Process based security tai building
First Claim
Patent Images
1. A method of building a resource access table in a system for controlling access to resources comprising the steps of:
- identifying a resource call in a process;
identifying a resource accessed by the resource call;
assigning permission to the resource;
writing a resource access table entry in a resource access table including data identifying the process, the resource and the permission;
such that when the process is executed and the process makes a resource call for the resource, access to the resource may be controlled by the permission data entry in the resource access table entry of the resource access table.
1 Assignment
0 Petitions
Accused Products
Abstract
A method to build a resource access table in a system for controlling access to resources is disclosed. The protocol identifies a resource call in a process. Each of the resources accessed by resource calls are identified. Permission is assigned to the resource, with regard to the process. A resource access table is written, with each entry identifying the process, the resource and the permission. When the process is executed and the process makes a resource call to the resource, access to the resource is controlled by the permission data entry in the resource access table entry of the resource access table.
-
Citations
12 Claims
-
1. A method of building a resource access table in a system for controlling access to resources comprising the steps of:
-
identifying a resource call in a process;
identifying a resource accessed by the resource call;
assigning permission to the resource;
writing a resource access table entry in a resource access table including data identifying the process, the resource and the permission;
such that when the process is executed and the process makes a resource call for the resource, access to the resource may be controlled by the permission data entry in the resource access table entry of the resource access table. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method of building a resource access table in a system for controlling access to resources comprising the steps of:
-
identifying a resource call in a process;
identifying a resource accessed by the resource call;
assigning permission to the resource call;
writing a resource access table entry in a resource access table including data identifying the process, the resource call, the resource and the permission;
such that when the process is executed and the process makes a resource call to the resource, access to the resource may be controlled by the permission data in the resource access table entry of the resource access table. - View Dependent Claims (8, 9, 10, 11, 12)
-
Specification