US Patent No: 5,859,966

Number of patents in Portfolio can not be more than 2000

Security system for computer systems

1 Status Updates

Stats

ATTORNEY / AGENT: (SPONSORED)

Importance

Loading Importance Indicators... loading....

Abstract

See full text

A security system for a computer system imposes specific limitations on who has access to the computer system and to exactly what operations and data. Viruses are securely contained and prevented from expanding into areas where they can destroy stored programs or data. Viruses are also prevented from being introduced or executed in a large number of instances. The totality of computer functions is broken up into a set of events with an associated set of capabilities and different capabilities are assigned to each user depending on the particular job which that user is to do on the computer system. Also, security labels are placed on each data file and other system resources, and on each process. Further, a range of hierarchy/category labels (MAC labels) is assigned to each process to define a sub-lattice in which special capabilities can apply. Further, the hierarchy of labels is divided into a small number (for example 3) of regions, and a process operating in one region is generally not allowed to cross over into another region. Further, an owner of a data file is allowed to place restrictions on the file so that only users who posses certain privileges can gain access to the file.

Loading the Abstract Image... loading....

First Claim

See full text

Family

Loading Family data... loading....

Patent Owner(s)

Patent OwnerAddressTotal Patents
DATA GENERAL CORPORATIONWESTBORO, MA52

International Classification(s)

  • [Classification Symbol]
  • [Patents Count]

Inventor(s)

Inventor Name Address # of filed Patents Total Citations
Hayman, Kenneth John Durham, NC 3 156
Keene, Michael Donovan Coral Springs, FL 2 113
Lewine, Eric Scott Apex, NC 2 109
Meyers, William James Research Triangle Park, NC 1 109
Spencer, Jon Frederick Raleigh, NC 1 109
Taylor, II Millard Cranford Chapel Hill, NC 1 109

Cited Art Landscape

Patent Info (Count) # Cites Year
 
Other [Check patent profile for assignment information] (1)
* 5,121,345 System and method for protecting integrity of computer data and software 152 1990
 
SYBASE, INC. (1)
* 5,572,673 Secure multi-level system for executing stored procedures 165 1993
 
HUGHES SIMULATION SYSTEMS, INC. (1)
* 5,263,147 System for providing high security for personal computers and workstations 80 1991
 
SECURE COMPUTING CORPORATION (1)
* 4,713,753 Secure data processing system architecture with format control 318 1985
 
Digital Corporation (1)
* 5,204,961 Computer network operating with multilevel hierarchical security with selectable common trust realms and corresponding security protocols 257 1990
 
IPG HEALTHCARE 501 LIMITED (1)
* 5,335,346 Access control policies for an object oriented database, including access control lists which span across object boundaries 298 1991
 
HUGHES AIRCRAFT COMPANY (1)
* 5,504,814 Efficient security kernel for the 80960 extended architecture 241 1994
 
TANDEM COMPUTERS INCORPORATED (1)
* 5,265,221 Access restriction facility method and apparatus 149 1992
 
INTERNATIONAL COMPUTERS LIMITED (1)
* 5,339,403 Access control in a distributed computer system 76 1993
 
ROUND ROCK RESEARCH, LLC (1)
* 5,577,209 Apparatus and method for providing multi-level security for communication among computers and terminals on a network 287 1994
 
GREEN WIRELESS LLC (2)
* 5,355,474 System for multilevel secure database management using a knowledge base with release-based and other security constraints for query, response and update modification 257 1991
* 5,481,700 Apparatus for design of a multilevel secure database management system based on a multilevel logic programming system 116 1991
 
INTEL CORPORATION (1)
* 4,442,484 Microprocessor memory management and protection mechanism 175 1980
 
INTERSIL CORPORATION (1)
* 5,469,556 Resource access security system for controlling access to resources of a data processing system 53 1992
 
GENSYM CORPORATION (1)
* 5,432,934 Access restrictions as a means of configuring a user interface and making an application secure 47 1993
 
RAYTHEON COMPANY (1)
* 5,283,828 Architecture for utilizing coprocessing systems to increase performance in security adapted computer systems 66 1993
 
RAKUTEN, INC. (1)
* 5,455,953 Authorization system for obtaining in single step both identification and access rights of client to server directly from encrypted authorization ticket 442 1993
 
AT&T CORP. (1)
* 5,375,244 System and method for granting access to a resource 183 1992
* Cited By Examiner

