Taint vector locations and granularity
First Claim
Patent Images
1. A computing system comprising:
- a plurality of resources operationally coupled into the computing system; and
at least one taint vector operable to list a plurality of taints indicative of potential security risk associated with a selected location and granularity of selected ones of the plurality of resources.
3 Assignments
0 Petitions
Accused Products
Abstract
An embodiment or embodiments of a computing system can be adapted to manage security risk by accumulating and monitoring taint indications, and can respond to predetermined taint conditions detecting by the monitoring. An illustrative computing system can comprise a plurality of resources operationally coupled into the computing system, and at least one taint vector operable to list a plurality of taints indicative of potential security risk associated with a selected location and granularity of selected ones of the plurality of resources.
41 Citations
70 Claims
-
1. A computing system comprising:
-
a plurality of resources operationally coupled into the computing system; and at least one taint vector operable to list a plurality of taints indicative of potential security risk associated with a selected location and granularity of selected ones of the plurality of resources. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30)
-
-
31. A method operable in a computing device for handling security risk comprising:
-
receiving at least one taint indicator from a plurality of resources operationally coupled to the computing device; tracking a plurality of taints indicative of potential security risk associated with a selected location and granularity of selected ones of the plurality of resources; and listing the plurality of taints indicative of potential security risk in at least one taint vector.
-
-
32-59. -59. (canceled)
-
60. A computer program product comprising:
-
program instructions operable to receive at least one taint indicator from a plurality of resources operationally coupled to the computing device; program instructions operable to track a plurality of taints indicative of potential security risk associated with a selected location and granularity of selected ones of the plurality of resources; and program instructions operable to list the plurality of taints indicative of potential security risk in at least one taint vector.
-
-
61-68. -68. (canceled)
-
69. A computing system comprising:
-
means for receiving at least one taint indicator from a plurality of resources operationally coupled to the computing system; means for tracking a plurality of taints indicative of potential security risk associated with a selected location and granularity of selected ones of the plurality of resources; and means for listing the plurality of taints indicative of potential security risk in at least one taint vector.
-
-
70-77. -77. (canceled)
Specification