US Patent No: 5,859,966

Number of patents in Portfolio can not be more than 2000

Security system for computer systems

1 Status Updates

Stats

ATTORNEY / AGENT: (SPONSORED)

Importance

Loading Importance Indicators... loading....

Abstract

See full text

A security system for a computer system imposes specific limitations on who has access to the computer system and to exactly what operations and data. Viruses are securely contained and prevented from expanding into areas where they can destroy stored programs or data. Viruses are also prevented from being introduced or executed in a large number of instances. The totality of computer functions is broken up into a set of events with an associated set of capabilities and different capabilities are assigned to each user depending on the particular job which that user is to do on the computer system. Also, security labels are placed on each data file and other system resources, and on each process. Further, a range of hierarchy/category labels (MAC labels) is assigned to each process to define a sub-lattice in which special capabilities can apply. Further, the hierarchy of labels is divided into a small number (for example 3) of regions, and a process operating in one region is generally not allowed to cross over into another region. Further, an owner of a data file is allowed to place restrictions on the file so that only users who posses certain privileges can gain access to the file.

Loading the Abstract Image... loading....

First Claim

See full text

all claims..

Related Publications

Loading Related Publications... loading....

Patent Owner(s)

Patent OwnerAddressTotal Patents
DATA GENERAL CORPORATIONWESTBORO, MA265

International Classification(s)

  • [Classification Symbol]
  • [Patents Count]

Inventor(s)

Inventor Name Address # of filed Patents Total Citations
Hayman, Kenneth John Durham, NC 3 139
Keene, Michael Donovan Coral Springs, FL 3 98
Lewine, Eric Scott Apex, NC 1 96
Meyers, William James Research Triangle Park, NC 1 96
Spencer, Jon Frederick Raleigh, NC 1 96
Taylor, II Millard Cranford Chapel Hill, NC 1 96

Cited Art Landscape

Patent Info (Count) # Cites Year
 
GREEN WIRELESS LLC (2)
5,355,474 System for multilevel secure database management using a knowledge base with release-based and other security constraints for query, response and update modification 238 1991
5,481,700 Apparatus for design of a multilevel secure database management system based on a multilevel logic programming system 113 1991
 
AT&T CORP. (1)
5,375,244 System and method for granting access to a resource 153 1992
 
Digital Corporation (1)
5,204,961 Computer network operating with multilevel hierarchical security with selectable common trust realms and corresponding security protocols 233 1990
 
GENSYM CORPORATION (1)
5,432,934 Access restrictions as a means of configuring a user interface and making an application secure 43 1993
 
Hughes Aircraft Company (1)
5,504,814 Efficient security kernel for the 80960 extended architecture 230 1994
 
HUGHES SIMULATION SYSTEMS, INC. (1)
5,263,147 System for providing high security for personal computers and workstations 74 1991
 
INTEL CORPORATION (1)
4,442,484 Microprocessor memory management and protection mechanism 175 1980
 
International Computers Limited (1)
5,339,403 Access control in a distributed computer system 74 1993
 
INTERSIL CORPORATION (1)
5,469,556 Resource access security system for controlling access to resources of a data processing system 46 1992
 
IPG HEALTHCARE 501 LIMITED (1)
5,335,346 Access control policies for an object oriented database, including access control lists which span across object boundaries 265 1991
 
RAKUTEN, INC. (1)
5,455,953 Authorization system for obtaining in single step both identification and access rights of client to server directly from encrypted authorization ticket 409 1993
 
RAYTHEON COMPANY (1)
5,283,828 Architecture for utilizing coprocessing systems to increase performance in security adapted computer systems 65 1993
 
ROUND ROCK RESEARCH, LLC (1)
5,577,209 Apparatus and method for providing multi-level security for communication among computers and terminals on a network 265 1994
 
SECURE COMPUTING CORPORATION (1)
4,713,753 Secure data processing system architecture with format control 311 1985
 
SYBASE, INC. (1)
5,572,673 Secure multi-level system for executing stored procedures 160 1993
 
TANDEM COMPUTERS INCORPORATED (1)
5,265,221 Access restriction facility method and apparatus 135 1992
 
Other [Check patent profile for assignment information] (1)
5,121,345 System and method for protecting integrity of computer data and software 143 1990

