×

PROVIDING A SECURITY BOUNDARY

  • US 20120159570A1
  • Filed: 12/21/2010
  • Published: 06/21/2012
  • Est. Priority Date: 12/21/2010
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for providing a security boundary, the computer-implemented method comprising performing computer-implemented operations for:

  • executing a security monitor;

    intercepting by way of the security monitor one or more application programming interface (API) calls placed by an application for accessing one or more system resources;

    storing data in a security monitor database associated with accessing the system resources; and

    determining by way of the security monitor at a runtime of the application whether the application placing the one or more API calls is authorized to access the system resources.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×