17948400. AUDITING AND SECURING PROGRAM CALLS simplified abstract (International Business Machines Corporation)
Contents
- 1 AUDITING AND SECURING PROGRAM CALLS
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 AUDITING AND SECURING PROGRAM CALLS - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Potential Applications
- 1.6 Problems Solved
- 1.7 Benefits
- 1.8 Potential Commercial Applications
- 1.9 Possible Prior Art
- 1.10 Original Abstract Submitted
AUDITING AND SECURING PROGRAM CALLS
Organization Name
International Business Machines Corporation
Inventor(s)
Peng Hui Jiang of Beijing (CN)
AUDITING AND SECURING PROGRAM CALLS - A simplified explanation of the abstract
This abstract first appeared for US patent application 17948400 titled 'AUDITING AND SECURING PROGRAM CALLS
Simplified Explanation
The embodiment described in the abstract involves creating a list of callers who request to call a specific program at runtime, as well as a separate list of authorized callers who are allowed to make these calls. Each authorized caller is assigned an authorization key that the program will require to complete the call requests.
- Caller list and authorized caller list generation
- Authorization key assignment for authorized callers
Potential Applications
This technology could be applied in secure access control systems, authentication processes, and authorization mechanisms for software programs.
Problems Solved
This technology helps prevent unauthorized access to sensitive programs and ensures that only approved callers can interact with designated software.
Benefits
Enhanced security measures, improved control over program access, reduced risk of unauthorized usage or malicious attacks.
Potential Commercial Applications
1. Secure software systems for businesses 2. Access control solutions for sensitive data storage
Possible Prior Art
One possible prior art could be the use of access control lists (ACLs) in computer systems to manage permissions and restrict access to resources based on user identities.
What are the potential limitations of this technology in real-world applications?
The technology may face challenges in scalability when dealing with a large number of authorized callers and complex program interactions. Additionally, there could be issues with managing and updating the authorized caller list over time.
How does this technology compare to existing access control mechanisms in terms of efficiency and effectiveness?
This technology offers a more granular level of control and authorization compared to traditional access control methods. By assigning authorization keys to specific callers, it adds an extra layer of security and verification to the calling process.
Original Abstract Submitted
An embodiment includes generating a caller list of callers that issue requests for calling a designated program at runtime. The embodiment also includes generating an authorized caller list of authorized callers allowed to call the designated program, wherein the authorized callers are selected from among callers on the caller list. The embodiment also includes generating an authorization key for each of the authorized callers that the designated program will require as a condition for completing call requests.