Method of and apparatus for providing automatic security control

Cryptography – Key management – Having particular key generator

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

395600, 380 4, 380 25, 34082531, 34082534, 3642864, 3642865, 364264, 3642645, 3642225, 3642226, 364DIG1, H04L 900, G06F 1214, G06F 1338

Patent

active

054287952

ABSTRACT:
Automatic detection of security violation objects within distributions and appropriate handling of those violations is provided. A confidential object dictionary contains definitions of objects which violate security. Distributions are automatically searched for objects contained in the dictionary. A violation log may be used for summarizing violations and determining an appropriate predefined action for a violation. The appropriate predefined action for a violation may include third party notification, notifying third parties in priority order, safe storing the violation, or inhibiting distribution of the violation.

REFERENCES:
patent: 4104721 (1978-08-01), Markstein et al.
patent: 4271482 (1981-06-01), Giraud
patent: 4471163 (1984-09-01), Donald et al.
patent: 4701840 (1987-10-01), Boebert et al.
patent: 4713753 (1987-12-01), Boebert et al.
patent: 4947318 (1990-08-01), Mineo
patent: 5032979 (1991-07-01), Hecht et al.
patent: 5056009 (1991-10-01), Mizuta
patent: 5075845 (1991-12-01), Lai et al.
patent: 5126728 (1992-06-01), Hall
patent: 5163147 (1992-11-01), Orita
patent: 5265221 (1993-11-01), Miller
patent: 5265245 (1993-11-01), Nordstrom et al.
patent: 5291598 (1994-03-01), Grundy
patent: 5315655 (1994-05-01), Chaplin
patent: 5317729 (1994-05-01), Mukherjee et al.
International Business Machines Corporation CP Command and Utility Reference, Release 1 IBM No. SC24-5519-00, Published Mar., 1991 at Endicott, N.Y.
M. G. Sobell A Practical Guide to UNIX System V, Second Edition Published 1991 at Redwood City, Calif.
J. S. Langford, D. H. Steves, and K. C. Witte "Administrative Role Configuration with Privilege Control Lists" IBM Technical Disclosure Bulletin, vol. 34, No. 7B, pp. 110-113, Published Dec., 1991 at Armonk, N.Y.
D. H. Steves, and K. C. Witte "Logically Extensible Privilege Control Set" IBM Technical Disclosure Bulletin, vol. 34, No. 7B, pp. 106-109, Published Dec., 1991 at Armonk, N.Y.
D.H. Steves, and K. C. Witte "Trojan Horse and Virus Detection Using Real Time Auditing" IBM Technical Disclosure Bulletin, vol. 34, No. 7B, pp. 78-81, Published Dec., 1991 at Armonk, N.Y.
W. Schwendemann, and P. Wang "C2 Audit Filter" IBM Technical Disclosure Bulletin, vol. 34, No. 5, pp. 104-106, Published Oct., 1991 at Armonk, N.Y.
C. J. Bracht, W. M. Edwards, R. Hoffman, and J. Ibanez "Process-Driven Logon and Logoff As Opposed to User-Driven" IBM Technical Disclosure Bulletin, vol. 33, No. 8, pp. 183-185, Published Jan., 1991 at Armonk, N.Y.
P. H. Kramer "Enhanceable Authorization Mechanism" IBM Technical Disclosure Bulletin, vol. 30, No. 1, pp. 179-181, Published Jun., 1987 at Armonk, N.Y.
H. E. Frye, and R. L. Hoffman "Symbolic Machine Security Feature Implementation" IBM Technical Disclosure Bulletin, vol. 18, No. 9, pp. 3015-3017, Published Feb., 1976 at Armonk, N.Y.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method of and apparatus for providing automatic security control does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method of and apparatus for providing automatic security control, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method of and apparatus for providing automatic security control will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-295606

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.