Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and apparatus for protection domain based security

A protection domain and security technology, applied in the field of protection domain-based security and devices

Active Publication Date: 2007-07-25
SUN MICROSYSTEMS INC
View PDF0 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this check is usually limited to the identity based on the application client

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for protection domain based security
  • Method and apparatus for protection domain based security
  • Method and apparatus for protection domain based security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] The systems and methods described herein relate to protection domain-based security using context isolation. For purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the various systems and methods. It is evident, however, that the systems and methods described herein may be practiced without these specific details. Accordingly, the specification and drawings are to be regarded as illustrative rather than restrictive.

[0017] Security Model Overview

[0018] A security model according to an embodiment of the present invention provides a protection domain based security model with a context isolation based security model. A security model may be provided for a smart card platform. However, the security model is not limited to smart card platforms. One example of a smart card platform is the Java(R) Card platform, but the invention is not limited thereto.

[0019] In one embodiment, successfully installed a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A first application instance is associated with a protection domain based on credentials (e.g.: a signed certificate) associated with a set of application code that, when executed, gives rise to the application instance. The first application instance executes in a first execution context. An indication is received that the first application instance seeks access to protected functionality associated with a second execution context. In response to receiving the indication, a determination is made as to whether the first application instance has permission to access the protected functionality. The determination is made by determining the protection domain with which the first application instance is associated, and determining if the protection domain with which the first application instance is associated is in the set of one or more protection domains.

Description

Background technique [0001] There are many computing and runtime environments that have the need to interact with each other and with other software, such as libraries. A firewall or the like is a technology for protecting applications or other software. One type of firewall is to execute each application (or application package) in its own execution context. For example, some computing environments support isolation of application execution contexts. [0002] The isolation of an application's execution context means that an application cannot access objects or data owned by an application in another context unless the other application explicitly provides an interface for access. Context isolation may be enforced by a firewall. For example, an application executing in the same context as an object instance created in (its own context) is allowed to access the object instance. Applications can provide interfaces for other applications to access in the form of shareable int...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/22G06F9/46G06F21/74
Inventor 蒂埃里·维奥洛坦若尔·S·拉维尚卡尔马特·希尔
Owner SUN MICROSYSTEMS INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products