Security requirement determination

Information security – Prevention of unauthorized use of data including prevention...

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S001000, C726S030000, C717S126000, C717S131000, C717S135000, C717S100000, C717S101000, C717S124000, C717S125000, C717S127000, C717S128000, C717S129000, C713S193000

Reexamination Certificate

active

07743423

ABSTRACT:
All execution paths of one or more assemblies in managed code are simulated to find the permissions for each execution path. The managed code can correspond to a managed shared library or a managed application. Each call in each execution path has a corresponding permissions set. When the library or application has permissions to execute that are not less than the required permission sets for the execution paths, any dynamic execution of the library or application will not trigger a security exception The simulated execution provides a tool that can be used to ensure that code being written will not exceed a maximum security permission for the code. A permission set can be determined by the tool for each assembly corresponding to an application and for each entry point corresponding to a shared library.

REFERENCES:
patent: 5915085 (1999-06-01), Koved
patent: 5958050 (1999-09-01), Griffin et al.
patent: 5978484 (1999-11-01), Apperson et al.
patent: 6012100 (2000-01-01), Frailong et al.
patent: 6044466 (2000-03-01), Anand et al.
patent: 6044467 (2000-03-01), Gong
patent: 6138238 (2000-10-01), Scheifler et al.
patent: 6473800 (2002-10-01), Jerger et al.
patent: 6490679 (2002-12-01), Tumblin et al.
patent: 6735758 (2004-05-01), Berry et al.
patent: 7076557 (2006-07-01), LaMacchia et al.
patent: 7076804 (2006-07-01), Kershenbaum et al.
patent: 7207064 (2007-04-01), Fee et al.
patent: 2002/0019941 (2002-02-01), Chan et al.
patent: 2002/0174224 (2002-11-01), Scheifler et al.
patent: 2003/0041267 (2003-02-01), Fee et al.
patent: 2003/0225698 (2003-12-01), Stefik et al.
patent: 2004/0040017 (2004-02-01), Kershenbaum et al.
patent: 2004/0216150 (2004-10-01), Scheifler et al.
patent: 2004/0237067 (2004-11-01), Sun et al.
Larry Koved, Aaron Kershenbaum, Marco Pistoia, Access right Analysis for Java, Oct. 31, 2001, IBM Research Report, RC22224.
Larry Koved, Aaron Kershenbaum, Marco Pistoia, Access Rights Analysis for Java, Oct. 31, 2001, IBM Research Report, RC22224.
Larry Koved, Aaron Kershenbaum, Marco Pistoia, Access Rights Analysis for Java, Oct. 31, 2001, IBM Research Report, RC22224.
Larry Koved, Aaron Kershenbaum, Marco Pistoia, Access Rights Analysis for Java, Oct. 31, 2001, IBM Research Report, RC22224, pp. 1-14.
David Wong and Rohyt Belani, Secure Programming with .Net, Nov. 26, 2002, http://www.securityfocus.com/infocus/1645, pp. 1-5.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Security requirement determination does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Security requirement determination, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Security requirement determination will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4215435

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.