US Patent No: 5,859,966

Number of patents in Portfolio can not be more than 2000

Security system for computer systems

1 Status Updates

Stats

ATTORNEY / AGENT: (SPONSORED)

Importance

Loading Importance Indicators... loading....

Abstract

See full text

A security system for a computer system imposes specific limitations on who has access to the computer system and to exactly what operations and data. Viruses are securely contained and prevented from expanding into areas where they can destroy stored programs or data. Viruses are also prevented from being introduced or executed in a large number of instances. The totality of computer functions is broken up into a set of events with an associated set of capabilities and different capabilities are assigned to each user depending on the particular job which that user is to do on the computer system. Also, security labels are placed on each data file and other system resources, and on each process. Further, a range of hierarchy/category labels (MAC labels) is assigned to each process to define a sub-lattice in which special capabilities can apply. Further, the hierarchy of labels is divided into a small number (for example 3) of regions, and a process operating in one region is generally not allowed to cross over into another region. Further, an owner of a data file is allowed to place restrictions on the file so that only users who posses certain privileges can gain access to the file.

Loading the Abstract Image... loading....

First Claim

See full text

Family

Loading Family data... loading....

Patent Owner(s)

Patent OwnerAddressTotal Patents
DATA GENERAL CORPORATIONWESTBORO, MA52

International Classification(s)

  • [Classification Symbol]
  • [Patents Count]

Inventor(s)

Inventor Name Address # of filed Patents Total Citations
Hayman, Kenneth John Durham, NC 3 144
Keene, Michael Donovan Coral Springs, FL 2 100
Lewine, Eric Scott Apex, NC 2 100
Meyers, William James Research Triangle Park, NC 1 100
Spencer, Jon Frederick Raleigh, NC 1 100
Taylor, II Millard Cranford Chapel Hill, NC 1 100

Cited Art Landscape

Patent Info (Count) # Cites Year
 
Other [Check patent profile for assignment information] (1)
* 5,121,345 System and method for protecting integrity of computer data and software 146 1990
 
SYBASE, INC. (1)
* 5,572,673 Secure multi-level system for executing stored procedures 162 1993
 
HUGHES SIMULATION SYSTEMS, INC. (1)
* 5,263,147 System for providing high security for personal computers and workstations 76 1991
 
SECURE COMPUTING CORPORATION (1)
* 4,713,753 Secure data processing system architecture with format control 315 1985
 
DIGITAL CORPORATION, A MA CORP. (1)
* 5,204,961 Computer network operating with multilevel hierarchical security with selectable common trust realms and corresponding security protocols 250 1990
 
IPG HEALTHCARE 501 LIMITED (1)
* 5,335,346 Access control policies for an object oriented database, including access control lists which span across object boundaries 280 1991
 
Hughes Aircraft Company (1)
* 5,504,814 Efficient security kernel for the 80960 extended architecture 234 1994
 
TANDEM COMPUTERS INCORPORATED (1)
* 5,265,221 Access restriction facility method and apparatus 140 1992
 
INTERNATIONAL COMPUTERS LIMITED (1)
* 5,339,403 Access control in a distributed computer system 74 1993
 
ROUND ROCK RESEARCH, LLC (1)
* 5,577,209 Apparatus and method for providing multi-level security for communication among computers and terminals on a network 275 1994
 
GREEN WIRELESS LLC (2)
* 5,355,474 System for multilevel secure database management using a knowledge base with release-based and other security constraints for query, response and update modification 251 1991
* 5,481,700 Apparatus for design of a multilevel secure database management system based on a multilevel logic programming system 114 1991
 
INTEL CORPORATION (1)
* 4,442,484 Microprocessor memory management and protection mechanism 175 1980
 
INTERSIL CORPORATION (1)
* 5,469,556 Resource access security system for controlling access to resources of a data processing system 49 1992
 
GENSYM CORPORATION (1)
* 5,432,934 Access restrictions as a means of configuring a user interface and making an application secure 45 1993
 
RAYTHEON COMPANY (1)
* 5,283,828 Architecture for utilizing coprocessing systems to increase performance in security adapted computer systems 66 1993
 
RAKUTEN, INC. (1)
* 5,455,953 Authorization system for obtaining in single step both identification and access rights of client to server directly from encrypted authorization ticket 425 1993
 
AT&T CORP. (1)
* 5,375,244 System and method for granting access to a resource 162 1992
* Cited By Examiner

Patent Citation Ranking

Forward Cite Landscape

Patent Info (Count) # Cites Year
 
Other [Check patent profile for assignment information] (2)
* 6,226,745 Information sharing system and method with requester dependent sharing and security rules 153 1998
* 2008/0201,777 Method and Agent for the Protection Against the Unauthorized Use of Computer Resources 0 2008
 
