×

Method and system for run-time dynamic and interactive identification software authorization requirements and privileged code locations, and for validation of other software program analysis results

  • US 9,449,190 B2
  • Filed: 05/27/2008
  • Issued: 09/20/2016
  • Est. Priority Date: 05/03/2006
  • Status: Active Grant
First Claim
Patent Images

1. A method for detecting and verifying security authorization and privileged-code requirements in a run-time execution environment in which a software program is executing, said method comprising:

  • implementing reflection objects for—

    making reflection calls to one or more classes of objects in said executing program to identify from said classes and objects all methods where authorization failures may occur in response to the program'"'"'s attempted access of resources requiring authorizations as enforced by a particular security subsystem, said methods including methods of said one or more classes that take object parameters having different permission and privileged-code requirements that can arise when the methods are invoked with parameters to be passed determined at run-time,providing a listing of all said identified class methods for display via a user interface;

    implementing reflection objects to enable a user, via said interface, to select a displayed method, determine one or more types and number of the parameters that need to be passed to said method being invoked, create one or more customized object parameters and pass customized object parameters to said selected displayed method and invoke said method in real-time in a restricted execution environment where said program is prevented from performing security-sensitive operations;

    in response to invoking said method, determining whether a security exception is raised if a required authorization has not been expressly granted, and, reporting existence of said security exception via said user interface;

    enabling a user to select, via said user interface, the security exception; and

    , for each required authorization that should be granted, granting, by said user, the necessary permission via said user interface, and,automatically updating a security policy in response to a user granting a particular authorization without the need for restarting execution of the program,wherein local system, fine-grained access of resources requiring authorization is provided.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×