×

Object security boundaries

  • US 6,487,665 B1
  • Filed: 11/30/1998
  • Issued: 11/26/2002
  • Est. Priority Date: 11/30/1998
  • Status: Expired due to Term
First Claim
Patent Images

1. A method for providing security services to a secured object residing in a process and called from a calling object residing in the process, the method comprising:

  • interposing security logic between the secured object and the calling object to monitor calls directed to the secured object;

    responsive to a call directed to the secured object by the calling object, wherein an identity is associated with the call, automatically executing the security logic to evaluate the associated identity; and

    selectively blocking the call as a result of evaluating the associated identity with the security logic to enforce a security boundary between the calling object and the secured object.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×