System and method for using security levels to simplify security policy management
    1.
    发明申请
    System and method for using security levels to simplify security policy management 审中-公开
    使用安全级别简化安全策略管理的系统和方法

    公开(公告)号:US20050278790A1

    公开(公告)日:2005-12-15

    申请号:US10865345

    申请日:2004-06-10

    CPC分类号: G06F21/54 G06F2221/2113

    摘要: A system and method is provided for reducing the complexity and improving the performance of enforcing security restrictions on the execution of program code in a runtime environment. In a preferred embodiment, units of executable code, such as methods or functions, are classified by “security level.” Code units belonging to a “trusted” security level may call any other code unit in the runtime environment, but other security levels are restricted in the code units they can call. In a preferred embodiment, the security levels are represented by corresponding permission objects. Each permission object that is associated with a particular security level includes a numerical value that denotes that security level. Security policies can be enforced with respect to caller and callee code units by comparing numerical values of corresponding permission objects. This security level scheme also improves runtime performance by making it unnecessary to check individually-defined permissions in many cases.

    摘要翻译: 提供了一种系统和方法,用于降低复杂性并提高在运行时环境中执行程序代码的安全限制的性能。 在优选实施例中,诸如方法或功能的可执行代码单元被“安全级别”分类。 属于“受信任”安全级别的代码单元可以调用运行时环境中的任何其他代码单元,但是其他安全级别在他们可以调用的代码单元中受到限制。 在优选实施例中,安全级别由相应的许可对象表示。 与特定安全级别相关联的每个权限对象包括表示该安全级别的数值。 通过比较相应权限对象的数值,可以对呼叫者和被叫方代码单元执行安全策略。 这种安全级别方案还可以通过在许多情况下不需要检查单独定义的权限来提高运行时性能。

    Declarative trust model between reverse proxy server and websphere application server
    2.
    发明申请
    Declarative trust model between reverse proxy server and websphere application server 审中-公开
    反向代理服务器和Websphere应用服务器之间的声明信任模型

    公开(公告)号:US20050154886A1

    公开(公告)日:2005-07-14

    申请号:US10755828

    申请日:2004-01-12

    IPC分类号: H04L9/00 H04L29/06

    摘要: A method and system for providing a declarative trust association model that formalizes the way trust is established and requires corresponding authentication information to be presented in a standard format. Consequently, the application server may provide a guaranteed level of protection. The mechanism of the present invention provides a framework that allows an application server to enforce a trust evaluation and allows reverse proxy security server to assert a client's security identity, as well as other client security credential information. A known trust association interceptor model is extended to allow the reverse proxy security server to assert the authenticated user's security attributes. Such security attributes include, for example, group information, authentication strength, and location (i.e., where does the user enter the request, intranet vs. internet, IP address, etc.,). The security attributes can be used in making authorization decisions.

    摘要翻译: 一种用于提供声明性信任关联模型的方法和系统,其形式化信任建立的方式,并且需要以标准格式呈现相应的认证信息。 因此,应用服务器可以提供有保证的保护级别。 本发明的机制提供了一种框架,其允许应用服务器执行信任评估,并允许反向代理安全服务器断言客户端的安全身份以及其他客户端安全凭证信息。 扩展了一个已知的信任关联拦截器模型,以允许反向代理安全服务器断言经过身份验证的用户的安全属性。 这样的安全属性包括例如组信息,认证强度和位置(即,用户进入请求,内联网与互联网,IP地址等在哪里)。 安全属性可用于作出授权决定。

    System and method for secure network state management and single sign-on
    3.
    发明申请
    System and method for secure network state management and single sign-on 审中-公开
    用于安全网络状态管理和单点登录的系统和方法

    公开(公告)号:US20050154887A1

    公开(公告)日:2005-07-14

    申请号:US10755835

    申请日:2004-01-12

    IPC分类号: G06F11/30 G06F21/00 H04L9/00

    CPC分类号: G06F21/41 G06F2221/2151

    摘要: State management (cookie) data is encrypted so that access control data included in the cookie is unable to be modified by the user. A hashing algorithm is performed using various fields in the cookie data and the hash value is encrypted. The hash value is combined with other data such as the user identifier and a time stamp and encrypted to form a cookie value. When a request is received, the cookie data is checked. If the token value is not in the server's cache then the token is authenticated facilitating movement of the client between servers. If the cookie does not exist or is timed out, then the user is authenticated using traditional means.

