Information security – Monitoring or scanning of software or data including attack...
Reexamination Certificate
2006-02-03
2010-10-19
Song, Hosuk (Department: 2435)
Information security
Monitoring or scanning of software or data including attack...
C726S026000, C726S027000
Reexamination Certificate
active
07818798
ABSTRACT:
A computer system configured to intercept method calls placed on an object. By intercepting method calls, processing may be performed on a method call-by-method call basis. As part of the processing, metadata for an object is consulted to partition the methods for that object into subsets. The processing performed in response to any specific method call may be based on the subset to which the method belongs. The type of metadata may depend on the desired operation of the computer system. Metadata representing a white list or black list may be used in a computer system that implements a security zone that allows access to methods deemed to be safe or to deny access to methods deemed to be unsafe. In a performance monitoring system, metadata may identify methods to be logged or methods for which execution cost are to be measured. Values returned by a method call may also be processed when the method calls are intercepted. The returned value may be wrapped with a wrapper that holds data useful in implementing a security zone or for performing other processing.
REFERENCES:
patent: 6182277 (2001-01-01), Degroot et al.
patent: 6587888 (2003-07-01), Chieu et al.
patent: 2002/0004934 (2002-01-01), Toutonghi et al.
patent: 2004/0054696 (2004-03-01), Sheinis et al.
patent: 2005/0193269 (2005-09-01), Haswell et al.
Strawmyer, M.,.Net Remoting, Jupitermedia Corp. Oct. 10, 2002, pp. 1-3, downloaded from www.developer.com
et/cplus/article.php/1479761, on Apr. 28, 2006.
Deremer, B.,Throwing Custom Exception Types from a Managed COM+ Server Application, . . . (11 pgs.) Microsoft Corp. and CMP Media, LLC, downloaded from http://msdn.microsoft.com/msdnmag/issues/04/03/ExceptionsinCOM/default.aspx?print=tr on Apr. 28, 2006.
Java Remote Method Invocation(Java RMI), Sun Microsystems, Inc., 1 pg., downloaded from http://java.sun.com/oroducts/jdk/rmi/, on Apr. 28, 2006.
Liong, L.B.,Understanding The COM Single-Threaded Apartment Part 1, CodeProject (1999-2006), pp. 1-35, downloaded from http://209.171.52.99/com/CCOMThread.asp?print=true, on Apr. 28, 2006.
International Search Report in PCT/US07/002671, dated Jul. 24, 2007, 8 pages.
Extended European Search Report from European Application No. 07763071.3.
Blümlinger et al., “Controlling Access to Distributed Object Frameworks,”Lecture Notes in Computer Sciencevol. 2789/2003:184-187 (Oct. 22, 2003).
Oaks, Scott, “Java Security,” Section 4.2, paragraph 1, O'Reilly & Associates, Inc., 101 Morris Street, Sebastopol, Calif. 95472, May 1998.
Riechmann et al., “Meta Objects for Access Control: Extending Capability-Based Security,”Proc. Of the New Security Paradigms Workshop. NSPW '97, Langdale, UK, Sep. 23-26, 1997, New Security Paradigms Workshop, ACM vol. Conf. 6:17-22 (Sep. 23, 1997).
Goldstein Seth D.
Jansen Ryan M.
Shekhel Jerry J.
Microsoft Corporation
Song Hosuk
Wolf Greenfield & Sacks P.C.
LandOfFree
Software system with controlled access to objects does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Software system with controlled access to objects, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Software system with controlled access to objects will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4181473