Patent Citation Ranking

Forward Cite Landscape

Patent Info (Count) # Cites Year
 
Other [Check patent profile for assignment information] (6)
* 6,226,745 Information sharing system and method with requester dependent sharing and security rules 156 1998
* 2002/0007,413 System and method for using a mapping between client addresses and addresses of caches to support content delivery 177 2001
* 2001/0023,486 Security management system and security managing method 21 2001
* 2006/0179,434 Software application environment 1 2006
* 2008/0222,429 DATA MANAGEMENT SYSTEM 1 2008
* 2008/0201,777 Method and Agent for the Protection Against the Unauthorized Use of Computer Resources 0 2008
 
TREND MICRO INCORPORATED (1)
* 7,454,788 Method for adding and enforcing enhanced authorization policy on devices in computer operation systems 1 2001
 
ADARA NETWORKS, INC. (12)
7,725,596 System and method for resolving network layer anycast addresses to network layer unicast addresses 21 2001
* 7,577,754 System and method for controlling access to content carried in a caching architecture 19 2001
7,565,450 System and method for using a mapping between client addresses and addresses of caches to support content delivery 47 2001
* 2009/0013,083 SYSTEM AND METHOD FOR USING A MAPPING BETWEEN CLIENT ADDRESSES AND ADDRESSES OF CACHES TO SUPPORT CONTENT DELIVERY 19 2001
7,343,422 System and method for using uniform resource locators to map application layer content names to network layer anycast addresses 43 2001
* 2002/0026,511 System and method for controlling access to content carried in a caching architecture 66 2001
* 2002/0016,860 System and method for resolving network layer anycast addresses to network layer unicast addresses 31 2001
* 2002/0010,737 System and method for using uniform resource locators to map application layer content names to network layer anycast addresses 12 2001
8,433,787 System and method for directing clients to optimal servers in computer networks 0 2009
8,423,666 System and method for directing clients to optimal servers in computer networks 1 2009
* 2011/0093,586 SYSTEM AND METHOD FOR DIRECTING CLIENTS TO OPTIMAL SERVERS IN COMPUTER NETWORKS 5 2009
* 2010/0198,913 SYSTEM AND METHOD DIRECTING CLIENTS TO OPTIMAL SERVERS IN COMPUTER NETWORKS 6 2009
 
ONLINE VIDEO NETWORK, INC. (4)
7,908,337 System and method for using network layer uniform resource locator routing to locate the closest server carrying specific content 31 2001
* 2002/0004,846 System and method for using network layer uniform resource locator routing to locate the closest server carrying specific content 67 2001
8,572,214 System and method for discovering information objects and information object repositories in computer networks 21 2006
* 2006/0271,705 System and method for discovering information objects and information object repositories in computer networks 37 2006
 
HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP (3)
* 6,026,402 Process restriction within file system hierarchies 99 1998
* 7,167,987 Use of biometrics to provide physical and logic access to computer devices 4 2001
* 2003/0046,553 Use of biometrics to provide physical and logic access to computer devices 0 2001
 
NULLRING, INC (2)
* 7,840,795 Method and apparatus for limiting access to sensitive data 2 2007
* 2008/0091,934 Method and apparatus for limiting access to sensitive data 13 2007
 
AZURE NETWORKS, LLC (3)
* 2004/0073,617 Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail 146 2003
* 2010/0205,671 HASH-BASED SYSTEMS AND METHODS FOR DETECTING AND PREVENTING TRANSMISSION OF POLYMORPHIC NETWORK WORMS AND VIRUSES 2 2010
* 2010/0205,265 HASH-BASED SYSTEMS AND METHODS FOR DETECTING AND PREVENTING TRANSMISSION OF UNWANTED E-MAIL 9 2010
 
The United States of America as represented by the Secretary of Commerce (1)
* 6,023,765 Implementation of role-based access control in multi-level secure systems 196 1997
 
PROMISEC LTD. (4)
8,566,939 Method and device for scanning a plurality of computerized devices connected to a network 0 2006
* 2006/0184,682 Method and device for scanning a plurality of computerized devices connected to a network 17 2006
8,544,099 Method and device for questioning a plurality of computerized devices 0 2010
* 2010/0235,920 METHOD AND DEVICE FOR QUESTIONING A PLURALITY OF COMPUTERIZED DEVICES 1 2010
 
TRIGENCE CORP. (2)
* 7,757,291 Malware containment by application encapsulation 5 2006
* 2006/0265,761 Malware containment by application encapsulation 19 2006
 
@Seurity Broadband Corp. (1)
7,119,609 Lifestyle multimedia security system 18 2003
 
PROMISEC LTD. ISRAELI COMPANY, OF (2)
7,752,671 Method and device for questioning a plurality of computerized devices 4 2005
* 2006/0075,128 Method and device for questioning a plurality of computerized devices 2 2005
 