Patent Citation Ranking

Forward Cite Landscape

Patent Info (Count) # Cites Year
 
INVENSYS SYSTEMS, INC. (17)
7,272,815 Methods and apparatus for control configuration with versioning, security, composite blocks, edit selection, object swapping, formulaic values and other aspects 166 2000
7,778,717 Component object model communication method for a control system 11 2003
7,761,923 Process control methods and apparatus for intrusion detection, protection and network hardening 2 2005
8,368,640 Process control configuration system with connection validation and configuration 0 2006
7,860,857 Digital data processing apparatus and methods for improving plant performance 1 2007
8,090,452 Methods and apparatus for control using control devices that provide a virtual machine environment and that communicate via an IP network 6 2007
8,023,500 Methods for process control with change updates 1 2007
7,890,927 Apparatus and method for configuring and editing a control system with live data 20 2008
8,229,579 Control systems and methods with versioning 4 2008
8,060,222 Control system configurator and methods with object characteristic swapping 4 2008
8,028,272 Control system configurator and methods with edit selection 3 2008
8,028,275 Control systems and methods with smart blocks 4 2008
7,984,420 Control systems and methods with composite blocks 11 2008
8,225,271 Apparatus for control systems with objects that are associated with live data 9 2008
8,127,060 Methods and apparatus for control configuration with control objects that are fieldbus protocol-aware 31 2009
8,594,814 Systems and methods for immersive interaction with actual and/or simulated facilities for process, environmental and industrial control 0 2009
8,463,964 Methods and apparatus for control configuration with enhanced change-tracking 1 2010
 
FINJAN, INC. (13)
6,167,520 System and method for protecting a client during runtime from hostile downloadables 115 1997
6,154,844 System and method for attaching a downloadable security profile to a downloadable 258 1997
6,804,780 System and method for protecting a computer and a network from hostile downloadables 85 2000
6,480,962 System and method for protecting a client during runtime from hostile downloadables 74 2000
7,058,822 Malicious mobile code runtime monitoring system and methods 67 2001
6,965,968 Policy-based caching 102 2003
7,418,731 Method and system for caching at secure gateways 11 2004
8,225,408 Method and system for adaptive rule-based content scanners 1 2004
7,975,305 Method and system for adaptive rule-based content scanners for desktop computers 8 2004
7,647,633 Malicious mobile code runtime monitoring system and methods 5 2005
7,613,926 Method and system for protecting a computer and a network from hostile downloadables 5 2006
8,079,086 Malicious mobile code runtime monitoring system and methods 2 2009
8,677,494 Malicious mobile code runtime monitoring system and methods 0 2011
 
COMCAST CABLE COMMUNICATIONS, LLC (10)
6,690,411 Security system 54 1999
8,520,068 Video security system 2 2001
7,015,806 Distributed monitoring for a video security system 59 2001
7,130,383 Lifestyle multimedia security system 46 2003
7,409,045 Lifestyle multimedia security system 11 2003
7,120,232 Lifestyle multimedia security system 17 2003
6,930,599 Security system 49 2003
7,120,233 Lifestyle multimedia security system 19 2003
7,103,152 Lifestyle multimedia security system 24 2003
8,144,836 Lifestyle multimedia security system 0 2007
 
INTERNATIONAL BUSINESS MACHINES CORPORATION (7)
7,370,366 Data management system and method 16 2001
7,698,441 Intelligent use of user data to pre-emptively prevent execution of a query violating access controls 3 2002
6,928,554 Method of query return data analysis for early warning indicators of possible security exposures 7 2002
7,392,246 Method for implementing access control for queries to a content management system 0 2003
7,890,530 Method and system for controlling access to data via a data-centric security model 2 2008
7,818,581 Data management system 0 2008
7,761,443 Implementing access control for queries to a content management system 4 2008
 
SILICON GRAPHICS INTERNATIONAL, CORP. (7)
7,640,582 Clustered filesystem for mix of trusted and untrusted nodes 3 2003
8,396,908 Multi-class heterogeneous clients in a clustered filesystem 1 2009
8,151,347 Clustered file system for mix of trusted and untrusted nodes 1 2009
8,683,021 Clustered filesystem with membership version support 0 2011
8,578,478 Clustered file systems for mix of trusted and untrusted nodes 0 2012
8,527,463 Clustered filesystem with data volume snapshot maintenance 0 2012
8,838,658 Multi-class heterogeneous clients in a clustered filesystem 0 2013
 
