Information security – Prevention of unauthorized use of data including prevention... – Access control
Reexamination Certificate
2005-01-28
2009-10-13
Chai, Longbit (Department: 2431)
Information security
Prevention of unauthorized use of data including prevention...
Access control
C726S027000, C726S028000, C726S030000, C726S002000, C726S003000, C713S182000, C713S183000, C713S184000, C713S185000, C709S223000, C709S224000, C709S225000, C709S226000
Reexamination Certificate
active
07603719
ABSTRACT:
A method and apparatus for enabling multiple application programs to control a system's physical resources by way of multiple resource proxies, while still enabling exclusive control of the physical resource by one application program. Control tokens are used to limit control to one proxy. The proxy having the control token is tracked in an access control list. Java API methods that can alter the state of a physical resource are marked with an access control attribute during grinding. A resource management module intercepts API methods attempting to obtain control of the physical resource. If a proxy controlled by the application program invoking the intercepted method has control the method is allowed to use the proxy to control the physical resource.
REFERENCES:
patent: 7343379 (2008-03-01), Marvin et al.
patent: 2003/0007003 (2003-01-01), Ostrowski et al.
U.S. Appl. No. 10/757,620, filed Jan. 14, 2004, Wannamaker et al.
Thomas Steven Robert
Wannamaker Jeffrey Ronald
Banner & Witcoff , Ltd.
Chai Longbit
TVWorks, LLC.
LandOfFree
Resource access control does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Resource access control, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Resource access control will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4135387