TVIIM, LLC (1)
* 2005/0171,737 Method and apparatus for assessing the security of a computer system 5 2005
 
BULL SAS (2)
* 8,627,406 Device for protection of the data and executable codes of a computer system 0 2007
* 2009/0037,730 Device For Protection of the Data and Executable Codes of a Computer System 0 2007
 
ROCHE DIABETES CARE, INC. (2)
* 8,566,818 Method and system for configuring a consolidated software application 1 2007
* 2009/0150,831 Method and system for configuring a consolidated software application 5 2007
 
ORACLE INTERNATIONAL CORPORATION (3)
* 8,316,051 Techniques for adding multiple security policies to a database system 8 2001
8,510,334 Lock manager on disk 0 2009
* 2011/0106,778 LOCK MANAGER ON DISK 4 2009
 
FINJAN, INC. (21)
* 6,167,520 System and method for protecting a client during runtime from hostile downloadables 129 1997
* 6,154,844 System and method for attaching a downloadable security profile to a downloadable 289 1997
6,804,780 System and method for protecting a computer and a network from hostile downloadables 113 2000
6,480,962 System and method for protecting a client during runtime from hostile downloadables 84 2000
7,058,822 Malicious mobile code runtime monitoring system and methods 94 2001
6,965,968 Policy-based caching 140 2003
7,418,731 Method and system for caching at secure gateways 15 2004
* 2005/0005,107 Method and system for caching at secure gateways 21 2004
8,225,408 Method and system for adaptive rule-based content scanners 9 2004
* 2005/0108,554 Method and system for adaptive rule-based content scanners 33 2004
7,975,305 Method and system for adaptive rule-based content scanners for desktop computers 21 2004
* 2005/0240,999 Method and system for adaptive rule-based content scanners for desktop computers 78 2004
7,647,633 Malicious mobile code runtime monitoring system and methods 12 2005
7,613,926 Method and system for protecting a computer and a network from hostile downloadables 18 2006
* 2006/0149,968 Method and system for protecting a computer and a network from hostile downloadables 18 2006
8,079,086 Malicious mobile code runtime monitoring system and methods 13 2009
8,677,494 Malicious mobile code runtime monitoring system and methods 4 2011
9,444,844 Malicious mobile code runtime monitoring system and methods 0 2014
9,189,621 Malicious mobile code runtime monitoring system and methods 1 2015
9,141,786 Malicious mobile code runtime monitoring system and methods 1 2015
9,219,755 Malicious mobile code runtime monitoring system and methods 1 2015
 
STRAGENT, LLC (3)
8,204,945 Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail 6 2008
8,272,060 Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses 3 2010
8,166,549 Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses 0 2010
 
MICROSOFT TECHNOLOGY LICENSING, LLC (2)
* 7,730,318 Integration of high-assurance features into an application through application factoring 8 2003
* 2005/0091,661 Integration of high-assurance features into an application through application factoring 9 2003
 
Bit9, Inc. (1)
8,984,636 Content extractor and analysis system 0 2005
 
Canon Kabushiki Kaisha (2)
* 7,834,890 Information processing method and image processing method 2 2004
* 2005/0131,857 Information processing method and image processing method 7 2004
 
BEA SYSTEMS, INC. (1)
* 2009/0178,111 SYSTEM AND METHOD FOR MAINTAINING SECURITY IN A DISTRIBUTED COMPUTER NETWORK 56 2009
 
INTERNATIONAL BUSINESS MACHINES CORPORATION (14)
* 7,370,366 Data management system and method 17 2001
* 2003/0097,583 Data management system and method 11 2001
7,698,441 Intelligent use of user data to pre-emptively prevent execution of a query violating access controls 4 2002
* 2004/0068,661 Intelligent use of user data to pre-emptively prevent execution of a query violating access controls 11 2002
6,928,554 Method of query return data analysis for early warning indicators of possible security exposures 10 2002
* 2004/0088,561 Method of query return data analysis for early warning indicators of possible security exposures 6 2002
* 2004/0093,514 Method for automatically isolating worm and hacker attacks within a local area network 6 2002
7,392,246 Method for implementing access control for queries to a content management system 2 2003
* 2004/0162,825 System and method for implementing access control for queries to a content management system 2 2003
* 7,890,530 Method and system for controlling access to data via a data-centric security model 4 2008
* 2009/0198,697 METHOD AND SYSTEM FOR CONTROLLING ACCESS TO DATA VIA A DATA-CENTRIC SECURITY MODEL 6 2008
7,818,581 Data management system 0 2008
7,761,443 Implementing access control for queries to a content management system 5 2008
* 2008/0222,708 IMPLEMENTING ACCESS CONTROL FOR QUERIES TO A CONTENT MANAGEMENT SYSTEM 2 2008
 
