Reference monitor method for enforcing information flow policies
    1.
    发明授权
    Reference monitor method for enforcing information flow policies 失效
    用于执行信息流策略的参考监视方法

    公开(公告)号:US07512792B2

    公开(公告)日:2009-03-31

    申请号:US11304853

    申请日:2005-12-15

    IPC分类号: H04L9/00 G06F7/04 G06F12/14

    CPC分类号: G06F21/6218

    摘要: A reference monitor system, apparatus, computer program product and method are provided. In one illustrative embodiment, elements of the data processing system are associated with security data structures in a reference monitor. An information flow request is received from a first element to authorize an information flow from the first element to a second element. A first security data structure associated with the first element and a second security data structure associated with the second element are retrieved. At least one set theory operation is then performed on the first security data structure and the second security data structure to determine if the information flow from the first element to the second element is to be authorized. The security data structures may be labelsets having one or more labels identifying security policies to be applied to information flows involving the associated element.

    摘要翻译: 提供了参考监视器系统,装置,计算机程序产品和方法。 在一个说明性实施例中,数据处理系统的元件与参考监视器中的安全数据结构相关联。 从第一元素接收信息流请求,以授权从第一元素到第二元素的信息流。 检索与第一元素相关联的第一安全数据结构和与第二元素相关联的第二安全数据结构。 然后对第一安全数据结构和第二安全数据结构执行至少一组理论操作,以确定是否授权从第一元素到第二元素的信息流。 安全数据结构可以是具有标识要应用于涉及相关元素的信息流的安全策略的一个或多个标签的标签集。

    Retrospective policy safety net
    2.
    发明授权

    公开(公告)号:US08474006B2

    公开(公告)日:2013-06-25

    申请号:US12607633

    申请日:2009-10-28

    IPC分类号: G06F21/00

    摘要: These and other objectives are attained with a method and system for evaluating an access policy change. The method comprises the step of providing an access control mechanism having a first policy, and an audit log having entries of accesses made under that first policy. The method comprises the further steps of submitting a second policy to the access control mechanism, comparing the log entries to the second policy, and based on the results of the comparing step, taking one of a predetermined number of actions.

    RETROSPECTIVE POLICY SAFETY NET
    3.
    发明申请
    RETROSPECTIVE POLICY SAFETY NET 失效
    回归政策安全网

    公开(公告)号:US20100115580A1

    公开(公告)日:2010-05-06

    申请号:US12607633

    申请日:2009-10-28

    IPC分类号: G06F21/00 G06F21/20 G06F21/22

    摘要: These and other objectives are attained with a method and system for evaluating an access policy change. The method comprises the step of providing an access control mechanism having a first policy, and an audit log having entries of accesses made under that first policy. The method comprises the further steps of submitting a second policy to the access control mechanism, comparing the log entries to the second policy, and based on the results of the comparing step, taking one of a predetermined number of actions.

    摘要翻译: 通过用于评估访问策略更改的方法和系统来实现这些和其他目标。 该方法包括提供具有第一策略的访问控制机制的步骤,以及具有根据该第一策略进行的访问条目的审核日志。 该方法包括以下步骤:向访问控制机制提交第二策略,将日志条目与第二策略进行比较,并且基于比较步骤的结果,采取预定数量的动作之一。

    Reference Monitor for Enforcing Information Flow Policies
    4.
    发明申请
    Reference Monitor for Enforcing Information Flow Policies 失效
    用于执行信息流策略的参考监视器

    公开(公告)号:US20090119507A1

    公开(公告)日:2009-05-07

    申请号:US12350327

    申请日:2009-01-08

    IPC分类号: H04L9/00 G06F7/04 G06F12/14

    CPC分类号: G06F21/6218

    摘要: A reference monitor that authorizes information flows between elements of a data processing system is provided. The elements of the data processing system are associated with security data structures in a reference monitor. An information flow request is received from a first element to authorize an information flow from the first element to a second element. A first security data structure associated with the first element and a second security data structure associated with the second element are retrieved. At least one set theory operation is then performed on the first security data structure and the second security data structure to determine if the information flow from the first element to the second element is to be authorized. The security data structures may be labelsets having one or more labels identifying security policies to be applied to information flows involving the associated element.