ADARA NETWORKS, INC. (6)
7,725,596 System and method for resolving network layer anycast addresses to network layer unicast addresses 11 2001
7,577,754 System and method for controlling access to content carried in a caching architecture 13 2001
7,565,450 System and method for using a mapping between client addresses and addresses of caches to support content delivery 33 2001
7,343,422 System and method for using uniform resource locators to map application layer content names to network layer anycast addresses 28 2001
8,433,787 System and method for directing clients to optimal servers in computer networks 0 2009
8,423,666 System and method for directing clients to optimal servers in computer networks 0 2009
 
TRUSTWARE INTERNATIONAL LIMITED (5)
7,363,493 Method for protecting computer programs and data from hostile code 4 2002
8,078,886 Method for protecting computer programs and data from hostile code 3 2009
8,850,428 User transparent virtualization method for protecting computer programs and data from hostile code 0 2010
8,484,483 Method for protecting computer programs and data from hostile code 1 2011
8,838,994 Method for protecting computer programs and data from hostile code 0 2013
 
STRAGENT, LLC (3)
8,204,945 Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail 3 2008
8,272,060 Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses 1 2010
8,166,549 Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses 0 2010
 
Bit 9, Inc. (2)
8,272,058 Centralized timed analysis in a network security system 8 2005
7,895,651 Content tracking in a network security system 9 2005
 
HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P. (2)
6,026,402 Process restriction within file system hierarchies 92 1998
7,167,987 Use of biometrics to provide physical and logic access to computer devices 4 2001
 
ONLINE VIDEO NETWORK, INC. (2)
7,908,337 System and method for using network layer uniform resource locator routing to locate the closest server carrying specific content 6 2001
8,572,214 System and method for discovering information objects and information object repositories in computer networks 0 2006
 
ORACLE INTERNATIONAL CORPORATION (2)
8,316,051 Techniques for adding multiple security policies to a database system 7 2001
8,510,334 Lock manager on disk 0 2009
 
Promisec Ltd. (2)
8,566,939 Method and device for scanning a plurality of computerized devices connected to a network 0 2006
8,544,099 Method and device for questioning a plurality of computerized devices 0 2010
 
@Seurity Broadband Corp. (1)
7,119,609 Lifestyle multimedia security system 8 2003
 
ABSIO CORPORATION (1)
8,627,104 Secure data storage 0 2011
 
BULL SAS (1)
8,627,406 Device for protection of the data and executable codes of a computer system 0 2007
 
CANON KABUSHIKI KAISHA (1)
7,834,890 Information processing method and image processing method 2 2004
 
CENUS TECHNOLOGIES, INC. (1)
7,162,539 System and method for discovering information objects and information object repositories in computer networks 30 2001
 
CISCO TECHNOLOGY, INC. (1)
7,516,475 Method and apparatus for managing security policies on a network 6 2002
 
COMPUTER ASSOCIATES THINK, INC. (1)
7,383,569 Method and agent for the protection against the unauthorized use of computer resources 3 1999
 
INDEPENDENT SECURITY EVALUATORS, LLC (1)
7,840,795 Method and apparatus for limiting access to sensitive data 2 2007
 
MCAFEE, INC. (1)
6,453,419 System and method for implementing a security policy 106 1998
 
MICROSOFT CORPORATION (1)
7,730,318 Integration of high-assurance features into an application through application factoring 5 2003
 
PROMISEC LTD. ISRAELI COMPANY, OF (1)
7,752,671 Method and device for questioning a plurality of computerized devices 2 2005
 
ROCHE DIAGNOSTICS OPERATIONS, INC. (1)
8,566,818 Method and system for configuring a consolidated software application 0 2007
 
SAFENET DATA SECURITY (ISRAEL) LTD. (1)
7,047,369 Software application environment 10 1997
 
SUN MICROSYSTEMS, INC. (1)
8,032,500 Dynamic sending policies and client-side disaster recovery mechanism for messaging communication 0 2005
 
The United States of America as represented by the Secretary of Commerce (1)
6,023,765 Implementation of role-based access control in multi-level secure systems 164 1997
 
TREND MICRO INCORPORATED (1)
7,454,788 Method for adding and enforcing enhanced authorization policy on devices in computer operation systems 1 2001
 
TRIGENCE CORP. (1)
7,757,291 Malware containment by application encapsulation 3 2006
 
Other [Check patent profile for assignment information] (1)
6,226,745 Information sharing system and method with requester dependent sharing and security rules 148 1998