CENUS TECHNOLOGIES, INC. (2)
7,162,539 System and method for discovering information objects and information object repositories in computer networks 59 2001
* 2001/0056,416 System and method for discovering information objects and information object repositories in computer networks 138 2001
 
Absio Corporation (2)
8,627,104 Secure data storage 1 2011
9,104,888 Secure data storage 0 2013
 
TRUSTWARE 101 LIMITED (9)
* 7,363,493 Method for protecting computer programs and data from hostile code 13 2002
* 2002/0147,923 Method for protecting computer programs and data from hostile code 13 2002
8,078,886 Method for protecting computer programs and data from hostile code 7 2009
* 2010/0058,472 METHOD FOR PROTECTING COMPUTER PROGRAMS AND DATA FROM HOSTILE CODE 3 2009
8,850,428 User transparent virtualization method for protecting computer programs and data from hostile code 2 2010
8,484,483 Method for protecting computer programs and data from hostile code 5 2011
8,838,994 Method for protecting computer programs and data from hostile code 1 2013
9,396,326 User transparent virtualization method for protecting computer programs and data from hostile code 0 2014
9,390,262 Method for protecting computer programs and data from hostile code 0 2014
 
Bit 9, Inc. (6)
8,272,058 Centralized timed analysis in a network security system 20 2005
7,895,651 Content tracking in a network security system 17 2005
* 2007/0028,303 Content tracking in a network security system 110 2005
* 2007/0028,110 Content extractor and analysis system 24 2005
* 2007/0028,291 Parametric content control in a network security system 29 2005
* 2007/0028,304 Centralized timed analysis in a network security system 108 2005
 
CISCO TECHNOLOGY, INC. (1)
7,516,475 Method and apparatus for managing security policies on a network 9 2002
 
SILICON GRAPHICS INTERNATIONAL CORP. (12)
* 7,640,582 Clustered filesystem for mix of trusted and untrusted nodes 8 2003
8,396,908 Multi-class heterogeneous clients in a clustered filesystem 1 2009
* 2010/0146,045 Multi-Class Heterogeneous Clients in a Clustered Filesystem 4 2009
8,151,347 Clustered file system for mix of trusted and untrusted nodes 2 2009
* 2010/0154,054 Clustered File System for Mix of Trusted and Untrusted Nodes 8 2009
8,683,021 Clustered filesystem with membership version support 0 2011
9,275,058 Relocation of metadata server with outstanding DMAPI requests 0 2011
8,578,478 Clustered file systems for mix of trusted and untrusted nodes 1 2012
8,527,463 Clustered filesystem with data volume snapshot maintenance 1 2012
8,838,658 Multi-class heterogeneous clients in a clustered filesystem 0 2013
9,020,897 Clustered filesystem with data volume snapshot 0 2013
9,405,606 Clustered filesystems for mix of trusted and untrusted nodes 0 2013
 
SILICON GRAPHICS, INC. (1)
* 2003/0028,514 Extended attribute caching in clustered filesystem 103 2002
 
COMPUTER ASSOCIATES THINK, INC. (1)
* 7,383,569 Method and agent for the protection against the unauthorized use of computer resources 4 1999
 
COMCAST CABLE COMMUNICATIONS, LLC (21)
6,690,411 Security system 72 1999
8,520,068 Video security system 19 2001
* 2002/0147,982 Video security system 72 2001
7,015,806 Distributed monitoring for a video security system 95 2001
* 2003/0062,997 Distributed monitoring for a video security system 47 2001
7,130,383 Lifestyle multimedia security system 70 2003
7,409,045 Lifestyle multimedia security system 20 2003
7,120,232 Lifestyle multimedia security system 30 2003
6,930,599 Security system 64 2003
* 2004/0085,202 Security system 1 2003
* 2004/0086,089 Lifestyle multimedia security system 6 2003
* 2004/0041,910 Lifestyle multimedia security system 8 2003
7,120,233 Lifestyle multimedia security system 32 2003
7,103,152 Lifestyle multimedia security system 45 2003
* 2004/0086,091 Lifestyle multimedia security system 20 2003
* 2004/0086,090 Lifestyle multimedia security system 11 2003
* 2004/0024,851 Lifestyle multimedia security system 15 2003
8,144,836 Lifestyle multimedia security system 2 2007
* 2008/0048,861 LIFESTYLE MULTIMEDIA SECURITY SYSTEM 31 2007
8,953,749 Lifestyle multimedia security system 0 2012
9,300,921 Video security systems and methods 0 2013
 
