Secure isolation of application pools
First Claim
1. A method performed by a computer system for securely isolating applications at a server, comprising:
- identifying an application that is to be loaded;
creating a security token that is unique to the computer system and based on a name of the identified application, wherein the security token is a security identifier having a prefix that is common to all created security tokens;
receiving a request to load the identified application; and
creating a process in which to load the identified application, the process having security attributes associated with the created security token.
2 Assignments
0 Petitions
Accused Products
Abstract
A secure web hosting system is provided. In various embodiments, the secure web hosting system identifies an application that is to be loaded, creates a security token that is unique to the computer system and based on a name of the identified application, receives a request to load the identified application, and creates a process in which to load the identified application, the process having security attributes associated with the created security token. In various embodiments, the secure web hosting system includes an isolation service component that creates a security token based on an application name of an application identified by the configuration file.
35 Citations
18 Claims
-
1. A method performed by a computer system for securely isolating applications at a server, comprising:
-
identifying an application that is to be loaded; creating a security token that is unique to the computer system and based on a name of the identified application, wherein the security token is a security identifier having a prefix that is common to all created security tokens; receiving a request to load the identified application; and creating a process in which to load the identified application, the process having security attributes associated with the created security token. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A system for securely isolating applications at a server, comprising:
-
a processor and memory; a web server component that receives and processes requests for applications; a configuration store component that stores a configuration file associated with the web server component; and an isolation service component that creates a security token based on an application name of an application identified by the configuration file when the web server component loads the configuration file, wherein the security token is a hash value based on the name of the identified application and is unique to the server and has a prefix that is common to all created security tokens. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A memory device storing computer-executable instructions that, when executed, cause a computer system to perform a method for securely isolating applications at a server, the method comprising:
-
identifying an application that is to be loaded; creating a security token that is unique to the computer system and based on a name of the identified application; providing the created security token and an indication of the application name to a local system authority; creating an account for the identified application; and creating a process for the identified application upon receiving a request for the application, the created process having security attributes relating to the created security token. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification