Data processing: artificial intelligence – Knowledge processing system – Knowledge representation and reasoning technique
Reexamination Certificate
2006-02-15
2009-02-10
Hirl, Joseph P (Department: 2129)
Data processing: artificial intelligence
Knowledge processing system
Knowledge representation and reasoning technique
C706S014000, C706S025000
Reexamination Certificate
active
07490072
ABSTRACT:
Providing access control for an application is disclosed. An application is monitored. An application profile is generated for the application. The application profile is based at least in part on behavior of the application as observed through the monitoring of the application. The application profile defines one or more access controls associated with the application.
REFERENCES:
patent: 4918653 (1990-04-01), Johri et al.
patent: 6457130 (2002-09-01), Hitz et al.
patent: 6799208 (2004-09-01), Sankaranarayan et al.
patent: 7181768 (2007-02-01), Ghosh et al.
patent: 2003/0115292 (2003-06-01), Griffin et al.
patent: 2004/0025048 (2004-02-01), Porcari et al.
patent: 2004/0049697 (2004-03-01), Ewards, Jr. et al.
patent: 2005/0120054 (2005-06-01), Shulman et al.
patent: 2005/0246588 (2005-11-01), Deng et al.
patent: 2006/0047657 (2006-03-01), Frieder et al.
patent: 2006/0123101 (2006-06-01), Buccella et al.
patent: 2006/0230124 (2006-10-01), Belfiore et al.
Stephanie Forrest, Computer Immunnology, Oct. 1997, ACm, 88-96.
Peter Aiken et al., Microsoft Computer Dictionary, 2002, Microsoft Press, Fifth Edition.
Crispin Cowan, Seth Arnold, Steve Beattie, Chris Wright, Wirex and John Viega, Secure Software;Immunix&Defcon: Defending Vulnerable Code From Intense Attack; Apr. 23, 2003; IMMUNIX; USA.
Crispin Cowan, Steve Beattie, Greg Kroah-Hartman, Calton Pu, Perry Wagle, and Virgil Gligor—WireX Communications, Inc.;SubDomain: Parsimonious Server Security; Proceedings of the 14thSystems Administration Conference; Dec. 3-8, 2000; The USENIX Association, USA.
Crispin Cowan, Seth Arnold, Steve Beattie, and Chris Wright, Wirex Communications, Inc. & John Viega, Secure Software Inc.;Defcon Capture the Flag: Defending Vulnerable Code from Intense Attack; USA, no date.
Tanenbaum, Andrew S., Modern Operating Systems; 2nd ed.; 2001; Prentice Hall, Upper Saddle River, NJ; pp. 753-757.
Forrest, Stephanie, et al., “Computer Immunology,” vol. 40, No. 10, Oct. 1997, ACM, pp. 88-96.
Garfinkel, et al., Practical Unix & Internet Security, ISBN 1-56592-148-8, Chpt. 3.1, 3.2, 4.1, 4.2, Second Ed., Apr. 1996.
Tanenbaum, Andrew S., “Computer Networks,” Prentice Hall 1996, Third Edition, pp. 29, 44.
Fusco, John, “The Linux Programmer's Toolbox,” Chapter 5, “What Every Developer Should Know about the Kernel,” pp. 222-224, Prentice Hall 2007.
Nemeth, Evi, et al., “Linux Administration Handbook,” Chapter 12—TCP/IP Networking, pp. 276-277, Prentice Hall 2006.
Newham, Cameron and Rosenblatt, Bill, “Learning the bash Shell,” 2nd Ed., O'Reilly & Associates, 1998, p. 13.
Arnold Seth R.
Beattie Steven M.
Cowan S. Crispin
Johansen John R.
Jones Anthony D.
Hirl Joseph P
Marger & Johnson & McCollom, P.C.
Novell Inc.
LandOfFree
Providing access controls does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Providing access controls, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Providing access controls will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4088551