INTEGRATING SECURITY PROTECTION TOOLS WITH COMPUTER DEVICE INTEGRITY AND PRIVACY POLICY
First Claim
1. A method comprising:
- assigning to a program an integrity label that allows the program to write to first data, wherein the privacy label is based on a first characteristic of the program;
assigning to the program a privacy label that allows the program to read from second data, wherein the privacy label is based on a second characteristic of the program; and
determining, by a computer in response to the program seeking to write to the first data, whether to grant or deny the seeking to write the first data based on the integrity label relative to a label associated with the first data, ordetermining, by the computer in response to the program seeking to read from the second data, whether to grant or deny the seeking to read from the second data based on the privacy label relative to a label associated with the second data.
2 Assignments
0 Petitions
Accused Products
Abstract
At computer device power on, the operating system of the computer device initiates a monitor. The monitor assigns a monitoring program to each program and object (collectively, “program”) running on the computer device to monitor the activities of the program. When the monitoring program is assigned to a program, the monitoring program is assigned an integrity and/or privacy label (collectively, “integrity label”) based on predetermined criteria applied to the monitored program. The monitoring program, in turn, assigns an integrity label to the program monitored by the monitoring program. The integrity label assigned to the monitored program is less than or equal to the integrity label of the monitoring program. The monitor enforces an integrity policy of the computer device based on the integrity label assigned to monitored programs and the integrity label associated with data, another program, or a remote network resource that the monitored program is seeking to access.
24 Citations
20 Claims
-
1. A method comprising:
-
assigning to a program an integrity label that allows the program to write to first data, wherein the privacy label is based on a first characteristic of the program; assigning to the program a privacy label that allows the program to read from second data, wherein the privacy label is based on a second characteristic of the program; and determining, by a computer in response to the program seeking to write to the first data, whether to grant or deny the seeking to write the first data based on the integrity label relative to a label associated with the first data, or determining, by the computer in response to the program seeking to read from the second data, whether to grant or deny the seeking to read from the second data based on the privacy label relative to a label associated with the second data. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system comprising:
-
a computing device configured for assigning to a program an integrity label that allows the program to write to first data, wherein the privacy label is based on a first characteristic of the program; the computing device further configured for assigning by the computer to the program a privacy label that allows the program to read from second data, wherein the privacy label is based on a second characteristic of the program; the computing device further configured for determining, in response to the program seeking to write to the first data, whether to grant or deny the seeking to write the first data based on the integrity label relative to a label associated with the first data; and the computing device further configured for determining, in response to the program seeking to read from the second data, whether to grant or deny the seeking to read from the second data based on the privacy label relative to a label associated with the second data. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. At least one computer storage media storing computer-executable instructions that, when executed by a computing device, cause the computing device to perform a method comprising:
-
assigning by a computer to a program an integrity label that allows the program to write to first data, wherein the privacy label is based on a first characteristic of the program; assigning by the computer to the program a privacy label that allows the program to read from second data, wherein the privacy label is based on a second characteristic of the program; determining, in response to the program seeking to write to the first data, whether to grant or deny the seeking to write the first data based on the integrity label relative to a label associated with the first data; and determining, in response to the program seeking to read from the second data, whether to grant or deny the seeking to read from the second data based on the privacy label relative to a label associated with the second data. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification