Method and apparatus for implementing process-based security...

Information security – Monitoring or scanning of software or data including attack...

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S027000, C726S016000, C726S017000, C726S018000, C713S193000, C713S164000, C713S165000, C713S166000, C713S167000, C709S229000, C709S223000

Reexamination Certificate

active

10061701

ABSTRACT:
A method is disclosed for providing process-based security in a special purpose computer system, comprising the steps of: configuring the special purpose computer with an operating system and at least one application for operation as a computer appliance; associating a resource access table with the at least one application, addressable by the at least one application, containing statements corresponding to predetermined requests for access to at least a one specified resource during running of the at least one application wherein the resource access table statements include information defining an execution path for the at least one application; interpreting the resource access table statements upon a request for the specified resource by the at least one application, wherein at least one of the statements in the resource access table provides for performing a security check prior to granting access to the specified resource; and causing the execution of the at least one application, upon granting access to the requested resource, including the use of the requested resource according to the execution path statements in the resource access table.

REFERENCES:
patent: 4104718 (1978-08-01), Poublan et al.
patent: 4901231 (1990-02-01), Bishop et al.
patent: 4984272 (1991-01-01), McIlroy et al.
patent: 5032979 (1991-07-01), Hecht et al.
patent: 5109515 (1992-04-01), Laggis et al.
patent: 5113442 (1992-05-01), Moir
patent: 5200998 (1993-04-01), Bakaher et al.
patent: 5301337 (1994-04-01), Wells et al.
patent: 5327531 (1994-07-01), Bealkowski et al.
patent: 5469556 (1995-11-01), Clifton
patent: 5483596 (1996-01-01), Rosenow et al.
patent: 5504814 (1996-04-01), Miyahara
patent: 5572694 (1996-11-01), Uchino
patent: 5666415 (1997-09-01), Kaufman
patent: 5684951 (1997-11-01), Goldman et al.
patent: 5793943 (1998-08-01), Noll
patent: 5805882 (1998-09-01), Cooper et al.
patent: 5826242 (1998-10-01), Montulli
patent: 5925126 (1999-07-01), Hsieh
patent: 6038562 (2000-03-01), Anjur et al.
patent: 6061790 (2000-05-01), Bodnar
patent: 6064736 (2000-05-01), Davis et al.
patent: 6088451 (2000-07-01), He et al.
patent: 6178508 (2001-01-01), Kaufman
patent: 6185696 (2001-02-01), Noll
patent: 6249867 (2001-06-01), Patel
patent: 6282618 (2001-08-01), Flenley
patent: 6381694 (2002-04-01), Yen
patent: 6606695 (2003-08-01), Kamano et al.
patent: 6745332 (2004-06-01), Wong et al.
patent: 6779117 (2004-08-01), Wells
patent: 6847991 (2005-01-01), Kurapati
patent: 6857067 (2005-02-01), Edelman
patent: 6915433 (2005-07-01), Barber
patent: 7007164 (2006-02-01), Euchner
patent: 7017162 (2006-03-01), Smith et al.
patent: 7114078 (2006-09-01), Carman
patent: 7134137 (2006-11-01), Joshi et al.
patent: 2001/0047463 (2001-11-01), Kamano et al.
patent: 2001/0056494 (2001-12-01), Trabelsi
patent: 2002/0026592 (2002-02-01), Gavrila et al.
patent: 2002/0073072 (2002-06-01), Fukumoto
patent: 2002/0099837 (2002-07-01), Oe et al.
patent: 2002/0120755 (2002-08-01), Gomes et al.
patent: 2002/0138756 (2002-09-01), Makofka et al.
patent: 2002/0146128 (2002-10-01), Mauro et al.
patent: 2002/0162013 (2002-10-01), Burnett et al.
patent: 2003/0018912 (2003-01-01), Boyle et al.
patent: 2004/0100972 (2004-05-01), Lumb et al.
patent: 2004/0103202 (2004-05-01), Hildebrand et al.
patent: 2005/0097318 (2005-05-01), Bolosky et al.
patent: 0924630 (1999-06-01), None
W. Wulf, R. Levin, C. Pierson, “Overview of the Hydra Operating System Development”, Proceedings of the Fifth Symposium on Operating Systems Principles, Nov. 1975, pp. i-ii, 122-131, Association for Computing Machinery, Inc., New York.
Ellis Cohen and David Jefferson, “Protection in the Hydra Operating System”, Proceedings of the Fifth Symposium on Operating Systems Principles, Nov. 1975, pp. i-ii, 141-160, Association for Computing Machinery, Inc., New York.
Lee Badger et al., “A Domain and Type Enforcement UNIX* Prototype”, 5th UNIX Security Symposium, Jun. 1995, pp. 127-140.
H. Krawczyk et al., “HMAC-MD5: Keyed-MD5 for Message Authentication”, Network Working Group Internet Draft, Mar. 1996, pp. i, 1-8.
Bart Preneel, “IP Authentication using Keyed MD5 / The ESP DES-CBC Transform”, Katholieke Universiteit Leuven, Belgium, Jul. 1995, pp. 1-4.
P. Metzger, “IP Authentication using Keyed MD5”, RFC 1828 (RFC1828), Aug. 1995, pp. 1-5.
International Search Report, PCT/US03/02716, International Searching Authority (ISA/EP) Apr. 4, 2003.
Hallyn, Serge E., Kearns, Phil, “Domain and Type Enforcement for Linux”, [online], [retrieved on Sep. 21, 2004]. Retrieved from the Internet <URL: http://www.usenix.org/publications/library/proceedings/als00/2000papers/papers/full—papers, pp. 1-16.
International Search Report, PCT/US03/02716, Apr. 4, 2003, 4 pages.
Written Opinion, PCT/US03/02716, Nov. 11, 2003, 5 pages.
Park, J.S. et al., “Role-Based Access Control on the Web,” ACM Transactions on Information and System Security, pp. 37-71, Feb. 2001, vol. 4, No. 1.
Cohen, E. et al., “Protection in the Hydra Operating System,” Fifth Symposium on Operating Systems Principles, Nov. 19-21, 1975, pp. 141-160, [online] Retrieved from the Internet<URL: http://delivery.acm.org/10.1145/810000/806532/p141-cohen.pdf?key1=806532&key2=9644615511&coll=&dl=GUIDE&CFID=15151515&CFTOKEN=6184618>.
Spencer, R. et al., “The Flask Security Architecture: System Support for Diverse Security Policies,” [online] Retrieved from the Internet<URL:http://www.nsa.gov/selinux/papers/flask/pdf>.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and apparatus for implementing process-based security... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and apparatus for implementing process-based security..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for implementing process-based security... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3801450

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.