Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer
Patent
1998-06-18
2000-10-10
Beausoliel, Jr., Robert W.
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Protection at a particular protocol layer
G06F 1130
Patent
active
061311650
ABSTRACT:
One embodiment of the present invention provides a method and an apparatus for controlling access to services in a protected memory system. The method makes use of a permit, which includes an access control mechanism that resides in a memory space that is protected from a user of the permit. The method includes receiving a request for a service through a permit, the permit comprising an object defined within an object-oriented programming system. In response to the request, the method activates an access control mechanism within the permit. This access control mechanism controls access to the service and resides in a memory space that is protected from a user of the permit, such that the access control mechanism is triggered by invoking a method on the permit. If the access is allowed, the method accesses the service by performing an invocation on a controlled object. This controlled object includes methods to perform the service, and is otherwise protected from the user of the permit. Another variation of the above embodiment includes receiving, at a permit issuing authority, a request for the permit from an entity (such as a person, a computer program or a computer process) requiring access to the service. If the request includes valid authorization information, a permit is issued to the entity. A further variation of the above embodiment includes creating a copy of the permit and transferring the copy to an entity requiring access to the service.
REFERENCES:
patent: 5649099 (1997-07-01), Theimer et al.
patent: 5677952 (1997-10-01), Blakley et al.
patent: 5692047 (1997-11-01), McManis
patent: 5974549 (1999-10-01), Golan
patent: 6012067 (2000-01-01), Sarkar
patent: 6023794 (2000-02-01), Curtis
patent: 6047377 (2000-04-01), Gong
Tanenbaum, et al., "Experiences with the AMOEBA Distributed Operating System," Communications of the ACM, Dec. 1990, vol. 33, No. 12, pp. 46-63.
Gritzalis S et al: "Security Issues Surrounding Programming Languages for Mobile Code: JAVA rm vs. Safe-Tcl" Operating Systems Review vol. 32, No. 2, Apr. 1, 1998 (1998-04-01), pp. 16-32, XPOOO766954 p. 19, left-hand column, paragraph 1; p. 22, left-hand column, paragraph 4; p. 26, right-hand column, paragraph 2; p. 28 left-hand column, paragraph 1, right-hand column, paragraph 2.
Wallach D S et al: "Extensible security architectures for Java " Proceedings of the ACM Symposium on operating systems principles, 1997, pp. 1-26 14, XP002101681 p. 5, line 7--P. 7, line 11; p. 8, line 9-p. 10, line 13; p. 14, line 1-line 14.
N. Islam et al: "A Flexible Security Model for Using Internet Content" IBM: Developer: Java overview: Library papers, Online! Oct. 1997, (1997-10), XP002115800. IBM Thomas J. Watson Research Center Retrieved from the Internet: URL:http//www.software.ibm.com/developer/library/flexsecurity/ retrieved on Sep. 17, 1999 p. 4 introduction; figure 2; p. 7, paragraph on Java Implementation.
Blaze M et al: Decentralized Trust Management Proceedings of the 1996 IEEE Symposium on Security and Privacy, Oakland, CA May 6-8, 1996. No. SYMP. 17, May 6, 1996 pp. 164-173, XP000634842 Institute of Electrical and Electronics Engineers ISBN: 0-7803-3527-9.
Riechmann, Thomas "<eta Objects for Access Control: Extending Capability-Based Security" 1997 New Security Paradigms Workshop, ACM 1998, pp. 17-22.
Goldstein, Theodore. "The gateway Security Model in the Jaca Cemmercial Client" Sun Microsystems White Paper 1988, pp1-14.
Korba, Larry "Towards Secure Agent Distribution and Communication" Proceedings of the 32nd HAwaii International Conference on Systems Sciences, Canadian Crown 1999 pp 1-10.
Westphall, Carla. "Authorization Schemes for LArge-Scale Systems based on Java, Corba, and Web Security Models". IEEE 1999.
Goldstein Theodore C.
Lipkin Efrem
Beausoliel, Jr. Robert W.
Bonzo Bryce
Sun Microsystems Inc.
LandOfFree
Permit for controlling access to services in protected memory sy does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Permit for controlling access to services in protected memory sy, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Permit for controlling access to services in protected memory sy will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2263894