System and methods for defending against root
First Claim
Patent Images
1. A method for securing sensitive material on a computer system comprising a network of computers from unauthorized access by a root level user of said computer system, said method comprising the steps of:
- limiting access to said sensitive material to one or more authorized users; and
controlling the operation of one or more system functions to prevent unauthorized access to the sensitive material.
1 Assignment
0 Petitions
Accused Products
Abstract
A method is disclosed for securing sensitive material on a computer system comprising a network of computers from unauthorized access by a root level user of the computer system, the method including the steps of: limiting access to the sensitive material to one or more authorized users; controlling the operation of one or more system functions to prevent unauthorized access to the sensitive material.
-
Citations
26 Claims
-
1. A method for securing sensitive material on a computer system comprising a network of computers from unauthorized access by a root level user of said computer system, said method comprising the steps of:
-
limiting access to said sensitive material to one or more authorized users; and controlling the operation of one or more system functions to prevent unauthorized access to the sensitive material. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A system for securing sensitive material on a computer system comprising a network of computers from unauthorized access by a root level user of said computer system, said system comprising:
-
an authentication system for limiting access to said sensitive material to one or more authorized users; and for each computer in said network, a modified operating system having modified system functions for controlling the operation of one or more system functions to prevent unauthorized access to the sensitive material. - View Dependent Claims (21, 22, 23, 24, 25)
-
-
26. A computer-readable media containing a set of instructions that causes a computer system to perform a process for securing sensitive material on the computer system from unauthorized access by a root level user of said computer system, said method comprising the steps of:
-
limiting access to said sensitive material to one or more authorized users; and controlling the operation of one or more system functions to prevent unauthorized access to the sensitive material.
-
Specification