Methods and systems for providing a secure application...

Information security – Prevention of unauthorized use of data including prevention... – Access control

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S030000

Reexamination Certificate

active

10170591

ABSTRACT:
A secure application environment (“SAE”) may be created by using derivation transformations (“DTs”) to create a derived user account (“DUA”) based on the original user account (“OUA”). An SAE may be created by selecting for each resource whose access is controlled by the OUA a DT that provides security for that resource without, whenever possible, reducing the functionality of the system as a whole, and creating a means for accessing a version of each resource based on the selected DT that may be accessed by an insecure actor.

REFERENCES:
patent: 5263147 (1993-11-01), Francisco et al.
patent: 5265206 (1993-11-01), Shackelford et al.
patent: 5537548 (1996-07-01), Fin et al.
patent: 5619639 (1997-04-01), Mast
patent: 5634102 (1997-05-01), Capps
patent: 5760769 (1998-06-01), Petrie
patent: 5761477 (1998-06-01), Wahbe et al.
patent: 5764985 (1998-06-01), Smale
patent: 5768519 (1998-06-01), Swift et al.
patent: 5787428 (1998-07-01), Hart
patent: 5797128 (1998-08-01), Birnbaum
patent: 5828893 (1998-10-01), Wied et al.
patent: 5832263 (1998-11-01), Hansen et al.
patent: 5845129 (1998-12-01), Wendorf et al.
patent: 5913024 (1999-06-01), Green et al.
patent: 5915085 (1999-06-01), Koved
patent: 5918018 (1999-06-01), Gooderum et al.
patent: 5956507 (1999-09-01), Shearer, Jr. et al.
patent: 5974470 (1999-10-01), Hammond
patent: 5991877 (1999-11-01), Luckenbaugh
patent: 6023721 (2000-02-01), Cummings
patent: 6092192 (2000-07-01), Touboul
patent: 6141754 (2000-10-01), Choy
patent: 6154844 (2000-11-01), Touboul et al.
patent: 6167520 (2000-12-01), Touboul
patent: 6289458 (2001-09-01), Garg et al.
patent: 6385724 (2002-05-01), Beckman et al.
patent: 6453418 (2002-09-01), Ooki et al.
patent: 6505300 (2003-01-01), Chan et al.
patent: 6513111 (2003-01-01), Klimczak et al.
patent: 6529985 (2003-03-01), Deianov et al.
patent: 6587888 (2003-07-01), Chieu et al.
patent: 6772350 (2004-08-01), Belani et al.
patent: 2002/0019941 (2002-02-01), Chan et al.
patent: 2002/0099952 (2002-07-01), Lambert et al.
patent: WO 98/21683 (1998-05-01), None
Anurag Acharya, et al., “MAPbox: Using Parameterized Behavior Classes to Confine Untrusted Applications”, Proceedings of the 9thUSENIX Security Symposium, Aug. 14-17, 2000, 17 pages.
Barry Boehm, “Managing Software Productivity and Reuse,” University of Southern California, Sep. 1999, pp. 111-113.
P. Deutsch, et al., “A Flexible Measurement Tool for Software Systems,” Information Processing (Proceedings of the IFIP Congress), 1972, pp. 320-326.
Guy Edjlali, et al., “History-based Access Control for Mobile Code,” 5thConference on Computer & Communications Security, 1998, pp. 38-48.
Úlfar Erlingsson, et al., “IRM Enforcement of Java Stack Inspection,” IEEE, 2000, 10 pages.
Úlfar Erlingsson, et al., “SASI Enforcement of Security Policies: A Retrospective,” Department of Computer Science, Cornell University, pp. 87-95.
David Evans, et al., “Flexible Policy-Directed Code Safety,” MIT Laboratory for Computer Science, IEEE, 1999, 14 pages.
Timothy Fraser, et al., “Hardening COTS Software with Generic Software Wrappers,” TIS Labs at—Network Associates, Inc., IEEE, 1999, 15 pages.
Ian Goldberg, et al., “A Secure Environment for Untrusted Helper Applications (Confining the Wily Hacker),” Proceedings of the Sixth USENIX UNIX Security Symposium, Jul. 1996, 14 pages.
Robert P. Goldberg, “Survey of Virtual Machine Research,” IEEE Computer, Jun. 1974, vol. 7, No. 6, pp. 34-45.
Manoj Lal, et al., “A Scheduling Scheme for Controlling Allocation of CPU Resources for Mobile Programs,” University of California, Davis, Aug. 31, 1999, pp. 1-33.
Jerome H. Salzter, et al., “The Protection of Information in Computer Systems”, Proceedings of the IEEE 63, Sep. 1975, 30 pages.
Robert Wahbe, et al., “Efficient Software-Based Fault Isolation,” Computer Science Division , University of California, SIGOPS, 1993, pp. 203-216.
Islam, N. et al., “A Flexible Security System for Using Internet Content,” IEEE, Sep./Oct. 1997, pp. 52-59.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Methods and systems for providing a secure application... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Methods and systems for providing a secure application..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Methods and systems for providing a secure application... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3785689

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.