Security critical data containers

A security and data technology, applied in the field of computer systems, can solve problems such as complexity and security group burden, and achieve the effect of reducing the number

Inactive Publication Date: 2006-08-09
MICROSOFT TECH LICENSING LLC
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] However, despite the high value, marking this code and data as critical leads to a complex code review process that can burden security groups with many critical methods that need to review code

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security critical data containers
  • Security critical data containers
  • Security critical data containers

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] Exemplary Operating Environment

[0019] Figure 1 illustrates one example of a computing system environment 100 suitable for implementing the present invention. Computing system environment 100 is only one example of a suitable computing environment and is not intended to suggest any limitation as to the scope of use or functionality of the invention. Neither should the computing environment 100 be interpreted as having any dependency or requirement relating to any one or combination of components illustrated in the exemplary operating environment 100 .

[0020] The invention is operational with numerous other general purpose or special purpose computing system environments or configurations. Well-known computing systems, environments and / or configurations suitable for use with the present invention include, but are not limited to: personal computers, server computers, handheld or laptop devices, tablet devices, multiprocessor systems, microprocessor-based systems, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Described are security critical data containers for platform code, comprising a Get container and Set container that allow data to be marked as security critical for critical usage of that data, but left unmarked for non-critical usage. The number of critical methods in the code is reduced, facilitating better code analysis. A container's method may be marked as security critical, with the only access to the data via the method. By using a generic class for a Get container, access to the critical data only occurs through the property on the class, which is marked as critical. The field pointing to the generic class instance need not be critical, whereby initialization or existence checking may remain non-critical. The Set container handles security critical situations such as data that controls whether code can elevate permissions; a set method is marked as critical, while other methods can be accessed by non-critical code.

Description

[0001] Copyright Notice [0002] Portions of the disclosure of this patent document contain material that is subject to copyright protection. The copyright owner has no objection to the facsimile reproduction by anyone of this patent document or the patent disclosure, as it appears in the (US) Patent and Trademark Office files or records, but all copyrights are reserved regardless. technical field [0003] The present invention relates generally to computer systems, and more particularly to computer system security. Background technique [0004] In contemporary computing, computer applications and other code can be downloaded and installed from the Internet. When downloaded from an unknown or untrusted source, this code could be intentionally malicious, or could be capable of compromising important data or providing unauthorized access to it. However, since there are many situations in which computer users benefit from the ability to download code and execute it without pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00G06F1/00
CPCG06F21/577G06F21/57G06F21/6227Y10S707/99939G06F21/52G06F9/00G06F15/00
Inventor M·A·阿尔卡扎V·R·P·塔玛纳
Owner MICROSOFT TECH LICENSING LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products