PROVIDING A SECURITY BOUNDARY
First Claim
1. A computer-implemented method for providing a security boundary, the computer-implemented method comprising performing computer-implemented operations for:
- executing a security monitor;
intercepting by way of the security monitor one or more application programming interface (API) calls placed by an application for accessing one or more system resources;
storing data in a security monitor database associated with accessing the system resources; and
determining by way of the security monitor at a runtime of the application whether the application placing the one or more API calls is authorized to access the system resources.
2 Assignments
0 Petitions
Accused Products
Abstract
In order to enable potentially conflicting applications to execute on the same computer, application programming interface (API) calls are intercepted when an application attempts to access a computer system'"'"'s resources. During a learning mode of operation, a security monitor stores data in a security monitor database identifying which applications are allowed to access the computer system resources. At runtime of an application, the security monitor operates in an enforcement mode and utilizes the contents of the security monitor database to determine if an application is permitted to access system resources. If data associated with the application is located in the security monitor database, the application is allowed to access computer system resources, if data associated with the application is not located in the security monitor database, the application is not allowed to access computer system resources.
-
Citations
20 Claims
-
1. A computer-implemented method for providing a security boundary, the computer-implemented method comprising performing computer-implemented operations for:
-
executing a security monitor; intercepting by way of the security monitor one or more application programming interface (API) calls placed by an application for accessing one or more system resources; storing data in a security monitor database associated with accessing the system resources; and determining by way of the security monitor at a runtime of the application whether the application placing the one or more API calls is authorized to access the system resources. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer-readable storage medium having computer-readable instructions stored thereupon which, when executed by a computer, cause the computer to:
-
intercepting by way of a security monitor one or more application program interface (API) calls placed by an application for accessing one or more system resources; storing data related to the API calls in a security monitor database; and isolating one or more other applications from accessing the system resources based on the data stored in the security monitor database. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A computer-implemented method for providing a security boundary, the computer-implemented method comprising performing computer-implemented operations for:
-
executing a security monitor in a learning mode of operation during which application programming interface (API) calls placed by an application for accessing a system resource are intercepted and access control lists (ACLs) associated the system resource are stored in a security monitor database; and executing the security monitor in an enforcement mode of operation during which application programming interface (API) calls placed by the application are intercepted and a determination of whether ACLs associated with the application are stored in the security monitor database, wherein the application is authorized to access system resources when ACLs associated with the application are stored in the security monitor database, and the application is not authorized to access system resources when ACLs associated with the application are not stored in the security monitor database. - View Dependent Claims (20)
-
Specification