CONTROL OF APPLICATION ACCESS TO SYSTEM RESOURCES
First Claim
1. A method of transferring a computer program product from at least one first computer to at least one second computer connected to the at least one first computer through a communication medium, the method comprising the steps of:
- (a) accessing, on the at least one first computer, computer-executable instructions that, when executed in a system having a security mechanism that determines access by an application to system resources based on a security context in which the application is run, perform at least the steps of;
(1) running a first application subject to a first security context providing access to a first set of the system resources;
(2) receiving a request to run the first application subject to a second security context providing access to a second set of the system resources different from the first set; and
(2) running the first application subject to the second security context, wherein the application runs subject to the second security context without re-launching the application; and
(b) transferring the computer-executable instructions from the at least one first computer to the at least one second computer through the communications medium.
2 Assignments
0 Petitions
Accused Products
Abstract
A method executable in a system having a security mechanism that determines access by an application to system resources based on a security context in which the application is run includes receiving definitions of a plurality of security contexts. Each security context provides access to a respective set of the system resources. An association of each application of a plurality of applications with a respective one of the security contexts is received from the user. A first one of the applications is run subject to a first associated security context.
63 Citations
20 Claims
-
1. A method of transferring a computer program product from at least one first computer to at least one second computer connected to the at least one first computer through a communication medium, the method comprising the steps of:
-
(a) accessing, on the at least one first computer, computer-executable instructions that, when executed in a system having a security mechanism that determines access by an application to system resources based on a security context in which the application is run, perform at least the steps of;
(1) running a first application subject to a first security context providing access to a first set of the system resources;
(2) receiving a request to run the first application subject to a second security context providing access to a second set of the system resources different from the first set; and
(2) running the first application subject to the second security context, wherein the application runs subject to the second security context without re-launching the application; and
(b) transferring the computer-executable instructions from the at least one first computer to the at least one second computer through the communications medium. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer-readable medium having computer-executable instructions that, when executed in a system having a security mechanism that determines access by an application to system resources based on a security context in which the application is run, perform at least the steps of:
-
(a) providing a user interface that;
(1) enables a user to define a plurality of security contexts, each security context providing access to a respective set of the system resources; and
(2) enables the user to associate each application of a plurality of applications with a respective one of the security contexts; and
(b) running a first one of the applications subject to a first associated security context. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A computer-readable medium having computer-executable instructions that, when executed in a system having a security mechanism that determines access by an application to system resources based on a security context in which the application is run, perform at least the steps of:
-
receiving definitions of a plurality of security contexts, each security context providing access to a respective set of the system resources;
receiving from the user an association of each application of a plurality of applications with a respective one of the security contexts; and
running a first one of the applications subject to a first associated security context. - View Dependent Claims (18, 19, 20)
-
Specification