ADARA NETWORKS, INC. (7)
7,725,596 System and method for resolving network layer anycast addresses to network layer unicast addresses 15 2001
* 7,577,754 System and method for controlling access to content carried in a caching architecture 15 2001
7,565,450 System and method for using a mapping between client addresses and addresses of caches to support content delivery 42 2001
7,343,422 System and method for using uniform resource locators to map application layer content names to network layer anycast addresses 34 2001
* 2002/0016,860 System and method for resolving network layer anycast addresses to network layer unicast addresses 27 2001
8,433,787 System and method for directing clients to optimal servers in computer networks 0 2009
8,423,666 System and method for directing clients to optimal servers in computer networks 0 2009
 
TREND MICRO INCORPORATED (1)
* 7,454,788 Method for adding and enforcing enhanced authorization policy on devices in computer operation systems 1 2001
 
ONLINE VIDEO NETWORK, INC. (2)
7,908,337 System and method for using network layer uniform resource locator routing to locate the closest server carrying specific content 8 2001
8,572,214 System and method for discovering information objects and information object repositories in computer networks 0 2006
 
NULLRING, INC (1)
* 7,840,795 Method and apparatus for limiting access to sensitive data 2 2007
 
AZURE NETWORKS, LLC (1)
* 2004/0073,617 Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail 132 2003
 
THE UNITED STATES OF AMERICA, REPRESENTED BY THE SECRETARY OF COMMERCE (1)
* 6,023,765 Implementation of role-based access control in multi-level secure systems 175 1997
 
Promisec Ltd. (2)
8,566,939 Method and device for scanning a plurality of computerized devices connected to a network 0 2006
8,544,099 Method and device for questioning a plurality of computerized devices 0 2010
 
TRIGENCE CORP. (1)
* 7,757,291 Malware containment by application encapsulation 4 2006
 
@Seurity Broadband Corp. (1)
7,119,609 Lifestyle multimedia security system 11 2003
 
PROMISEC LTD. ISRAELI COMPANY, OF (1)
7,752,671 Method and device for questioning a plurality of computerized devices 4 2005
 
BULL SAS (1)
* 8,627,406 Device for protection of the data and executable codes of a computer system 0 2007
 
ROCHE DIABETES CARE, INC. (2)
* 8,566,818 Method and system for configuring a consolidated software application 1 2007
* 2009/0150,831 Method and system for configuring a consolidated software application 3 2007
 
ORACLE INTERNATIONAL CORPORATION (2)
* 8,316,051 Techniques for adding multiple security policies to a database system 8 2001
8,510,334 Lock manager on disk 0 2009
 
FINJAN, INC. (13)
* 6,167,520 System and method for protecting a client during runtime from hostile downloadables 119 1997
* 6,154,844 System and method for attaching a downloadable security profile to a downloadable 271 1997
6,804,780 System and method for protecting a computer and a network from hostile downloadables 100 2000
6,480,962 System and method for protecting a client during runtime from hostile downloadables 76 2000
7,058,822 Malicious mobile code runtime monitoring system and methods 78 2001
6,965,968 Policy-based caching 122 2003
7,418,731 Method and system for caching at secure gateways 11 2004
8,225,408 Method and system for adaptive rule-based content scanners 4 2004
7,975,305 Method and system for adaptive rule-based content scanners for desktop computers 16 2004
7,647,633 Malicious mobile code runtime monitoring system and methods 8 2005
7,613,926 Method and system for protecting a computer and a network from hostile downloadables 9 2006
8,079,086 Malicious mobile code runtime monitoring system and methods 7 2009
8,677,494 Malicious mobile code runtime monitoring system and methods 0 2011
 
STRAGENT, LLC (3)
8,204,945 Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail 6 2008
8,272,060 Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses 1 2010
8,166,549 Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses 0 2010
 
MICROSOFT TECHNOLOGY LICENSING, LLC (1)
* 7,730,318 Integration of high-assurance features into an application through application factoring 7 2003
 
BIT9, INC. (1)
8,984,636 Content extractor and analysis system 0 2005
 
CANON KABUSHIKI KAISHA (2)
* 7,834,890 Information processing method and image processing method 2 2004
* 2005/0131,857 Information processing method and image processing method 3 2004
 
INTERNATIONAL BUSINESS MACHINES CORPORATION (9)
* 7,370,366 Data management system and method 16 2001
7,698,441 Intelligent use of user data to pre-emptively prevent execution of a query violating access controls 4 2002
6,928,554 Method of query return data analysis for early warning indicators of possible security exposures 8 2002
* 2004/0088,561 Method of query return data analysis for early warning indicators of possible security exposures 4 2002
* 2004/0093,514 Method for automatically isolating worm and hacker attacks within a local area network 6 2002
7,392,246 Method for implementing access control for queries to a content management system 1 2003
* 7,890,530 Method and system for controlling access to data via a data-centric security model 4 2008
7,818,581 Data management system 0 2008
7,761,443 Implementing access control for queries to a content management system 5 2008
 
