WO1999064946A1 - Method and system for secure running of untrusted content - Google Patents

Method and system for secure running of untrusted content Download PDF

Info

Publication number
WO1999064946A1
WO1999064946A1 PCT/US1999/012912 US9912912W WO9964946A1 WO 1999064946 A1 WO1999064946 A1 WO 1999064946A1 US 9912912 W US9912912 W US 9912912W WO 9964946 A1 WO9964946 A1 WO 9964946A1
Authority
WO
WIPO (PCT)
Prior art keywords
restricted
access
content
token
security
Prior art date
Application number
PCT/US1999/012912
Other languages
French (fr)
Inventor
Shannon J. Chan
Gregory Jensenworth
Mario C. Goertzel
Bharat Shah
Michael M. Swift
Richard B. Ward
Original Assignee
Microsoft Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Microsoft Corporation filed Critical Microsoft Corporation
Priority to EP99955547A priority Critical patent/EP1086413B1/en
Priority to AT99955547T priority patent/ATE518180T1/en
Priority to JP2000553883A priority patent/JP4906188B2/en
Publication of WO1999064946A1 publication Critical patent/WO1999064946A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/53Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2145Inheriting rights or properties, e.g., propagation of permissions or restrictions within a hierarchy
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2149Restricted operating environment

Definitions

  • the invention relates generally to computer systems, and more particularly to improvements in security for computer systems .
  • executable content could only installed on a computer system by physically bringing magnetic media to the computer and having someone with administrative privileges install it.
  • the Internet has made it very easy and popular for ordinary computer users to download executable content such as programs, HTML pages and controls.
  • executable content may be downloaded and executed via the Internet without the user even realizing that such an event took place.
  • computer users may receive electronic mail or news containing files that include executable content, such as executable programs and/or documents containing macros, and moreover, the mail or news itself may be an HTML page. Opening such a message or an attachment therein exposes the recipient' s system to whatever executable content is present.
  • the present invention provides restricted execution contexts for untrusted content (such as executable code, dynamic HTML, Java or Active-X controls) that restricts the resources that the content may access.
  • a restricted process is set up for untrusted content, and any actions attempted by the content are subject to the restrictions of the process, which are based on various criteria.
  • a restricted token associated with each process is compared against security information of the resource to determine if the type of access is allowed. The resource's security information thus determines whether a process, and thus the untrusted content, may access the resource, and if so, the type of access that is allowed.
  • Untrusted content includes data downloaded from websites, and each such site has a restricted process set up therefor based on the site identity and the zone in which the site is categorized.
  • APIs and helper processes enable the website to access its own site, files and registry keys, while ACLs on other resources not related to the site restrict the access of that site as desired, based on the site identity, zone or other criteria.
  • untrusted content includes electronic mail messages or news along with any attachments thereto. Such content is similarly run in a restricted execution context wherein the restrictions are based on criteria such as the identity of the sender. Servers also may run untrusted content such as scripts and client processes in restricted execution contexts, whereby the restrictions may be based on criteria such as the script author, the method of client authentication used, and/or any other information available to the server indicative of how trusted or untrusted the content may be.
  • FIGURE 1 is a block diagram representing a computer system into which the present invention may be incorporated;
  • FIG. 2 is a block diagram generally representing the creation of a restricted token from an existing token;
  • FIG. 3 is a block diagram generally representing the various components for determining whether a process may access a resource
  • FIGS. 4 - 5 comprise a flow diagram representing the general steps taken to create a restricted token from an existing token;
  • FIG. 6 is a block diagram generally representing a process having a restricted token associated therewith attempting to access a resource
  • FIG. 7 is a block diagram generally representing the logic for determining access to an object of a process having a restricted token associated therewith;
  • FIG. 8 is a flow diagram representing the general steps taken when determining whether to grant a process access to a resource;
  • FIG. 9 is a representation of a job object having multiple processes therein having common restrictions
  • FIG. 10 is a block diagram generally representing untrusted content in a process set up therefor and restricted with respect to access to resources in accordance with one aspect of the present invention