SUN MICROSYSTEMS, INC. (1)
* 8,032,500 Dynamic sending policies and client-side disaster recovery mechanism for messaging communication 0 2005
 
ENTROPIA, INC. (1)
* 2002/0065,874 Method and process for virtualizing network interfaces 1 2000
 
SILVERBACK TECHNOLOGIES, INC. (1)
* 2002/0129,000 XML file system 27 2001
 
INVENSYS SYSTEMS, INC. (32)
* 7,272,815 Methods and apparatus for control configuration with versioning, security, composite blocks, edit selection, object swapping, formulaic values and other aspects 211 2000
7,778,717 Component object model communication method for a control system 14 2003
* 2003/0225,462 Component object model communication method for process, factory-floor, environmental, computer aided manufacturing-based or other control system 7 2003
* 2003/0217,054 Methods and apparatus for process, factory-floor, environmental, computer aided manufacturing-based or other control system with real-time data distribution 5 2003
7,761,923 Process control methods and apparatus for intrusion detection, protection and network hardening 12 2005
8,368,640 Process control configuration system with connection validation and configuration 0 2006
* 2006/0206,860 Process control configuration system with connection validation and configuration 50 2006
7,860,857 Digital data processing apparatus and methods for improving plant performance 2 2007
8,090,452 Methods and apparatus for control using control devices that provide a virtual machine environment and that communicate via an IP network 15 2007
8,023,500 Methods for process control with change updates 1 2007
* 2008/0134,215 METHODS FOR PROCESS CONTROL WITH CHANGE UPDATES 13 2007
7,890,927 Apparatus and method for configuring and editing a control system with live data 23 2008
* 2009/0125,130 CONTROL SYSTEM EDITOR AND METHODS WITH LIVE DATA 25 2008
8,229,579 Control systems and methods with versioning 10 2008
8,060,222 Control system configurator and methods with object characteristic swapping 7 2008
8,028,272 Control system configurator and methods with edit selection 15 2008
8,028,275 Control systems and methods with smart blocks 6 2008
7,984,420 Control systems and methods with composite blocks 13 2008
* 2009/0125,128 Control systems and methods with versioning 33 2008
* 2009/0125,129 CONTROL SYSTEM CONFIGURATOR AND METHODS WITH EDIT SELECTION 21 2008
* 2009/0125,131 CONTROL SYSTEMS AND METHODS WITH COMPOSITE BLOCKS 23 2008
8,225,271 Apparatus for control systems with objects that are associated with live data 15 2008
* 2009/0132,996 Apparatus for control systems with objects that are associated with live data 32 2008
* 2009/0164,031 METHODS AND APPARATUS FOR CONTROL USING CONTROL DEVICES THAT COMMUNICATE VIA AN IP NETWORK 21 2008
* 2009/0094,326 CONTROL SYSTEM METHODS AND APPARATUS WITH SERVICES 13 2008
8,127,060 Methods and apparatus for control configuration with control objects that are fieldbus protocol-aware 39 2009
8,594,814 Systems and methods for immersive interaction with actual and/or simulated facilities for process, environmental and industrial control 1 2009
* 2009/0259,751 METHODS AND APPARATUS FOR MONITORING AND/OR CONTROL OF PROCESS CONTROL APPARATUS 10 2009
* 2010/0076,604 METHOD AND APPARATUS FOR CONTROL USING CONTROL DEVICES THAT PROVIDE A VIRTUAL MACHINE ENVIRONMENT AND THAT COMMUNICATE VIA AN IP NETWORK 19 2009
* 2010/0223,593 METHODS AND APPARATUS FOR CONTROL CONFIGURATION WITH OBJECT HIERARCHY, VERSIONING, CHANGE RECORDS, OBJECT COMPARISON, AND OTHER ASPECTS 19 2010
8,463,964 Methods and apparatus for control configuration with enhanced change-tracking 1 2010
* 2011/0093,098 METHODS AND APPARATUS FOR CONTROL CONFIGURATION WITH ENHANCED CHANGE-TRACKING 14 2010
 
SAFENET DATA SECURITY (ISRAEL) LTD. (1)
* 7,047,369 Software application environment 14 1997
 
MCAFEE, INC. (1)
* 6,453,419 System and method for implementing a security policy 127 1998
* Cited By Examiner