CENUS TECHNOLOGIES, INC. (2)
7,162,539 System and method for discovering information objects and information object repositories in computer networks 31 2001
* 2001/0056,416 System and method for discovering information objects and information object repositories in computer networks 113 2001
 
TRUSTWARE 101 LIMITED (6)
* 7,363,493 Method for protecting computer programs and data from hostile code 5 2002
* 2002/0147,923 Method for protecting computer programs and data from hostile code 13 2002
8,078,886 Method for protecting computer programs and data from hostile code 6 2009
8,850,428 User transparent virtualization method for protecting computer programs and data from hostile code 0 2010
8,484,483 Method for protecting computer programs and data from hostile code 4 2011
8,838,994 Method for protecting computer programs and data from hostile code 0 2013
 
ABSIO CORPORATION (2)
8,627,104 Secure data storage 1 2011
9,104,888 Secure data storage 0 2013
 
HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P. (2)
* 6,026,402 Process restriction within file system hierarchies 97 1998
* 7,167,987 Use of biometrics to provide physical and logic access to computer devices 4 2001
 
Bit 9, Inc. (2)
8,272,058 Centralized timed analysis in a network security system 13 2005
7,895,651 Content tracking in a network security system 13 2005
 
CISCO TECHNOLOGY, INC. (1)
7,516,475 Method and apparatus for managing security policies on a network 7 2002
 
SILICON GRAPHICS INTERNATIONAL CORP. (8)
* 7,640,582 Clustered filesystem for mix of trusted and untrusted nodes 3 2003
8,396,908 Multi-class heterogeneous clients in a clustered filesystem 1 2009
8,151,347 Clustered file system for mix of trusted and untrusted nodes 1 2009
8,683,021 Clustered filesystem with membership version support 0 2011
8,578,478 Clustered file systems for mix of trusted and untrusted nodes 0 2012
8,527,463 Clustered filesystem with data volume snapshot maintenance 1 2012
8,838,658 Multi-class heterogeneous clients in a clustered filesystem 0 2013
9,020,897 Clustered filesystem with data volume snapshot 0 2013
 
COMPUTER ASSOCIATES THINK, INC. (1)
* 7,383,569 Method and agent for the protection against the unauthorized use of computer resources 4 1999
 
COMCAST CABLE COMMUNICATIONS, LLC (12)
6,690,411 Security system 59 1999
8,520,068 Video security system 5 2001
* 2002/0147,982 Video security system 50 2001
7,015,806 Distributed monitoring for a video security system 65 2001
7,130,383 Lifestyle multimedia security system 52 2003
7,409,045 Lifestyle multimedia security system 12 2003
7,120,232 Lifestyle multimedia security system 21 2003
6,930,599 Security system 52 2003
7,120,233 Lifestyle multimedia security system 23 2003
7,103,152 Lifestyle multimedia security system 30 2003
8,144,836 Lifestyle multimedia security system 1 2007
8,953,749 Lifestyle multimedia security system 0 2012
 
SUN MICROSYSTEMS, INC. (1)
* 8,032,500 Dynamic sending policies and client-side disaster recovery mechanism for messaging communication 0 2005
 
INVENSYS SYSTEMS, INC. (17)
* 7,272,815 Methods and apparatus for control configuration with versioning, security, composite blocks, edit selection, object swapping, formulaic values and other aspects 182 2000
7,778,717 Component object model communication method for a control system 11 2003
7,761,923 Process control methods and apparatus for intrusion detection, protection and network hardening 9 2005
8,368,640 Process control configuration system with connection validation and configuration 0 2006
7,860,857 Digital data processing apparatus and methods for improving plant performance 1 2007
8,090,452 Methods and apparatus for control using control devices that provide a virtual machine environment and that communicate via an IP network 10 2007
8,023,500 Methods for process control with change updates 1 2007
7,890,927 Apparatus and method for configuring and editing a control system with live data 20 2008
8,229,579 Control systems and methods with versioning 7 2008
8,060,222 Control system configurator and methods with object characteristic swapping 6 2008
8,028,272 Control system configurator and methods with edit selection 8 2008
8,028,275 Control systems and methods with smart blocks 5 2008
7,984,420 Control systems and methods with composite blocks 12 2008
8,225,271 Apparatus for control systems with objects that are associated with live data 11 2008
8,127,060 Methods and apparatus for control configuration with control objects that are fieldbus protocol-aware 36 2009
8,594,814 Systems and methods for immersive interaction with actual and/or simulated facilities for process, environmental and industrial control 0 2009
8,463,964 Methods and apparatus for control configuration with enhanced change-tracking 1 2010
 
SAFENET DATA SECURITY (ISRAEL) LTD. (1)
* 7,047,369 Software application environment 10 1997
 
McAfee, Inc. (1)
* 6,453,419 System and method for implementing a security policy 118 1998
* Cited By Examiner