International business machines corporation (20240095359). AUDITING AND SECURING PROGRAM CALLS simplified abstract
Contents
- 1 AUDITING AND SECURING PROGRAM CALLS
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 AUDITING AND SECURING PROGRAM CALLS - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Potential Applications
- 1.6 Problems Solved
- 1.7 Benefits
- 1.8 Potential Commercial Applications
- 1.9 Possible Prior Art
- 1.10 Original Abstract Submitted
AUDITING AND SECURING PROGRAM CALLS
Organization Name
international business machines corporation
Inventor(s)
Peng Hui Jiang of Beijing (CN)
AUDITING AND SECURING PROGRAM CALLS - A simplified explanation of the abstract
This abstract first appeared for US patent application 20240095359 titled 'AUDITING AND SECURING PROGRAM CALLS
Simplified Explanation
The embodiment described in the abstract involves creating a list of callers who request to call a specific program at runtime, as well as a separate list of authorized callers who are permitted to make these calls. Each authorized caller is assigned an authorization key that the program will require to complete the call requests.
- Caller list generated for those requesting to call a designated program at runtime
- Authorized caller list created from callers on the caller list
- Authorization key generated for each authorized caller to complete call requests
Potential Applications
This technology could be applied in secure systems where only authorized users are allowed to access certain programs or functionalities. It could also be used in software licensing to control and monitor usage.
Problems Solved
This technology helps prevent unauthorized access to sensitive programs or data. It adds an extra layer of security by requiring an authorization key from authorized users before allowing them to make call requests.
Benefits
The technology enhances security measures by restricting access to designated programs. It provides control over who can call specific programs at runtime, reducing the risk of unauthorized usage.
Potential Commercial Applications
This technology could be valuable in industries where data security is crucial, such as finance, healthcare, and government sectors. It could also be utilized in software development to manage access to proprietary programs.
Possible Prior Art
One possible prior art could be the use of access control lists (ACLs) in computer systems to restrict user access to certain resources. Another could be the use of authorization keys in software licensing to validate user permissions.
Unanswered Questions
How does this technology handle scalability issues in systems with a large number of callers and authorized users?
The article does not address how the system would manage a growing number of callers and authorized users. It would be important to understand how the technology can scale effectively to accommodate a larger user base.
What measures are in place to prevent unauthorized access to the authorization keys assigned to authorized callers?
The article does not mention any specific security measures to protect the authorization keys from being compromised. It would be crucial to know how the system ensures the confidentiality and integrity of these keys to prevent unauthorized access.
Original Abstract Submitted
an embodiment includes generating a caller list of callers that issue requests for calling a designated program at runtime. the embodiment also includes generating an authorized caller list of authorized callers allowed to call the designated program, wherein the authorized callers are selected from among callers on the caller list. the embodiment also includes generating an authorization key for each of the authorized callers that the designated program will require as a condition for completing call requests.