    摘要翻译: 提供了一种在数据处理系统的元素之间授权信息流的参考监视器。 数据处理系统的元件与参考监视器中的安全数据结构相关联。 从第一元素接收信息流请求,以授权从第一元素到第二元素的信息流。 检索与第一元素相关联的第一安全数据结构和与第二元素相关联的第二安全数据结构。 然后对第一安全数据结构和第二安全数据结构执行至少一组理论操作,以确定是否授权从第一元素到第二元素的信息流。 安全数据结构可以是具有标识要应用于涉及相关元素的信息流的安全策略的一个或多个标签的标签集。

    Method and system for providing a user access to multiple secured
subsystems
    5.
    发明授权
    Method and system for providing a user access to multiple secured subsystems 失效
    提供用户访问多个安全子系统的方法和系统

    公开(公告)号:US5604490A

    公开(公告)日:1997-02-18

    申请号:US304325

    申请日:1994-09-09

    IPC分类号: G06F21/00 G06F12/14

    CPC分类号: G06F21/41 G06F21/6236

    摘要: An improvement relating to the security of an operating system for either a stand alone computer system or for a networked computer system. The operating system provides improved security for programs available on the computer system having different security protocols. The operating system unifies these security protocols for each user based on unique user credentials. The system operates, upon request to start a program procedure by the user, to authenticate the identity of the user based on information unique to that user. Following which, the system generates a user handle associated with the user. The system then notifies each of the security protocols of the user handle associated with the user. The system then generates new user credentials for each of the security protocols. These user credentials are associated with the user handle and then the user handle is mapped to the unique user's credentials for each program procedure. Once this is accomplished, the system invokes an alternate process and tags the process with the user handle. Once a request from the alternate process for access to an object accessed through the server is requested, the system then grants access to the object based on the new user credentials associated with the user handle. The new user credentials are typically based on an association of the user identifier, the user handle, and the unique user credentials from before.

    摘要翻译: 关于独立计算机系统或联网计算机系统的操作系统的安全性的改进。 操作系统为具有不同安全协议的计算机系统上可用的程序提供改进的安全性。 操作系统基于唯一的用户凭据统一了每个用户的这些安全协议。 根据用户启动程序程序的要求,系统根据该用户唯一的信息对用户的身份进行认证。 之后,系统生成与用户相关联的用户句柄。 系统然后通知与用户相关联的用户句柄的每个安全协议。 然后,系统为每个安全协议生成新的用户凭据。 这些用户凭据与用户句柄相关联,然后将用户句柄映射到每个程序过程的唯一用户凭据。 一旦完成,系统将调用一个替代过程,并使用用户句柄标记该过程。 一旦请求来自替代进程的访问通过服务器访问的对象被请求,则系统基于与用户句柄相关联的新的用户凭证来授予对对象的访问。 新的用户凭证通常基于用户标识符,用户句柄和来自之前的唯一用户凭证的关联。

    Authorizing information flows
    6.
    发明授权
    Authorizing information flows 有权
    授权信息流

    公开(公告)号:US08024565B2

    公开(公告)日:2011-09-20

    申请号:US12130252

    申请日:2008-05-30

    IPC分类号: H04L9/00

    CPC分类号: G06F21/6218

    摘要: Authorizing information flows between devices of a data processing system is provided. In one illustrative embodiment, an information flow request is received from a first device to authorize an information flow from the first device to a second device. The information flow request includes an identifier of the second device. Based on an identifier of the first device and the second device, security information identifying an authorization level of the first device and second device is retrieved. A sensitivity of an information object that is to be transferred in the information flow is determined and the information flow is authorized or denied based only on the sensitivity of the information object and the authorization level of the first and second devices irregardless of the particular action being performed on the information object as part of the information flow.

    摘要翻译: 提供了数据处理系统的设备之间的信息流授权。 在一个说明性实施例中,从第一设备接收信息流请求,以授权从第一设备到第二设备的信息流。 信息流请求包括第二设备的标识符。 基于第一设备和第二设备的标识符,检索识别第一设备和第二设备的授权级别的安全信息。 确定要在信息流中传送的信息对象的灵敏度,并且仅基于信息对象的灵敏度和第一和第二设备的授权级别而不管特定动作是否被授权或拒绝信息流 作为信息流的一部分对信息对象执行。

    Method to protect information on a computer storage device
    7.
    发明授权
    Method to protect information on a computer storage device 失效
    保护计算机存储设备上信息的方法

    公开(公告)号:US5677952A

    公开(公告)日:1997-10-14

    申请号:US349778

    申请日:1994-12-06

    摘要: A method, using a secret key, to protect information in a storage disk of a computer, where the secret key is derived from a password entered into the computer by an authorized user. The method begins by applying a length-increasing pseudorandom function to the secret key and an index to generate a pseudorandom bit string having a length that is a function of the size of a sector of the storage disk. The sector is associated or otherwise identified by the index used by the pseudorandom function to generate the pseudorandom bit string. The pseudorandom bit string is then used to encrypt and decrypt data accesses to and from the sector.

