International business machines corporation (20240095359). AUDITING AND SECURING PROGRAM CALLS simplified abstract

From WikiPatents
Jump to navigation Jump to search

AUDITING AND SECURING PROGRAM CALLS

Organization Name

international business machines corporation

Inventor(s)

Dong Hui Liu of Beijing (CN)

Peng Hui Jiang of Beijing (CN)

Jing Lu of Beijing (CN)

Jia Yu of BEIJING (CN)

Jun Su of Beijing (CN)

Xiao Yan Tang of BEIJING (CN)

Yong Yin of BEIJING (CN)

AUDITING AND SECURING PROGRAM CALLS - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240095359 titled 'AUDITING AND SECURING PROGRAM CALLS

Simplified Explanation

The embodiment described in the abstract involves creating a list of callers who request to call a specific program at runtime, as well as a separate list of authorized callers who are permitted to make these calls. Each authorized caller is assigned an authorization key that the program will require to complete the call requests.

  • Caller list generated for those requesting to call a designated program at runtime
  • Authorized caller list created from callers on the caller list
  • Authorization key generated for each authorized caller to complete call requests

Potential Applications

This technology could be applied in secure systems where only authorized users are allowed to access certain programs or functionalities. It could also be used in software licensing to control and monitor usage.

Problems Solved

This technology helps prevent unauthorized access to sensitive programs or data. It adds an extra layer of security by requiring an authorization key from authorized users before allowing them to make call requests.

Benefits

The technology enhances security measures by restricting access to designated programs. It provides control over who can call specific programs at runtime, reducing the risk of unauthorized usage.

Potential Commercial Applications

This technology could be valuable in industries where data security is crucial, such as finance, healthcare, and government sectors. It could also be utilized in software development to manage access to proprietary programs.

Possible Prior Art

One possible prior art could be the use of access control lists (ACLs) in computer systems to restrict user access to certain resources. Another could be the use of authorization keys in software licensing to validate user permissions.

Unanswered Questions

How does this technology handle scalability issues in systems with a large number of callers and authorized users?

The article does not address how the system would manage a growing number of callers and authorized users. It would be important to understand how the technology can scale effectively to accommodate a larger user base.

What measures are in place to prevent unauthorized access to the authorization keys assigned to authorized callers?

The article does not mention any specific security measures to protect the authorization keys from being compromised. It would be crucial to know how the system ensures the confidentiality and integrity of these keys to prevent unauthorized access.


Original Abstract Submitted

an embodiment includes generating a caller list of callers that issue requests for calling a designated program at runtime. the embodiment also includes generating an authorized caller list of authorized callers allowed to call the designated program, wherein the authorized callers are selected from among callers on the caller list. the embodiment also includes generating an authorization key for each of the authorized callers that the designated program will require as a condition for completing call requests.