  • FIGS. 11 - 12 are block diagrams representing components in accordance with another aspect of the present invention for restricting processes according to criteria for untrusted site and e-mail content, respectively;
  • FIG. 13 is a block diagram generally representing a helper process for accessing a resource on behalf of a restricted process in accordance with another aspect of the present invention.
  • FIGS. 14 and 15 comprise a flow diagram showing how an application programming interface (API) uses a helper process to return information from a resource to a process that is restricted from accessing the resource in accordance with another aspect of the present invention
  • FIG. 16 is a representation of a site's files isolated from the files of other sites in a file system in accordance with another aspect of the present invention.
  • FIGS. 17 and 18 are a block diagrams representing how untrusted content's file system and registry requests, respectively, are redirected in accordance with another aspect of the present invention.
  • FIG. 19 is a flow diagram representing an example of how e-mail content may be restricted according to criteria including the identity of the sender, in accordance with another aspect of the present invention
  • FIG. 20 is a block diagram generally representing untrusted scripts in a processes set up therefor and restricted with respect to their access to resources in accordance with another aspect of the present invention.
  • FIG. 21 is a flow diagram representing an example of how client processes may be restricted on a server according to criteria, including how the client was authenticated, in accordance with another aspect of the present invention.
  • FIG. 1 and the following discussion are intended to provide a brief general description of a suitable computing environment in which the invention may be implemented.
  • the invention will be described in the general context of computer- executable instructions, such as program modules, being executed by a personal computer.
  • program modules include routines, programs, objects, components, data structures and the like that perform particular tasks or implement particular abstract data types.
  • program modules include routines, programs, objects, components, data structures and the like that perform particular tasks or implement particular abstract data types.
  • program modules include routines, programs, objects, components, data structures and the like that perform particular tasks or implement particular abstract data types.
  • those skilled m the art will appreciate that the invention may be practiced with other computer system configurations, including hand-held devices, multiprocessor systems, microprocessor-based or programmable consumer electronics, network PCs, minicomputers, mainframe computers and the like.
  • the invention may also be practiced m distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network.
  • program modules may be located m both
  • an exemplary system for implementing the invention includes a general purpose computing device m the form of a conventional personal computer 20 or the like, including a processing unit 21, a system memory 22, and a system bus 23 that couples various system components including tne system memory to the processing unit 21.
  • the system bus 23 may be any of several types of bus structures including a memory bus or memory controller, a peripheral bus, and a local bus using any of a variety of bus architectures.
  • the system memory includes read-only memory (ROM) 24 and random access memory (RAM) 25.
  • ROM read-only memory
  • RAM random access memory
  • a basic input/output; system 26 (BIOS) containing the basic routines that help to transfer information between elements within the personal computer 20, such as during start-up, is stored m ROM 24.
  • the personal computer 20 may further include a hard disk drive 27 for reading from and writing to a hard disk, not shown, a magnetic disk drive 28 for reading from or writing to a removable magnetic disk 29, and an optical disk drive 30 for reading from or writing to a removable optical disk 31 such as a CD-ROM or other optical media.
  • the hard disk drive 27, magnetic disk drive 28, and optical disk drive 30 are connected to the system bus 23 by a hard disk drive interface 32, a magnetic disk drive interface 33, and an optical drive interface 34, respectively.
  • the drives and their associated computer-readable media provide non-volatile storage of computer readable instructions, data structures, program modules and other data for the personal computer 20.
  • exemplary environment described herein employs a hard disk, a removable magnetic disk 29 and a removable optical disk 31, it should be appreciated by those skilled m the art that other types of computer readable media which can store data that is accessible by a computer, such as magnetic cassettes, flash memory cards, digital video disks, Bernoulli cartridges, random access memories (RAMs) , read-only memories (ROMs) and the like may also be used m the exemplary operating environment.
  • RAMs random access memories
