×

Managing access to a resource

  • US 8,539,228 B1
  • Filed: 08/24/2006
  • Issued: 09/17/2013
  • Est. Priority Date: 08/24/2006
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method of managing access to a plurality of resources in a computer system, the method comprising:

  • associating first and second access rights with an application resource by a security driver separate from an operating system of the a computing device of the computer system,wherein the computer system comprises at least one processor and operatively associated memory,wherein the security driver is executed by the computing device and logically positioned between an application associated with the application resource and a data storage of the computing device, wherein the application is executed by the computing device,wherein the first access right defines a level of access granted to the application to a first resource selected from the plurality of resources,wherein the second access right defines a level of access granted to the application to a second resource selected from the plurality of resources,wherein the first access right comprises first authentication data for allowing the application access to an encryption key store to retrieve a first encryption key corresponding to the first resource and stored at the encryption key store in response to a first request from the application to access the first resource, wherein the encryption key store is located at a second computing device of the computer system,wherein the second access right comprises second authentication data for allowing the application to access the encryption key store to retrieve a second encryption key corresponding to the second resource and stored at the encryption key store in response to a second request from the application to access the second resource, andwherein the associating comprises incorporating the first access right, the second access right and the application resource in a single file; and

    digitally signing the first access right, the second access right and the application resource by the security driver with a single digital signature.

View all claims
  • 5 Assignments
Timeline View
Assignment View
    ×
    ×