Method and apparatus for realizing computer security

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

380 23, C06F 1100

Patent

active

060732407

ABSTRACT:
A method suitable for realizing computer security. The method includes the steps of establishing an authorization window for enabling computer system actions consistent with an authorization rule; and, monitoring the actions as an indicia of conformance to the authorization rule. The method preferably provides a pattern of system actions as an indicia of compliance with an authorization rule, and provides notification of predetermined patterns.

REFERENCES:
patent: 4916738 (1990-04-01), Chandra et al.
patent: 4962449 (1990-10-01), Schlesinger
patent: 5233658 (1993-08-01), Bianco et al.
patent: 5265221 (1993-11-01), Miller
patent: 5287519 (1994-02-01), Dayan et al.
patent: 5388211 (1995-02-01), Hornbuckle
patent: 5483596 (1996-01-01), Rosenow et al.
patent: 5724423 (1998-03-01), Khello
patent: 5724426 (1998-03-01), Rosenow et al.
patent: 5848232 (1998-12-01), Lermuzeaux et al.
patent: 5881225 (1999-03-01), Worth
Giuri et al., A role-based secure database design tool, Computer security foundation workshop, Proceed. of the sixth annual, pp. 203-212, Jul. 1996.
Peri et al., Formal specification of information flow security policies and their enforcement in security critical systems, Computer security foundation workshop, 1994 CSFW 7 Proceed., pp. 118-125, Jun. 1994.
Mao et al., Development of authentication protocols: some misconceptions and a new approach, Computer security foundation workshop, 1994 Proceed., pp. 178-186, Jun. 1994.
Williams et al., Automated support for external consistency, Computer security applications conference, 1994 Proceeds., pp. 71-81, May 1993.
Garfinkel et al., Book: Practical UNIX Security, pp. 125-130, Jun. 1991.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and apparatus for realizing computer security does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and apparatus for realizing computer security, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for realizing computer security will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2224138

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.