    摘要翻译: 一种使用秘密密钥来保护计算机的存储盘中的信息的方法,其中秘密密钥由授权用户输入到计算机的密码导出。 该方法开始于将长度增加的伪随机函数应用于秘密密钥和索引,以生成具有作为存储盘的扇区大小的函数的长度的伪随机比特串。 扇区由伪随机函数使用的索引相关联或以其他方式标识,以生成伪随机位串。 然后伪随机比特串用于加密和解密对扇区的数据访问。

    Authorizing information flows based on a sensitivity of an information object
    8.
    发明授权
    Authorizing information flows based on a sensitivity of an information object 有权
    基于信息对象的敏感度来授权信息流

    公开(公告)号:US08527754B2

    公开(公告)日:2013-09-03

    申请号:US13213799

    申请日:2011-08-19

    IPC分类号: H04L29/06

    CPC分类号: G06F21/6218

    摘要: A system, apparatus, computer program product and method for authorizing information flows between devices of a data processing system are provided. In one illustrative embodiment, an information flow request is received from a first device to authorize an information flow from the first device to a second device. The information flow request includes an identifier of the second device. Based on an identifier of the first device and the second device, security information identifying an authorization level of the first device and second device is retrieved. A sensitivity of an information object that is to be transferred in the information flow is determined and the information flow is authorized or denied based only on the sensitivity of the information object and the authorization level of the first and second devices irregardless of the particular action being performed on the information object as part of the information flow.

    摘要翻译: 提供了一种用于在数据处理系统的设备之间授权信息流的系统,设备,计算机程序产品和方法。 在一个说明性实施例中,从第一设备接收信息流请求,以授权从第一设备到第二设备的信息流。 信息流请求包括第二设备的标识符。 基于第一设备和第二设备的标识符,检索识别第一设备和第二设备的授权级别的安全信息。 确定要在信息流中传送的信息对象的灵敏度,并且仅基于信息对象的灵敏度和第一和第二设备的授权级别而不管特定动作是否被授权或拒绝信息流 作为信息流的一部分对信息对象执行。

    Authorizing Information Flows Based on a Sensitivity of an Information Object
    9.
    发明申请
    Authorizing Information Flows Based on a Sensitivity of an Information Object 有权
    基于信息对象的灵敏度授权信息流

    公开(公告)号:US20110302413A1

    公开(公告)日:2011-12-08

    申请号:US13213799

    申请日:2011-08-19

    IPC分类号: H04L29/06

    CPC分类号: G06F21/6218

    摘要: A system, apparatus, computer program product and method for authorizing information flows between devices of a data processing system are provided. In one illustrative embodiment, an information flow request is received from a first device to authorize an information flow from the first device to a second device. The information flow request includes an identifier of the second device. Based on an identifier of the first device and the second device, security information identifying an authorization level of the first device and second device is retrieved. A sensitivity of an information object that is to be transferred in the information flow is determined and the information flow is authorized or denied based only on the sensitivity of the information object and the authorization level of the first and second devices irregardless of the particular action being performed on the information object as part of the information flow.

    摘要翻译: 提供了一种用于在数据处理系统的设备之间授权信息流的系统,设备,计算机程序产品和方法。 在一个说明性实施例中,从第一设备接收信息流请求,以授权从第一设备到第二设备的信息流。 信息流请求包括第二设备的标识符。 基于第一设备和第二设备的标识符,检索识别第一设备和第二设备的授权级别的安全信息。 确定要在信息流中传送的信息对象的灵敏度,并且仅基于信息对象的灵敏度和第一和第二设备的授权级别而不管特定动作是否被授权或拒绝信息流 作为信息流的一部分对信息对象执行。

    Associating security information with information objects
    10.
    发明授权
    Associating security information with information objects 失效
    将安全信息与信息对象相关联

    公开(公告)号:US07975295B2

    公开(公告)日:2011-07-05

    申请号:US12130027

    申请日:2008-05-30

    IPC分类号: G06F11/00

    CPC分类号: G06F21/6218

    摘要: A hash key is generated based on an information object and a lookup operation is performed in a hash table based on the hash key. A determination is made whether an entry in the hash table at an index corresponding to the hash key identifies a labelset for the information object. A labelset, identifying a sensitivity of the information object, is stored in the entry at the index corresponding to the hash key for the information object if a labelset for the information object is not identified in the entry in the hash table. Information flows involving the information object are authorized based on a lookup of the labelset associated with the information object in the hash table. The hash table may be a multidimensional hash table.

    摘要翻译: 基于信息对象生成散列密钥,并且基于散列密钥在哈希表中执行查找操作。 确定散列表中与散列键相对应的索引处的条目是否识别信息对象的标签集。 如果在散列表中的条目中没有标识信息对象的标签集,则标识信息对象的敏感度的标签集存储在与信息对象的散列键相对应的索引的条目中。 基于与哈希表中的信息对象相关联的标签集的查找来授权涉及信息对象的信息流。 散列表可以是多维哈希表。