Method for adding and enforcing enhanced authorization...

Information security – Access control or authentication – Stand-alone

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S021000, C713S167000

Reexamination Certificate

active

07454788

ABSTRACT:
In this invention, when security policy is attached to a file, a device protection manager is given the protected file's name. If the file is a special device file, then the device manager records the device specification in a device database. When a device access occurs, the device specification is extracted from the special device file used in the access. This extracted device specification is then used to search the device database. If a matching device specification is found in the database and the accessed device file has the same name as the protected resource, then authorization policy rules on that resource determine the access. If the match is a different device file name from the protected file name for the same device, then the search continues until the exact accessed device is found or until all device specification matches are found. In the absence of an exact device file match, all the matching device files are presented to the external security manager for authorization checking and the most restrictive outcome prevails.

REFERENCES:
patent: 4919545 (1990-04-01), Yu
patent: 5113442 (1992-05-01), Moir
patent: 5283830 (1994-02-01), Hinsley et al.
patent: 5414852 (1995-05-01), Kramer et al.
patent: 5479612 (1995-12-01), Kenton et al.
patent: 5483649 (1996-01-01), Kuznetsov et al.
patent: 5859966 (1999-01-01), Hayman et al.
patent: 6112263 (2000-08-01), Futral
P. Galvin et al., Applied Operating System Concepts, First Edition, “Chapter 12: I/O Hardware”, section 12.3 , pp. 412-415; section 12.5 I/O Request Handling, pp. 424-427; “Chapter 20: Programmer Interface”, section 20.3.1 File Manipulation, p. 627.
A. Silberschatz et al. Operating System Concepts, “Chapter 11: File-System Implementation”, section 11.1.1 File-System Organization, pp. 384-385.
T. Hein et al. UNIX System Administration Handbook, “Chapter 7: Devices and Drivers”, pp. 96-99.
“A Basic UNIX Tutorial: The Unix Filesystem”, Jan. 9, 1996, Idaho state university webpage tutorial, http://www.isu.edu/departments/comcom/unix/workshop/fstour.html.
“Exactly What is a Driver”, OSR Online, May 24, 2003, http://www.osronlie.com/custom.cfm?name=articlePrint.cfm&id=233.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method for adding and enforcing enhanced authorization... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method for adding and enforcing enhanced authorization..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for adding and enforcing enhanced authorization... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4048197

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.