Method and apparatus for realizing computer security
First Claim
Patent Images
1. A method suitable for realizing computer security of a computer system, the method operable within a computer system and comprising:
- (1) establishing an authorization window for enabling computer system actions consistent with an authorization rule;
(2) the computer system automatically and independently monitoring said actions as an indicia of conformance to said authorization rule after said authorization window closes; and
(3) while the computer system automatically and independently monitors said actions, the computer system automatically and independently determines whether said actions conform to said authorization rule.
3 Assignments
0 Petitions
Accused Products
Abstract
A method suitable for realizing computer security. The method includes the steps of establishing an authorization window for enabling computer system actions consistent with an authorization rule; and, monitoring the actions as an indicia of conformance to the authorization rule. The method preferably provides a pattern of system actions as an indicia of compliance with an authorization rule, and provides notification of predetermined patterns.
33 Citations
18 Claims
-
1. A method suitable for realizing computer security of a computer system, the method operable within a computer system and comprising:
-
(1) establishing an authorization window for enabling computer system actions consistent with an authorization rule; (2) the computer system automatically and independently monitoring said actions as an indicia of conformance to said authorization rule after said authorization window closes; and (3) while the computer system automatically and independently monitors said actions, the computer system automatically and independently determines whether said actions conform to said authorization rule. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. Apparatus for realizing computer security of a computer system, comprising:
-
(1) means for establishing an authorization window for enabling computer system actions consistent with an authorization rule; (2) means for the computer system to automatically and independently monitor said actions as an indicia of conformance to said authorization rule after said authorization window closes; and (3) means for the computer system to automatically and independently determine whether said actions conform to said authorization rule while the computer system automatically and independently monitors said actions. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification