064736 (2000-05-01), Davis et al.
patent: 6088451 (2000-07-01), He et al.
patent: 6178508 (2001-01-01), Kaufman
patent: 6185696 (2001-02-01), Noll
patent: 6249867 (2001-06-01), Patel
patent: 6282618 (2001-08-01), Flenley
patent: 6381694 (2002-04-01), Yen
patent: 6606695 (2003-08-01), Kamano et al.
patent: 6745332 (2004-06-01), Wong et al.
patent: 6779117 (2004-08-01), Wells
patent: 6847991 (2005-01-01), Kurapati
patent: 6857067 (2005-02-01), Edelman
patent: 6915433 (2005-07-01), Barber
patent: 7007164 (2006-02-01), Euchner
patent: 7017162 (2006-03-01), Smith et al.
patent: 7114078 (2006-09-01), Carman
patent: 7134137 (2006-11-01), Joshi et al.
patent: 2001/0047463 (2001-11-01), Kamano et al.
patent: 2001/0056494 (2001-12-01), Trabelsi
patent: 2002/0026592 (2002-02-01), Gavrila et al.
patent: 2002/0073072 (2002-06-01), Fukumoto
patent: 2002/0099837 (2002-07-01), Oe et al.
patent: 2002/0120755 (2002-08-01), Gomes et al.
patent: 2002/0138756 (2002-09-01), Makofka et al.
patent: 2002/0146128 (2002-10-01), Mauro et al.
patent: 2002/0162013 (2002-10-01), Burnett et al.
patent: 2003/0018912 (2003-01-01), Boyle et al.
patent: 2004/0100972 (2004-05-01), Lumb et al.
patent: 2004/0103202 (2004-05-01), Hildebrand et al.
patent: 2005/0097318 (2005-05-01), Bolosky et al.
patent: 0924630 (1999-06-01), None
W. Wulf, R. Levin, C. Pierson, “Overview of the Hydra Operating System Development”, Proceedings of the Fifth Symposium on Operating Systems Principles, Nov. 1975, pp. i-ii, 122-131, Association for Computing Machinery, Inc., New York.
Ellis Cohen and David Jefferson, “Protection in the Hydra Operating System”, Proceedings of the Fifth Symposium on Operating Systems Principles, Nov. 1975, pp. i-ii, 141-160, Association for Computing Machinery, Inc., New York.
Lee Badger et al., “A Domain and Type Enforcement UNIX* Prototype”, 5th UNIX Security Symposium, Jun. 1995, pp. 127-140.
H. Krawczyk et al., “HMAC-MD5: Keyed-MD5 for Message Authentication”, Network Working Group Internet Draft, Mar. 1996, pp. i, 1-8.
Bart Preneel, “IP Authentication using Keyed MD5 / The ESP DES-CBC Transform”, Katholieke Universiteit Leuven, Belgium, Jul. 1995, pp. 1-4.
P. Metzger, “IP Authentication using Keyed MD5”, RFC 1828 (RFC1828), Aug. 1995, pp. 1-5.
International Search Report, PCT/US03/02716, International Searching Authority (ISA/EP) Apr. 4, 2003.
Hallyn, Serge E., Kearns, Phil, “Domain and Type Enforcement for Linux”, [online], [retrieved on Sep. 21, 2004]. Retrieved from the Internet <URL: http://www.usenix.org/publications/library/proceedings/als00/2000papers/papers/full—papers, pp. 1-16.
International Search Report, PCT/US03/02716, Apr. 4, 2003, 4 pages.
Written Opinion, PCT/US03/02716, Nov. 11, 2003, 5 pages.
Park, J.S. et al., “Role-Based Access Control on the Web,” ACM Transactions on Information and System Security, pp. 37-71, Feb. 2001, vol. 4, No. 1.
Cohen, E. et al., “Protection in the Hydra Operating System,” Fifth Symposium on Operating Systems Principles, Nov. 19-21, 1975, pp. 141-160, [online] Retrieved from the Internet<URL: http://delivery.acm.org/10.1145/810000/806532/p141-cohen.pdf?key1=806532&key2=9644615511&coll=&dl=GUIDE&CFID=15151515&CFTOKEN=6184618>.
Spencer, R. et al., “The Flask Security Architecture: System Support for Diverse Security Policies,” [online] Retrieved from the Internet<URL:http://www.nsa.gov/selinux/papers/flask/pdf>.
Chen Shin-Hon
Fenwick & West LLP
Sheikh Ayaz
Systems Advisory Group Enterprises, Inc.
LandOfFree
Method and apparatus for implementing process-based security... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and apparatus for implementing process-based security..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for implementing process-based security... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3801450