Method for security shield implementation in computer system's s

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

713201, G06F 1300

Patent

active

059251263

ABSTRACT:
A security shield implementation method comprising computer software for use with a computer system's software which is transparent to the user of the computer system software and utilizes the steps of system call interception and interactive command interception to control access by a user of the computer system software. The system call interception for non-interactive commands, file access, programs, networks, and the interactive commands, such as access to interactive programs, are routed and examined by redirector software. Security rule checks and log event functions are then conducted on the non-interactive commands, file access requests, programs, networks, and the interactive commands. If a non-interactive command, file access request, program, network, or an interactive command is approved, the command request is then forwarded to the computer operating system.

REFERENCES:
patent: 5369707 (1994-11-01), Follendore, III
patent: 5579478 (1996-11-01), Heiserman et al.
patent: 5689638 (1997-11-01), Sadovsky
patent: 5774650 (1998-06-01), Chapman et al.
patent: 5797128 (1998-08-01), Birnbaum
patent: 5802276 (1998-09-01), Benantar et al.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method for security shield implementation in computer system's s does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method for security shield implementation in computer system's s, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for security shield implementation in computer system's s will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-1318046

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.