X window security system
First Claim
Patent Images
1. The method of rendering an X Window System including a server and at least one client process secure comprising the steps of:
- restricting access to the X Window server system to an authorized user at a host computer terminal using an address family, the address family being encrypted and decrypted using a standard public key cryptographic algorithm.allowing said user to view only resources of the X Window server system specifically authorized to that user and resources authorized to an authenticator zero, andallowing said user to manipulate resources of the X Window server system specifically authorized to that user and resources authorized to an authenticator zero.
1 Assignment
0 Petitions
Accused Products
Abstract
The method of rendering an X Windows server system running on a server and at least one host computer terminal secure including the steps of allowing users to view only resources of the X Windows server system the use of which has been specifically authorized to that user, and allowing users to manipulate only resources of the X Windows server system the use of which has been specifically authorized to that user.
46 Citations
10 Claims
-
1. The method of rendering an X Window System including a server and at least one client process secure comprising the steps of:
-
restricting access to the X Window server system to an authorized user at a host computer terminal using an address family, the address family being encrypted and decrypted using a standard public key cryptographic algorithm. allowing said user to view only resources of the X Window server system specifically authorized to that user and resources authorized to an authenticator zero, and allowing said user to manipulate resources of the X Window server system specifically authorized to that user and resources authorized to an authenticator zero. - View Dependent Claims (2, 3, 4)
-
-
5. The method of rendering an X Window System including a server and at least one client process secure comprising the steps of:
-
restricting access to the X Window server system to a client process executing on behalf of an authorized user at a host computer terminal using an address family, the address family being encrypted and decrypted using a standard public key cryptographic algorithm, allowing the client process operating on behalf of a user to view only resources of the X Window System specifically authorized to the user and resources authorized to an authenticator zero, and allowing the client process to manipulate only resources of the X Window server system specifically authorized to the user and resources authorized to an authenticator zero. - View Dependent Claims (6)
-
-
7. The method of rendering a networked window system including a server and at least one client process secure comprising the steps of:
-
restricting access to the networked window system to an authorized user at a host computer terminal using an address family, the address family being encrypted and decrypted using a standard public key cryptographic algorithm, allowing said user to view only the resources of the networked window system specifically authorized to that user, and resources authorized to an authenticator zero, and allowing said user to manipulate only resources of the networked window system specifically authorized to that user and resources authorized to an authenticator zero. - View Dependent Claims (8)
-
-
9. The method of rendering a networked window system including a server and at least one client process secure comprising the steps of:
-
restricting access to the networked window system to a client process executing on behalf of an authorized user at a host computer terminal using an address family, the address family being encrypted and decrypted using a standard public key cryptographic algorithm, allowing the client process operating on behalf of a user to view only resources of the networked window systems specifically authorized to the user and resources authorized to an authenticator zero, and allowing the client process to manipulate only resources of the networked window system specifically authorized to the user and resources authorized to an authenticator zero. - View Dependent Claims (10)
-
Specification