scispace - formally typeset
Patent

Policies for secure software execution

Reads0
Chats0
TLDR
In this paper, a system and method that automatically, transparently and securely controls software execution by identifying and classifying software, and locating a rule and associated security level for executing executable software is presented.
Abstract
A system and method that automatically, transparently and securely controls software execution by identifying and classifying software, and locating a rule and associated security level for executing executable software. The security level may disallow the software's execution, restrict the execution to some extent, or allow unrestricted execution. To restrict software, a restricted access token may be computed that reduces software's access to resources, and/or removes privileges, relative to a user's normal access token. The rules that control execution for a given machine or user may be maintained in a restriction policy, e.g., locally maintained and/or in a group policy object distributable over a network. Software may be identified/classified by a hash of its content, by a digital signature, by its file system or network path, and/or by its URL zone. For software having multiple classifications, a precedence mechanism is provided to establish the applicable rule/security level.

read more

Citations
More filters
Patent

Provisioning of computer systems using virtual machines

TL;DR: In this paper, a provisioning server automatically configures a virtual machine according to user specifications and then deploys the VM on a physical host, where the user can either choose from a list of pre-configured, ready-to-deploy VMs, or he may select which hardware, operating system and application(s) he would like the VM to have.
Patent

Secure system for allowing the execution of authorized computer program code

TL;DR: In this article, a multi-level proactive whitelist approach is employed to secure a computer system by allowing only the execution of authorized computer program code thereby protecting the computer system against malicious code such as viruses, Trojan horses, spyware, and/or the like.
Patent

Malicious mobile code runtime monitoring system and methods

TL;DR: In this paper, a mobile protection code (MPC) is used to prevent malicious downloadable operation attempts to be received by the MPC and causing corresponding corresponding corresponding operations to be executed in response to the attempts.
Patent

Method and system for protection against information stealing software

TL;DR: In this paper, a system and method for identifying infection of unwanted software on an electronic device is disclosed, where a software agent configured to generate a bait and is installed on the electronic device.
Patent

System and method for controlling access to internet sites

TL;DR: In this paper, a method and system for providing flexible access to Internet sites is described, which includes a database of Internet sites that have been categorized so that the system determines the category of information that a user is accessing on the Internet.
References
More filters
Patent

Method and apparatus for verifying an individual's identity

TL;DR: In this paper, the identity of an individual based on keystroke dynamics was verified using a keystroke generator and a timing encoder coupled to the keyboard for timing periods between keystrokes.
Patent

Secure data processing system architecture with format control

TL;DR: In this paper, means and methods of securing protected system files in a data processing system are disclosed, wherein the information determining access rights of system users to the protected systems files remains at all times within a secure processor.
Patent

Implementing digital signatures for data streams and data archives

TL;DR: In this article, a method for verifying the authenticity of data involves providing at least one data file which includes an identifier and a signature file, which includes the identifier for the data file as well as a digital signature.
Patent

System and method for safety distributing executable objects

TL;DR: In this article, the authors present a system for distributing and executing executable code, where a distributing authority associates a privilege request code with the executable code and then distributes it for eventual execution by clients.
Patent

Method and apparatus for establishing a security policy, and method and apparatus for supporting establishment of security policy

TL;DR: In this paper, a method of efficiently establishing a security policy and an apparatus for supporting the preparation of security policy is presented. But the security policy draft is adjusted so as to match the realities of an organization, as required, thus completing a securitypolicy stepwise.
Related Papers (5)