Program-based authorization

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Security kernel or utility

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S165000, C713S167000, C726S022000, C726S023000, C726S024000, C726S025000, C726S026000, C726S027000, C726S030000

Reexamination Certificate

active

07870387

ABSTRACT:
Techniques which allow definition and enforcement of program-based action authorization policies. On a computer, an action or execution attempt is intercepted in real-time. The subject process, the program file of the subject process, the attempted action and the object of the attempted action are determined. An authorization policy considering the program file indicates whether the attempted action is authorized or not. In a tracking mode, the attempted action and its authorization are logged and the attempted action is allowed to proceed. In an enforcement mode, unauthorized attempts are blocked and logged, thereby enforcing the authorization policy.

REFERENCES:
patent: 4688169 (1987-08-01), Joshi
patent: 4982430 (1991-01-01), Frezza et al.
patent: 5155847 (1992-10-01), Kirouac et al.
patent: 5222134 (1993-06-01), Waite et al.
patent: 5390314 (1995-02-01), Swanson
patent: 5521849 (1996-05-01), Adelson et al.
patent: 5560008 (1996-09-01), Johnson et al.
patent: 5699513 (1997-12-01), Feigen et al.
patent: 5778349 (1998-07-01), Okonogi
patent: 5787427 (1998-07-01), Benantar et al.
patent: 5842017 (1998-11-01), Hookway et al.
patent: 5907709 (1999-05-01), Cantey et al.
patent: 6141698 (2000-10-01), Krishnan et al.
patent: 6192401 (2001-02-01), Modiri et al.
patent: 6275938 (2001-08-01), Bond et al.
patent: 6338149 (2002-01-01), Ciccone, Jr. et al.
patent: 6356957 (2002-03-01), Sanchez, II et al.
patent: 6393465 (2002-05-01), Leeds
patent: 6442686 (2002-08-01), McArdle et al.
patent: 6453468 (2002-09-01), D'Souza
patent: 6587877 (2003-07-01), Douglis et al.
patent: 6662219 (2003-12-01), Nishanov et al.
patent: 6748534 (2004-06-01), Gryaznov et al.
patent: 6769008 (2004-07-01), Kumar et al.
patent: 6769115 (2004-07-01), Oldman
patent: 6832227 (2004-12-01), Seki et al.
patent: 6834301 (2004-12-01), Hanchett
patent: 6847993 (2005-01-01), Novaes et al.
patent: 6918110 (2005-07-01), Hundt et al.
patent: 6930985 (2005-08-01), Rathi et al.
patent: 6988101 (2006-01-01), Ham et al.
patent: 6988124 (2006-01-01), Douceur et al.
patent: 7010796 (2006-03-01), Strom et al.
patent: 7039949 (2006-05-01), Cartmell et al.
patent: 7065767 (2006-06-01), Kambhammettu et al.
patent: 7082456 (2006-07-01), Mani-Meitav et al.
patent: 7093239 (2006-08-01), van der Made
patent: 7124409 (2006-10-01), Davis et al.
patent: 7139916 (2006-11-01), Billingsley et al.
patent: 7152148 (2006-12-01), Williams et al.
patent: 7159036 (2007-01-01), Hinchliffe et al.
patent: 7177267 (2007-02-01), Oliver et al.
patent: 7203864 (2007-04-01), Goin et al.
patent: 7251655 (2007-07-01), Kaler et al.
patent: 7290266 (2007-10-01), Gladstone et al.
patent: 7302558 (2007-11-01), Campbell et al.
patent: 7330849 (2008-02-01), Gerasoulis et al.
patent: 7350204 (2008-03-01), Lambert et al.
patent: 7353501 (2008-04-01), Tang et al.
patent: 7363022 (2008-04-01), Whelan et al.
patent: 7370360 (2008-05-01), van der Made
patent: 7406517 (2008-07-01), Hunt et al.
patent: 7441265 (2008-10-01), Staamann et al.
patent: 7464408 (2008-12-01), Shah et al.
patent: 7506170 (2009-03-01), Finnegan
patent: 7603552 (2009-10-01), Sebes et al.
patent: 7657599 (2010-02-01), Smith
patent: 7698744 (2010-04-01), Fanton et al.
patent: 2002/0099671 (2002-07-01), Mastin Crosbie et al.
patent: 2003/0073894 (2003-04-01), Chiang et al.
patent: 2003/0074552 (2003-04-01), Olkin et al.
patent: 2003/0120601 (2003-06-01), Ouye et al.
patent: 2003/0120811 (2003-06-01), Hanson et al.
patent: 2003/0120935 (2003-06-01), Teal et al.
patent: 2004/0003258 (2004-01-01), Billingsley et al.
patent: 2004/0015554 (2004-01-01), Wilson
patent: 2004/0051736 (2004-03-01), Daniell
patent: 2004/0054928 (2004-03-01), Hall
patent: 2004/0143749 (2004-07-01), Tajalli et al.
patent: 2004/0167906 (2004-08-01), Smith et al.
patent: 2004/0230963 (2004-11-01), Rothman et al.
patent: 2004/0255161 (2004-12-01), Cavanaugh
patent: 2005/0018651 (2005-01-01), Yan et al.
