Supercharge Your Innovation With Domain-Expert AI Agents!

Method for providing protected access of corresponding program

An application, protected technology, used in instruments, digital data authentication, computers, etc., to solve problems such as attacks

Active Publication Date: 2012-05-02
MICROSOFT TECH LICENSING LLC
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Access to these services and data creates a security hole in the application through which a malicious user can attack the application and / or steal confidential data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for providing protected access of corresponding program
  • Method for providing protected access of corresponding program
  • Method for providing protected access of corresponding program

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] Embodiments provided herein provide a framework or model for providing protected access to applications. figure 1 Block diagrams are provided showing elements of the general interactions contemplated in the embodiments discussed below.

[0019] exist figure 1 In , an application or user located at source endpoint 100 , source endpoint 101 , or source endpoint 103 accesses protected application 102 . Source endpoints 100 and 103 are considered external endpoints because they are not trusted to provide specific information. Source endpoint 100 accesses protected application 102 through network 106 and integration layer 108 . Source endpoint 103 accesses protected application 102 through integration layer 108 . Source endpoint 101 also accesses protected application 102 through integration layer 108 , but is trusted by protected application 102 .

[0020] Integration layer 108 authenticates users who submit messages to integration layer 108 and passes the messages to o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A security model is provided that controls access to a secured application. Under the security model, a submitting user is authenticated when the user submits a message to have the application perform an action. The application is then used to determine if the submitting user is authorized to submit messages on behalf of a source endpoint stored in the message. A method in the application is theninvoked to perform the action while impersonating a source endpoint user stored in the message.

Description

technical field [0001] The present invention relates to protected access to applications. Background technique [0002] Business-to-business (B2B) integration scenarios involve applications or users in one enterprise being able to access services and data provided by applications in another enterprise. In an application-to-application (A2A) scenario, an application in one enterprise accesses services and data in another application in the same enterprise. Access to these services and data creates a security hole in the application through which a malicious user can attack the application and / or steal confidential data. [0003] The above discussion is provided as general background information only, and is not intended to be used as an aid in determining the scope of the claimed subject matter. Contents of the invention [0004] Provides a security model that controls access to protected applications. Under this model, when a user submits a message to cause an applicati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/00G06F15/00
CPCH04L63/126G06F21/41H04L63/0884H04L67/28H04L67/02H04L67/2804G06F21/445G06F21/6272G06F21/6218H04L67/56
Inventor V·库马A·斯里尼瓦桑J·科默斯科特
Owner MICROSOFT TECH LICENSING LLC
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More