    摘要翻译: 状态管理(cookie)数据被加密,使得包含在cookie中的访问控制数据不能被用户修改。 使用Cookie数据中的各种字段执行散列算法,并且哈希值被加密。 哈希值与诸如用户标识符和时间戳的其他数据组合,并被加密以形成cookie值。 收到请求后,将检查Cookie数据。 如果令牌值不在服务器的缓存中,那么令牌被认证便于客户端在服务器之间移动。 如果cookie不存在或超时,那么用户将使用传统手段进行身份验证。

    Method and apparatus for handling custom token propagation without Java serialization
    4.
    发明申请
    Method and apparatus for handling custom token propagation without Java serialization 审中-公开
    用于在没有Java序列化的情况下处理自定义令牌传播的方法和装置

    公开(公告)号:US20060005234A1

    公开(公告)日:2006-01-05

    申请号:US10882118

    申请日:2004-06-30

    IPC分类号: G06F15/16

    CPC分类号: H04L63/0815 H04L29/06

    摘要: A method, apparatus and computer instructions for handling propagation of custom tokens without using Java™ serialization. A service provider may plug in a first login module to add a marker token to a subject for later use by an application at run time. The marker token is then serialized by the mechanism of the present invention by invoking a get bytes method on the token. The present invention then propagates the token downstream if the token is marked forwardable. At a target server, a second login module may be plugged in to deserialize a byte array from a list of tokens and perform custom operation on the byte array retrieved from a token holder.

    摘要翻译: 用于处理自定义令牌的传播而不使用Java(TM)序列化的方法,设备和计算机指令。 服务提供商可以插入第一登录模块以将标记标记添加到主体以供运行时应用程序稍后使用。 然后通过在令牌上调用get bytes方法,通过本发明的机制对标记标记进行序列化。 然后,如果令牌被标记为可向导,则本发明在下游传播令牌。 在目标服务器上,可以插入第二登录模块以反序列化令牌列表中的字节数组,并对从令牌持有者检索的字节数组执行自定义操作。

    METHOD AND APPARATUS FOR PREVENTING ROGUE IMPLEMENTATIONS OF A SECURITY-SENSITIVE CLASS INTERFACE

    公开(公告)号:US20080034202A1

    公开(公告)日:2008-02-07

    申请号:US11867015

    申请日:2007-10-04

    IPC分类号: H04L9/00

    CPC分类号: G06F21/64

    摘要: A method and apparatus for preventing rogue implementations of a security-sensitive class interface are provided. With the method and apparatus, a unique identifier (UID) is created by a server process when the server process is started. Anytime the server process, i.e. a server runtime environment, instantiates a new credential object following start-up of the server process, the encrypted UID is placed into a private field within the new credential object. In addition, the UID is encrypted and stored in a private class of the server runtime environment. A verification class is provided within the server runtime environment which includes one or more methods that receive the credential object as a parameter and return true or false as to the validity of the credential object. These one or more methods determine the validity of the credential object by retrieving the encrypted UID from the private class stored in the server runtime environment, decrypting the UID and comparing it to the decrypted UID stored in the private field of the credential object. If the two UIDs match, a determination is made that the credential object was created by the server runtime environment rather than a rogue application. If the two UIDs do not match, or if there is no UID in the credential object, then a false result will be returned by the verification class.

    Dynamic cache lookup based on dynamic data

    公开(公告)号:US20060020813A1

    公开(公告)日:2006-01-26

    申请号:US10881962

    申请日:2004-06-30

    IPC分类号: H04L9/00

    摘要: A system and method for tracking user security credentials in a distributed computing environment. The security credentials of an authenticated user includes not just his unique user identifier, but also a set of security attributes such as the time of authentication, the location where the user is authenticated (i.e., intranet user v. internet user), the authentication strength, and so on. The security attributes are used in access control decisions. The same user can be given different authorization if he has a different security attribute value. Security credentials may be generated either by WebSphere security code or by third party security provider code. This invention stores the user credentials in a distributed cache and provides a system and method to compute the unique key based on the dynamic security credentials for cache lookup