patent: 2005/0108562 (2005-05-01), Khazan et al.
patent: 2005/0114672 (2005-05-01), Duncan et al.
patent: 2005/0228990 (2005-10-01), Kato et al.
patent: 2005/0262558 (2005-11-01), Usov
patent: 2005/0273858 (2005-12-01), Zadok et al.
patent: 2006/0015501 (2006-01-01), Sanamrad et al.
patent: 2006/0080656 (2006-04-01), Cain et al.
patent: 2006/0137009 (2006-06-01), Chesla
patent: 2006/0236398 (2006-10-01), Trakic et al.
patent: 2007/0039049 (2007-02-01), Kupferman et al.
patent: 2007/0083522 (2007-04-01), Nord et al.
patent: 2007/0101435 (2007-05-01), Konanka et al.
patent: 2009/0320140 (2009-12-01), Sebes et al.
Kurt Gutzmann, “Access Control and Session Management in the HTTP Environment,” Jan./Feb. 2001, pp. 26-35, IEEE Internet Computing.
U.S. Appl. No. 11/379,953, entitled “Software Modification by Group to Minimize Breakage,” filed Apr. 24, 2006, Inventor(s): E. John Sebes et al.
U.S. Appl. No. 11/277,596, entitled “Execution Environment File Inventory,” filed Mar. 27, 2006, Inventor(s): Rishi Bhargava et al.
U.S. Appl. No. 10/651,591, entitled “Method and System for Containment of Networked Application Client Software by Explicit Human Input,” filed Aug. 29, 2003, Inventor(s): Rosen Sharma et al.
U.S. Appl. No. 10/806,578, entitled Containment of Network communication, filed Mar. 22, 2004, Inventor(s): E. John Sebes et al.
U.S. Appl. No. 10/739,230, entitled “Method and System for Containment of Usage of Language Interfaces,” filed Dec. 17, 2003, Inventor(s): Rosen Sharma et al.
U.S. Appl. No. 10/935,772, entitled “Solidifying the Executable Software Set of a Computer,” filed Sep. 7, 2004, Inventor(s): E. John Sebes et al.
U.S. Appl. No. 11/060,683, entitled “Distribution and Installation of Solidified Software on a Computer,” filed Feb. 16, 2005, Inventor(s): Bakul Shah et al.
U.S. Appl. No. 11/346,741, entitled “Enforcing Alignment of Approved Changes and Deployed Changes in the Software Change Life-Cycle,” filed Feb. 2, 2006, Inventor(s): Rahul Roy-Chowdhury et al.
U.S. Appl. No. 11/182,320, entitled “Classification of Software on Networked Systems,” filed Jul. 14, 2005, Inventor(s): E. John Sebes et al.
U.S. Appl. No. 11/437,317, entitled “Connectivity-Based Authorization,” filed May 18, 2006, Inventor(s): E. John Sebes et al.
U.S. Appl. No. 12/290,380, entitled “Application Change Control,” filed Oct. 29, 2008, Inventor(s): Rosen Sharma et al.
U.S. Appl. No. 12/008,274, entitled Method and Apparatus for Process Enforced Configuration Management, filed Jan. 9, 2008, Inventor(s): Rishi Bhargava et al.
U.S. Appl. No. 12/291,232, entitled “Method of and System for Computer System State Checks,” filed Nov. 7, 2008, inventor(s): Rishi Bhargava et al.
U.S. Appl. No. 12/322,220, entitled “Method of and System for Malicious Software Detection Using Critical Address Space Protection,” filed Jan. 29, 2009, Inventor(s): Suman Saraf et al.
U.S. Appl. No. 12/322,321, entitled “Method of and System for Computer System Denial-of-Service Protection,” filed Jan. 29, 2009, Inventor(s): Suman Saraf et al.
U.S. Appl. No. 12/426,859, entitled “Method of and System for Reverse Mapping Vnode Pointers,” filed Apr. 20, 2009, Inventor(s): Suman Saraf et al.
U.S. Appl. No. 12/545,609, entitled “System and Method for Enforcing Security Policies in a Virtual Environment,” filed Aug. 21, 2009, Inventor(s): Amit Dang et al.
U.S. Appl. No. 12/545,745, entitled “System and Method for Providing Address Protection in a Virtual Environment,” filed Aug. 21, 2009, Inventor(s): Preet Mohinder.
Eli M. Dow, et al., “The Xen Hypervisor,” INFORMIT, dated Apr. 10, 2008, http://www.informit.com/articles/printerfriendly.aspx?p=1187966, printed Aug. 11, 2009 (13 pages).
“Xen Architecture Overview,” Xen, dated Feb. 13, 2008, Version 1.2, http://wiki.xensource.com/xenwiki/XenArchitecture?action=AttachFile&do=get&target=Xen+architecture—Q1+2008.pdf, printed Aug. 18, 2009 (9 pages).
U.S. Appl. No.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Program-based authorization does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Program-based authorization, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Program-based authorization will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2671765

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.