Information security – Access control or authentication
Reexamination Certificate
2011-06-14
2011-06-14
Poltorak, Peter (Department: 2434)
Information security
Access control or authentication
Reexamination Certificate
active
07962950
ABSTRACT:
In one embodiment, the present invention is related to a computer system including compartments implemented on an operating system. A database contains access rules with the access rules defining which compartments are authorized to access particular file resources. A kernel module receives a system call to access a file from a user space application belonging to a compartment. A security module determines whether the user space application is authorized to access the file utilizing access rules stored in the database.
REFERENCES:
patent: 4984272 (1991-01-01), McIlroy et al.
patent: 5720033 (1998-02-01), Deo
patent: 5778222 (1998-07-01), Herrick et al.
patent: 5802590 (1998-09-01), Draves
patent: 6023765 (2000-02-01), Kuhn
patent: 6038563 (2000-03-01), Bapat et al.
patent: 6044467 (2000-03-01), Gong
patent: 6047377 (2000-04-01), Gong
patent: 6202066 (2001-03-01), Barkley et al.
patent: 6408298 (2002-06-01), Van et al.
patent: 6928466 (2005-08-01), Bulka et al.
patent: 2002/0026592 (2002-02-01), Gavrila et al.
patent: 2002/0107874 (2002-08-01), DeLorme et al.
patent: 2002/0186260 (2002-12-01), Young
patent: 2004/0158722 (2004-08-01), Carpenter
patent: 0 768 594 (1997-04-01), None
patent: 0926605 (1999-06-01), None
patent: WO 02/50644 (2002-06-01), None
patent: WO 02/061552 (2002-08-01), None
patent: WO 02/061553 (2002-08-01), None
patent: WO 02/061554 (2002-08-01), None
Deitel (H.M. Deitel, “Operating Systmes”, 2nd edition, 1990, ISBN: 0201180383).
Sobell (Mark G. Sobell, “A practial guide to the UNIX system”, 3rd edition, 1995, ISBN: 0805375651).
Hadfield et al. (Lee Hadfield, Dave Hater, Dave Bixler, “Windows NT Server 4 Security Handbook”, 1997, ISBN: 078971213).
Microsoft (Jumes et al., Windows NT 4.0 Seucurity, Audit, and Control, 1999, ISBN: 157231818-X), p. 151.
Dalton et al. (Chris Dalton and Tse Choo, “An operating system approach to securing e-services”, Communications of the ACM, vol. 44, No. 2, Feb. 2001).
Hadfield et al. (Lee Hadfield, Dave Hater, Dave Bixler, “Windows NT Server 4 Security Handbook”, 1997, ISBN: 078971213), pp. 84,153-154,194-198, 200.
Minasi (Mark Minasi, “Mastering Windows NT Server 4” 6th edition, 1999, ISBN: 0782124453) and MicrosoftSupport (“Default NTFS Permissions in Windows NT”, Q148437), p. 521-522.
MicrosoftSupport (“Default NTFS Permissions in Windows NT”, Q148437), http://support.microsoft.com/default.aspx?scid=KB;EN-US;Q148437&ID=KB;EN-US;Q148437.
MicrosoftPress (“Supporting Microsoft Windows NT Server in the Enterprise”, 1998, ISBN: 1572317108), p. 698.
CSFY, “Windows NT4 Explorer: The File System, How items are placed and located”, Department of Computing Science University of Alberta, http://www-csfy.cs.ualberta.ca/tutorials/Windows—Explorer/File—system/.
Expert-Exchange (“Default NTFS Permissions in Windows NT”, Feb. 1998).
Donald V. Miller and Robert W. Baldwin, Access Control by Boolean Expression Evaluation, IEEE 1990.
Stallings (William Stallings, “Cryptography and network security”, 2th edition, 1998, ISBN: 0138690170) , p. 527-529.
Deitel (Harvey M. Deitel, An Introduction to Operating Systems, ISBN: 0201180383, 1990), p. 400-401 and 576-577.
Hewlet-Parkard Virutal Vault “Administrator's Guide,” HP Part No. B5413-90061, Release A.04.50, E0401, printed 2001, pp. ii-xii, and 1-224, Available online at http://docs.hp.com/hpux/pdf/B5413-90061.pdf.
Hewlett-Packard Trusted Solaris Administration Overview, Chapter 3, “Administering Trusted Networking,”—Dec. 2000, pp. 71-78. Available online at http://docs.sun.com/ab2/coll.175.4/TRSOLADMINOV/@Ab2PageView/4120?Ab2Lang = C&Ab2Enc = 820-8859-1.
Hewlett-Packard Trusted solaris Administration Overview, Chapter 4, “Administering Auditing,”—Dec. 2000, pp. 87-99. Available online at http://docs.sun.com/ab2/coll.175.4/TRSOLADMINOV/@Ab2PageView/5573?Ab2Lang= C&Ab2Enc = iso-8859-1.
HP Praesidium VirtualVault “Concepts Guide,” HP Part No. B5413-90051, Release A.04.00, E1199, printed 199, pp. ii-viii, and 1-82. Available on-line at http://docs.hp.com/hpux/pdf/B5413-90051.pdf.
Sun Microsystems “Trusted Solaris Audit Administration,” Trusted Solaris 8, Sun Microsystems Part No. 805-8121-10, Dec. 2000, pp. 1-342. Available on-line at http://docs.sun.com/ab2/coll.175.4/TRSOLAUDADMIN/@Ab2TocView?AAb2Lang = C&Ab2Enc = iso-8859-1.
Sun Microsystems “Compartmented Mode Workstation Labeling: Encodings Format,” Sun Microsystems Part No. 805-8123, Dec. 2000, pp. 1-176. Available on-line at http://docs.sun.com/ab2/coll.175.4/TRSOLLBLADMIN/@Ab2TocView?Ab2Lang = C&Ab2Enc = iso-8859-1.
Lin A & Brown R, “The application of security policy role-based access control and the common data security architecture,” Computer Communications, v23, n17, pp. 1584-1593, Nov. 2000, ISSN 0140-3664.
Foreign Search Report under Section 17, Jan. 13, 2003.
Sun Microsystems “Trusted Solaris User's Guide,” Sun Microsystems Part No. 805-8115-10, Dec. 2000, pp. 1-133. Available on-line at http://docs.sun.com/ab2/coll.175.4/TRSSUG/@Ab2TocView?Ab2Lang = C&Ab2Enc = iso-8859-1.
Berger Joubert
Choo Tse Huong
Leerssen Scott Alan
Hewlett--Packard Development Company, L.P.
Poltorak Peter
LandOfFree
System and method for file system mandatory access control does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with System and method for file system mandatory access control, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for file system mandatory access control will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2722407