×

Security model using restricted tokens

  • US 6,279,111 B1
  • Filed: 06/12/1998
  • Issued: 08/21/2001
  • Est. Priority Date: 06/12/1998
  • Status: Expired due to Term
First Claim
Patent Images

1. In a computer system including a first process having access to a resource, a method of granting or denying access of a second process to the resource, comprising, creating a restricted access token from a parent token associated with a first process, the restricted access token having privilege and security identifier access rights therein that comprise reduced access rights relative to the parent token, associating the restricted access token with the second process, requesting that the second process be given access to the resource, providing a security descriptor associated with the resource to a security mechanism, providing the restricted token to the security mechanism, performing an access evaluation at the security mechanism by comparing information in the restricted token with information in the security descriptor, and determining whether to grant or deny access based on the result of the access evaluation.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×