Administrative security systems and methods
First Claim
Patent Images
1. A computing device, comprising:
- an operating system configured to control access to administrative functions;
a security process configured to execute with administrative privilege to initiate an administrative function; and
a user process configured to execute with non-administrative privilege such that access to the administrative function is restricted, the user process further configured to request initiation of the administrative function via the security process with parameters that include an identification of the administrative function and input arguments to the administrative function.
1 Assignment
0 Petitions
Accused Products
Abstract
In an implementation of administrative security systems and methods, access to administrative functions is controlled according to access privileges. A security process can be executed with administrative privilege to initiate an administrative function, and a user process can be executed with non-administrative privilege such that access to the administrative function is restricted. The user process can request initiation of the administrative function via the security process with parameters that include an identification of the administrative function and input arguments to the administrative function.
11 Citations
41 Claims
-
1. A computing device, comprising:
-
an operating system configured to control access to administrative functions;
a security process configured to execute with administrative privilege to initiate an administrative function; and
a user process configured to execute with non-administrative privilege such that access to the administrative function is restricted, the user process further configured to request initiation of the administrative function via the security process with parameters that include an identification of the administrative function and input arguments to the administrative function. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method, comprising:
-
controlling access to administrative functions according to access privileges;
executing a security process with administrative privilege to initiate an administrative function;
executing a user process with non-administrative privilege restricting access to the administrative function; and
requesting initiation of the administrative function via the security process on behalf of the user process with parameters that include an identification of the administrative function and input arguments to the administrative function. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27)
-
-
28. One or more computer readable media comprising computer executable instructions that, when executed, direct a computing device to:
-
control access to administrative functions according to access privileges;
execute a security process with administrative privilege to initiate an administrative function;
execute a user process with non-administrative privilege such that access to the administrative function is restricted; and
receive a request to initiate the administrative function via the security process on behalf of the user process with parameters that include input arguments to the administrative function. - View Dependent Claims (29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41)
-
Specification