    Highly scalable and highly available cluster system management scheme

    公开(公告)号:US07870235B2

    公开(公告)日:2011-01-11

    申请号:US12139116

    申请日:2008-06-13

    IPC分类号: G06F15/16 G06F12/00

    CPC分类号: G06F9/5061 G06F11/1425

    摘要: A cluster system is treated as a set of resource groups, each resource group including a highly available application and the resources upon which it depends. A resource group may have between 2 and M data processing systems, where M is small relative to the cluster size N of the total cluster. Configuration and status information for the resource group is fully replicated only on those data processing systems which are members of the resource group. A configuration object/database record for the resource group has an associated owner list identifying the data processing systems which are members of the resource group and which may therefore manage the application. A data processing system may belong to more than one resource group, however, and configuration and status information for the data processing system is replicated to each data processing system which could be affected by failure of the subject data processing system—that is, any data processing system which belongs to at least one resource group also containing the subject data processing system. The partial replication scheme of the present invention allows resource groups to run in parallel, reduces the cost of data replication and access, is highly scalable and applicable to very large clusters, and provides better performance after a catastrophe such as a network partition.

    Highly Scalable and Highly Available Cluster System Management Scheme
    9.
    发明申请
    Highly Scalable and Highly Available Cluster System Management Scheme 有权
    高可扩展性和高可用性集群系统管理方案

    公开(公告)号:US20080320113A1

    公开(公告)日:2008-12-25

    申请号:US12139116

    申请日:2008-06-13

    IPC分类号: G06F15/16

    CPC分类号: G06F9/5061 G06F11/1425

    摘要: A cluster system is treated as a set of resource groups, each resource group including a highly available application and the resources upon which it depends. A resource group may have between 2 and M data processing systems, where M is small relative to the cluster size N of the total cluster. Configuration and status information for the resource group is fully replicated only on those data processing systems which are members of the resource group. A configuration object/database record for the resource group has an associated owner list identifying the data processing systems which are members of the resource group and which may therefore manage the application. A data processing system may belong to more than one resource group, however, and configuration and status information for the data processing system is replicated to each data processing system which could be affected by failure of the subject data processing system—that is, any data processing system which belongs to at least one resource group also containing the subject data processing system. The partial replication scheme of the present invention allows resource groups to run in parallel, reduces the cost of data replication and access, is highly scalable and applicable to very large clusters, and provides better performance after a catastrophe such as a network partition.

    摘要翻译: 集群系统被视为一组资源组,每个资源组包括高度可用的应用程序及其所依赖的资源。 资源组可以具有2和M个数据处理系统,其中M相对于总集群的集群大小N是小的。 资源组的配置和状态信息仅在作为资源组成员的那些数据处理系统上完全复制。 用于资源组的配置对象/数据库记录具有标识作为资源组的成员并且因此可以管理该应用的数据处理系统的关联所有者列表。 然而,数据处理系统可以属于多个资源组,并且数据处理系统的配置和状态信息被复制到可能受主题数据处理系统的故障影响的每个数据处理系统 - 即任何数据 处理系统,其属于还包含对象数据处理系统的至少一个资源组。 本发明的部分复制方案允许资源组并行运行,降低数据复制和访问的成本,是高度可扩展的并且适用于非常大的集群,并且在诸如网络分区的灾难之后提供更好的性能。

    Integrated Security Roles
    10.
    发明申请
    Integrated Security Roles 有权
    综合安全角色

    公开(公告)号:US20080295147A1

    公开(公告)日:2008-11-27

    申请号:US12049139

    申请日:2008-03-14

    IPC分类号: G06F21/00

    CPC分类号: H04L63/102 G06F21/6236

    摘要: An approach to handling integrated security roles is presented. An upstream application includes one or more role-mapping requirements that correspond to an upstream security role and a downstream security role. The upstream security role is expanded by adding an upstream security role identifier in a downstream application's role-mapping table or by adding upstream user-to-role mappings to a downstream application's role-mapping table. When an upstream security role is expanded, a user assigned to the upstream security role automatically has access to role-mapped downstream applications.

    摘要翻译: 介绍了一种处理集成安全角色的方法。 上游应用程序包括一个或多个对应于上游安全角色和下游安全角色的角色映射要求。 通过在下游应用程序的角色映射表中添加上游安全角色标识符,或通过向下游应用程序的角色映射表添加上游用户到角色映射来扩展上游安全角色。 当扩展上游安全角色时,分配给上游安全角色的用户可以自动访问角色映射的下游应用程序。