×

Keyring metaphor for user's security keys on a distributed multiprocess data system

  • US 5,274,824 A
  • Filed: 03/01/1991
  • Issued: 12/28/1993
  • Est. Priority Date: 03/01/1991
  • Status: Expired due to Term
First Claim
Patent Images

1. A computer-implemented method for associating protection mechanism codes ("locks") for securing the utilization of protected processes, available for use in a data processing system by users of said system, with utilization permission codes ("keys") presented to said protected processes when said users require use of said protected processes, wherein,an active store of said system holds a respective list of keysauthorized to each active user, said lists being indexed in saidactive store by unique identifiers associated with said users;

  • said method being characterized by;

    when one of said active users makes a request for use of one of said protected processes, a first process operating in said system appends the identifier of said user to said request and forwards the request, with accompanying identifier, to said one protected process;

    a second process, in response to receipt of said accompanying identifier, accesses said active store and retrieves the respective key list from said active store;

    said second process performs a comparison of the individual keys of said retrieved key list with the lock of said one protected process to determine whether any key of said retrieved key list matches said lock of said one protected process; and

    if said comparison determines a match between the keys compared, said one protected process is placed into execution;

    butif said comparison determines no match between the keys compared, said one protected process is not placed into execution.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×