Method for security shield implementation in computer system's software
First Claim
1. Computer software for a security implementation method for computer system software, said computer software being stored on a computer readable medium, said medium being executed on said computer system, comprising:
- means for system call interception for intercepting non-interactive commands, file access commands, program access requests, and network access commands from a user of said computer system software;
means for intercepting interactive commands from said user of said computer systems software;
examination means for examining said non-interactive commands and said interactive commands from the user of said computer system software;
means for performing a rule check functions of said non-interactive commands and said interactive commands from the user of said computer system software;
means for implementing log in functions of said non-interactive and said interactive commands from the user of the computer system software; and
,means for forwarding accepted said non-interactive commands, file access commands, program access requests, network access commands, and said interactive commands to the operating system of said computer system software.
0 Assignments
0 Petitions
Accused Products
Abstract
A security shield implementation method comprising computer software for use with a computer system'"'"'s software which is transparent to the user of the computer system software and utilizes the steps of system call interception and interactive command interception to control access by a user of the computer system software. The system call interception for non-interactive commands, file access, programs, networks, and the interactive commands, such as access to interactive programs, are routed and examined by redirector software. Security rule checks and log event functions are then conducted on the non-interactive commands, file access requests, programs, networks, and the interactive commands. If a non-interactive command, file access request, program, network, or an interactive command is approved, the command request is then forwarded to the computer operating system.
-
Citations
18 Claims
-
1. Computer software for a security implementation method for computer system software, said computer software being stored on a computer readable medium, said medium being executed on said computer system, comprising:
-
means for system call interception for intercepting non-interactive commands, file access commands, program access requests, and network access commands from a user of said computer system software; means for intercepting interactive commands from said user of said computer systems software; examination means for examining said non-interactive commands and said interactive commands from the user of said computer system software; means for performing a rule check functions of said non-interactive commands and said interactive commands from the user of said computer system software; means for implementing log in functions of said non-interactive and said interactive commands from the user of the computer system software; and
,means for forwarding accepted said non-interactive commands, file access commands, program access requests, network access commands, and said interactive commands to the operating system of said computer system software. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method for security shield implementation in computer system software for protection of the computer system software from unauthorized access by a user, comprising:
-
step for controlling access to files of said computer system software by redirector means for intercepting a non-interactive command request from a computer system user prior to forwarding to an operating system software, performing a rule check and a log event function using operating system call interception, returning a failed rule check to said computer system user via open system call, and forwarding for continued processing succeeded rule check requests to said operating system; step for controlling access to interactive programs by redirector means for intercepting an interactive command from a user and returning failed rule check interactive commands to said user and to continue processing succeeded rule check interactive commands; forwarding accepted said interactive or said non-interactive commands for processing by the operating system software. - View Dependent Claims (7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
Specification