×

Policies for secure software execution

  • US 7,350,204 B2
  • Filed: 06/08/2001
  • Issued: 03/25/2008
  • Est. Priority Date: 07/24/2000
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method, comprising:

  • receiving a request to access a software file that includes executable code, the request including a type of access desired by a user for the software file;

    performing a user-credential based access check to determine normal security privileges and access rights of the user for the software file;

    thereafter, performing a file-classification based access check to determine whether the user'"'"'s normal security privileges and access rights should be modified to include a subset of the user'"'"'s normal security privileges and access rights for the software file, comprising;

    obtaining a file classification corresponding to the software file for which the access request was received;

    searching a rule set for the received file classification, the rule set providing security rules for a variety of software files which may have executable code, and the security rules being based on file classifications corresponding to the variety of software files; and

    locating a rule in the rule set which matches the received file classification, the rule having a security level associated therewith;

    associating the security level with the software file; and

    controlling execution of the executable code of the software file based on the security level associated with the software file.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×