Method for protecting computer programs and data from...

Electrical computers and digital processing systems: support – Computer virus detection by cryptography

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S187000

Reexamination Certificate

active

07613930

ABSTRACT:
A method that protects computer data from untrusted programs. Each computer's object and process is assigned with trust attributes, which define the way it can interact with other objects within the system. When an object is classified as untrusted, it can interact with other object within the system on a limited basis. A virtualized system is provided on the computer so that when the untrusted object attempts to perform an operation that is outside its scope of authorization, the virtualized system intercepts the operation but present the untrusted program with an indication that the requested operation has been performed. The method further includes processes to securely move a program from an untrusted group to a trusted group.

REFERENCES:
patent: 4962533 (1990-10-01), Krueger
patent: 5280614 (1994-01-01), Monroe
patent: 5349655 (1994-09-01), Mann
patent: 5361359 (1994-11-01), Tajalli
patent: 5398196 (1995-03-01), Chambers
patent: 5408642 (1995-04-01), Mann
patent: 5421006 (1995-05-01), Jablon
patent: 5613002 (1997-03-01), Kephart
patent: 5937159 (1999-08-01), Meyers
patent: 5958050 (1999-09-01), Griffin
patent: 6073239 (2000-06-01), Dotan
patent: 6125447 (2000-09-01), Gong
patent: 6189103 (2001-02-01), Nevarez et al.
patent: 6199181 (2001-03-01), Techef
patent: 6275938 (2001-08-01), Bond et al.
patent: 6330670 (2001-12-01), England et al.
patent: 7028305 (2006-04-01), Schaefer
patent: 7188367 (2007-03-01), Edwards et al.
patent: 2003/0159070 (2003-08-01), Mayer et al.
patent: 2003/0233490 (2003-12-01), Blaser et al.
patent: 2005/0149726 (2005-07-01), Joshi et al.
patent: 2005/0257265 (2005-11-01), Cook et al.
patent: 2 391 650 (2004-02-01), None
patent: 2 411 748 (2005-09-01), None
patent: 2 411 988 (2005-09-01), None
patent: WO 01/92981 (2001-12-01), None
patent: WO 2005/043360 (2005-05-01), None
Ian Goldberg, et al. “A Secure Environment for Untrusted Helper Applications,” Internet Citation, Jul. 22, 1996, http://www.cs.berkeley.edu/daw/papers/janus-usenix96.ps.
Douglas P. Ghormley, et al. “Slic: An Extensibility System for Commodity Operating Systems,” Proceedings of the Usenix Annual Technical Conference, Jun. 15, 1998, pp. 39-52.
International Search Report for PCT/IB/2006/003831 dated Jul. 12, 2007.
Specifying Discretionary Access Control Policy for Distributed Systems, Moffet J. et al., 8260 Computer Communications 13, No. 9, pp. 571-580 (1990).
Performing Hierarchical Authorizations, IBM Technical Disclosure Bulletin, vol. 34, Issue No. 5, pp. 31-32 (1991).
Mechanism for Trusted Computing Base Isolation, IBM Technical Disclosure Bulletin, vol. 34, Issue No. 8, pp. 214-215 (1992).
European Search Report EP 01 40 0161.
European Search Report EP 01 40 1170.
European Patent Application 0 472 487 A2, Monroe et al. Feb. 26, 1992.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method for protecting computer programs and data from... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method for protecting computer programs and data from..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for protecting computer programs and data from... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4101244

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.