scispace - formally typeset
Patent

Method for protecting data in a computer system

TLDR
A data processing system include a plurality of data objects which are accessible by application programs through a system level interface as discussed by the authors. Each data object has an associated user access list, and each object has at least one key indicating which applications can access that object.
Abstract
A data processing system include a plurality of data objects which are accessible by application programs through a system level interface. Each data object has an associated user access list. In addition, each object has at least one key indicating which applications can access that object. The key is preferably maintained in a protected storage area, accessible only by the low level system interface. Both the application identifier key and the user who invoked that application must match the identifier information in the data object for access to be allowed to that object. If an unauthorized user attempts access to the data object through the correct application, or an authorized user attempts access through an incorrect application, access to the data object will be denied by the low level interface.

read more

Citations
More filters
Patent

System for controlling the distribution and use of digital works

TL;DR: In this article, a system for controlling use and distribution of digital works, in which the owner of a digital work attaches usage rights to that work, is presented, where each right has associated with it certain optional specifications which outline the conditions and fees upon which the right may be exercised.
Patent

System for controlling the distribution and use of digital works using digital tickets

TL;DR: In this paper, a system for controlling the distribution and use of digital works using digital tickets is presented, where a digital ticket is used to entitle the ticket holder to exercise some usage right with respect to a digital work.
Patent

Digital rights management in a mobile communications environment

TL;DR: In this article, the authors present a method, system, and computer program product to control the access, copying, and/or transfer of a digital asset by mobile, wireless devices using a digital voucher.
Patent

System for controlling the distribution and use of rendered digital works through watermarking

TL;DR: A trusted rendering system as mentioned in this paper facilitates the protection of rendered digital works which have been rendered on a system which controls the distribution and use of digital works through the use of dynamically generated watermark information that is embedded in the rendered output.
Patent

Method and system for advanced role-based access control in distributed and centralized computer systems

TL;DR: In this article, a method and system for registration, authorization, and control of access rights in a computer system is presented, where the required parameters are provided by the subject of the computer system, e.g. by a person, a job position, or an organization unit.
References
More filters
Patent

Transaction system security method and apparatus

TL;DR: In this paper, an improved security system is disclosed which uses an IC card to enchance the security functions involving component authentication, user verification, user authorization and access control, protection of message secrecy and integrity, management of cryptographic keys, and auditablity.
Patent

System for controlling group access to objects using group access control folder and group identification as individual user

TL;DR: In this paper, a method and system for controlling access by groups of users to multiple objects stored within a data processing system implemented library wherein each object has an access list associated therewith explicitly listing individual users permitted access to that object.
Patent

Protected software access control apparatus and method

TL;DR: In this paper, a software access control system for controlling access to a protected application program is described, where a user terminal is actuated to transmit an access request message including a requested program identification manifestation to the first processor requesting permission to execute a particular application program.
Patent

Data processing system having a memory using object-based information and a protection scheme for determining access rights to such information

TL;DR: In this paper, the authors present a protection technique to prevent unauthorized access to objects by users who are identified by a subject number which identifies the user, a process of the system for executing a user's procedure, and the type of operation to be performed by the user's procedures.