DYNAMIC SWITCHING OF SECURITY CONFIGURATIONS
First Claim
1. A computer implemented method for switching security configurations, the computer implemented method comprising:
- accessing a first security configuration, wherein a security configuration comprises at least one security parameter, via a thread of execution;
receiving an incoming request;
responsive to receiving the incoming request, switching to a second security configuration that specifies a resource, based on the incoming request;
storing the second security configuration or a reference to the second security configuration to a stack;
authenticating the incoming request based on the second security configuration;
granting or denying access to the resource;
executing a method referenced in the incoming request; and
responsive to completing the method, restoring to a first security configuration.
1 Assignment
0 Petitions
Accused Products
Abstract
Disclosed is a computer implemented method, computer program product, and apparatus to switch security configurations. A data processing system accesses a first security configuration via a thread of execution, wherein a security configuration comprises at least one security parameter. The thread receives an incoming request. The thread switches to a second security configuration that specifies a resource, based on the incoming request, responsive to receiving the incoming request. The thread stores the second security configuration or a reference to the second security configuration to a stack. The thread authenticates the incoming request based on the second security configuration. The thread grants or denies access to the resource. The thread executes a method referenced in the incoming request. The thread restores to a first security configuration, responsive to completing the method.
29 Citations
25 Claims
-
1. A computer implemented method for switching security configurations, the computer implemented method comprising:
-
accessing a first security configuration, wherein a security configuration comprises at least one security parameter, via a thread of execution; receiving an incoming request; responsive to receiving the incoming request, switching to a second security configuration that specifies a resource, based on the incoming request; storing the second security configuration or a reference to the second security configuration to a stack; authenticating the incoming request based on the second security configuration; granting or denying access to the resource; executing a method referenced in the incoming request; and responsive to completing the method, restoring to a first security configuration. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer program product for switching security configurations, the computer program product comprising:
-
computer readable program code configured to access a first security configuration, wherein the second security configuration comprises at least one security parameter, via a thread of execution; computer readable program code configured to receive an incoming request; computer readable program code configured to switch to a second security configuration that specifies a resource, based on the incoming request, responsive to receiving the incoming request; computer readable program code configured to store the second security configuration or a reference to the second security configuration to a stack; computer readable program code configured to authenticate the incoming request based on the second security configuration; computer readable program code configured to grant or deny access to the resource; computer readable program code configured to execute a method referenced in the incoming request; and computer readable program code configured to restore to a first security configuration, responsive to completing the method. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. A data processing system comprising:
-
a bus; a storage device connected to the bus, wherein computer usable code is located in the storage device; a communication unit connected to the bus; and a processing unit connected to the bus, wherein the processing unit executes the computer usable code for switching security configurations, wherein the processing unit executes the computer usable code to access a first security configuration, wherein a security configuration comprises at least one security parameter, wherein accessing the first security configuration is via the thread of execution;
receive an incoming request;
switch to a second security configuration that specifies a resource, based on the incoming request, responsive to receiving the incoming request;
store the second security configuration or a reference to the second security configuration to a stack;
authenticate the incoming request based on the second security configuration;
grant or deny access to the resource;
execute a method referenced in the incoming request; and
restore to a first security configuration, responsive to completing the method. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25)
-
Specification