17948400. AUDITING AND SECURING PROGRAM CALLS simplified abstract (International Business Machines Corporation)

From WikiPatents
Jump to navigation Jump to search

AUDITING AND SECURING PROGRAM CALLS

Organization Name

International Business Machines Corporation

Inventor(s)

Dong Hui Liu of Beijing (CN)

Peng Hui Jiang of Beijing (CN)

Jing Lu of Beijing (CN)

Jia Yu of BEIJING (CN)

Jun Su of Beijing (CN)

Xiao Yan Tang of BEIJING (CN)

Yong Yin of BEIJING (CN)

AUDITING AND SECURING PROGRAM CALLS - A simplified explanation of the abstract

This abstract first appeared for US patent application 17948400 titled 'AUDITING AND SECURING PROGRAM CALLS

Simplified Explanation

The embodiment described in the abstract involves creating a list of callers who request to call a specific program at runtime, as well as a separate list of authorized callers who are allowed to make these calls. Each authorized caller is assigned an authorization key that the program will require to complete the call requests.

  • Caller list and authorized caller list generation
  • Authorization key assignment for authorized callers

Potential Applications

This technology could be applied in secure access control systems, authentication processes, and authorization mechanisms for software programs.

Problems Solved

This technology helps prevent unauthorized access to sensitive programs and ensures that only approved callers can interact with designated software.

Benefits

Enhanced security measures, improved control over program access, reduced risk of unauthorized usage or malicious attacks.

Potential Commercial Applications

1. Secure software systems for businesses 2. Access control solutions for sensitive data storage

Possible Prior Art

One possible prior art could be the use of access control lists (ACLs) in computer systems to manage permissions and restrict access to resources based on user identities.

What are the potential limitations of this technology in real-world applications?

The technology may face challenges in scalability when dealing with a large number of authorized callers and complex program interactions. Additionally, there could be issues with managing and updating the authorized caller list over time.

How does this technology compare to existing access control mechanisms in terms of efficiency and effectiveness?

This technology offers a more granular level of control and authorization compared to traditional access control methods. By assigning authorization keys to specific callers, it adds an extra layer of security and verification to the calling process.


Original Abstract Submitted

An embodiment includes generating a caller list of callers that issue requests for calling a designated program at runtime. The embodiment also includes generating an authorized caller list of authorized callers allowed to call the designated program, wherein the authorized callers are selected from among callers on the caller list. The embodiment also includes generating an authorization key for each of the authorized callers that the designated program will require as a condition for completing call requests.