Information security – Prevention of unauthorized use of data including prevention... – Access control
Reexamination Certificate
2008-05-27
2008-05-27
Jung, David Y (Department: 2134)
Information security
Prevention of unauthorized use of data including prevention...
Access control
C726S030000, C726S021000
Reexamination Certificate
active
07380281
ABSTRACT:
The present invention provides a system and method for automatically hiding sensitive information, obtainable from a process table, from other processes that should not access the sensitive information. The system and method include a sensitive command attribute table that is used by a system administrator to designate the commands and command attributes that will typically be associated with sensitive information. The sensitive command attribute table is used when a command is entered that requests information from the process table to be displayed or output. In response, a search of the process table entries is made to determine if a command and/or its attribute in the process table matches an entry in the sensitive command attribute table. If so, the command, its attributes, and/or its attribute values are blanked from the output of the process table information.
REFERENCES:
http://www.totse.com/en/hack/hack—attack/164400.html.
One-way Web Hacking, Kelly Lum, Mar. 4, 2004.
Improving the security of a dynamic look-up table based chaotic cryptosystem; Di Xiao; Xiaofeng Liao; Kwok-Wo Wong; Circuits and Systems II: Express Briefs, IEEE Transactions on [see also Circuits and Systems II: Analog and Digital Signal Processing, IEEE Transactions on] vol. 53, Issue 6, Jun. 2006 pp. 502-506.
Look-up Table Based Chaotic Encryption of Audio Files Ganesan, K.; Muthukumar, R.; Murali, K.; Circuits and Systems, 2006. APCCAS 2006. IEEE Asia Pacific Conference on Dec. 4-7, 2006 pp. 1951-1954.
A prefix space partitioning approach to scalable peer gateway discovery in secure virtual private networks Doshi, B.; Military Communications Conference, 2005. MILCOM 2005. IEEE Oct. 17-20, 2005 pp. 2735-2741 vol. 5.
Genty Denise Marie
Mullen Shawn Patrick
Tesauro James Stanley
Fay, II Theodore D.
International Business Machines - Corporation
Jung David Y
Salys Cas K.
Yee Duke W.
LandOfFree
System and method for automatically hiding sensitive... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with System and method for automatically hiding sensitive..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for automatically hiding sensitive... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2813190