Unlock instant, AI-driven research and patent intelligence for your innovation.

Method, system and apparatus for generating security permissions for applications

An application generation and security technology, used in computer security devices, special data processing applications, instruments, etc.

Inactive Publication Date: 2017-03-29
INT BUSINESS MASCH CORP
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Also, the format of these policies is extremely sensitive to incorrect formatting, and they have slightly different formats for each enterprise application type

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, system and apparatus for generating security permissions for applications
  • Method, system and apparatus for generating security permissions for applications
  • Method, system and apparatus for generating security permissions for applications

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] In the following detailed description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. However, it will be understood by those skilled in the art that the present invention may be practiced without these specific details. In other instances, well-known methods, procedures, and components have not been described in detail so as not to obscure the present invention.

[0024] Methods and systems are described that provide a tool that a user can run once that computes possible security exceptions in an application and their corresponding components. The user can then confirm that all of these exceptions are valid so that the tool proceeds and generates the required security policy file in the correct format. Moreover, the required security policy files can be correctly calculated to match the application hierarchy, which enables their application to enable Java2 security.

[0025] The described methods and sys...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Methods and systems for generating security permissions for applications are provided. The method includes: performing static analysis on application code to determine a security exception and determining the application component responsible for the security exception; analyzing the determined security exception to calculate the permissions required by each component; formatting a security policy file, the security policy file including a level of required permission appropriate to the application type; and applying the security policy file to the application to provide a security-enabled application.

Description

technical field [0001] The present invention relates to the field of security permissions for applications. In particular, the invention relates to generating security permissions for applications in an enterprise environment. Background technique [0002] Java2 security is a granular, policy-based access control mechanism designed to increase overall system integrity by securing access to protected system resources. Java and all Java-based trademarks and logos are trademarks or registered trademarks of Oracle and / or its subsidiaries. [0003] At Java runtime, when code is received with a potentially dangerous call, the access controller consults the policy and uses stack inspection to decide whether to allow access based on the identity of the code. [0004] A typical scenario that occurs when Java2 security is enabled is that the application will stop working due to a security access exception. System administrators must establish consistent policies, which requires exp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F17/00
CPCG06F21/54G06F21/604G06F21/6218G06F21/6209G06F21/6227G06F21/62G06F21/60G06F21/00
Inventor J·H·迪金E·惠蒂科蒋丰慧J·J·P·麦克纳马拉
Owner INT BUSINESS MASCH CORP