  • ROMs read-only memories
  • a numoer of program modules may be stored on the hard disk, magnetic disk 29, optical disk 31, ROM 24 or RAM 25, including an operating system 35 (preferably Windows NT) , one or more application programs 36, other program modules 37 and program data 38.
  • a user may enter commands and information into the personal computer 20 through input devices such as a keyboard 40 and pointing device 42.
  • Other input devices may include a microphone, joystick, game pad, satellite dish, scanner or the like.
  • These and other input devices are often connected to the processing unit 21 through a serial port interface 46 that is coupled to the system bus, but may be connected by other interfaces, such as a parallel port, game port or universal serial bus (USB) .
  • a monitor 47 or other type of display device is also connected to the system bus 23 via an interface, such as a video adapter 48.
  • personal computers typically include other peripheral output devices (not shown), such as speakers and printers.
  • the personal computer 20 may operate in a networked environment using logical connections to one or more remote computers, such as a remote computer 49.
  • the remote computer 49 may be another personal computer, a server, a router, a network PC, a peer device or other common network node, and typically includes many or all of the elements described above relative to the personal computer 20, although only a memory storage device 50 has been illustrated in FIG. 1.
  • the logical connections depicted in FIG. 1 include a local area network (LAN) 51 and a wide area network (WAN) 52.
  • LAN local area network
  • WAN wide area network
  • the personal computer 20 When used in a LAN networking environment, the personal computer 20 is connected to the local network 51 through a network interface or adapter 53. When used in a WAN networking environment, the personal computer 20 typically includes a modem 54 or other means for establishing communications over the wide area network 52, such as the Internet.
  • the modem 54 which may be internal or external, is connected to the system bus 23 via the serial port interface 46.
  • program modules depicted relative to the personal computer 20, or portions thereof may be stored in the remote memory storage device. It will be appreciated that the network connections shown are exemplary and other means of establishing a communications link between the computers may be used.
  • the preferred security model of the present invention is described herein with reference to the Windows NT security model. Notwithstanding, there is no intention to limit the present invention to the Windows NT operating system, but on the contrary, the present invention is intended to operate with and provide benefits with any mechanism that performs security checks at the operating system level.
  • the present invention may also be used with software-fault isolation on a per-thread basis, or with a virtual machine where restrictions are determined from the stack of classes currently executing.
  • the present invention does not necessarily depend on kernel-mode operation, as with software-fault isolation or a virtual machine it may be implemented in user-mode.
  • a user performs tasks by accessing the system' s resources via processes (and their threads) .
  • processes and their threads
  • a process and its threads will be considered conceptually equivalent, and will thus hereinafter simply be referred to as a process.
  • system's resources including files, shared memory and physical devices, which in Windows NT are represented by objects, will be ordinarily referred to as either resources or objects herein.
  • a security context is set up for that user, which includes building an access token 60.
  • a conventional user-based access token 60 includes a UserAndGroups field 62 including a security identifier (Security ID, or SID) 64 based on the user's credentials and one or more group IDs 66 identifying groups (e.g., within an organization) to which that user belongs.
  • the token 60 also includes a privileges field 68 listing any privileges assigned to the user. For example, one such privilege may give an administrative-level user the ability to set the system clock through a particular application programming interface (API). Note that privileges over-ride access control checks, described below, that are otherwise performed before granting access to an object.
  • API application programming interface
  • a process 70 desiring access to an object 72 specifies the type of access it desires (e.g., obtain read/write access to a file object) and at the operating system (e.g., kernel) level provides its associated token 60 to an object manager 74.
  • the object 72 has a security descriptor 76 associated therewith, and the object manager 74 provides the security descriptor 76 and the token 60 to a security mechanism 78.
  • the contents of the security descriptor 76 are typically determined by the owner (e.g., creator) of the object, and generally comprise a (discretionary) access control list (ACL) 80 of access control entries, and for each entry, one or more access rights (allowed or denied actions) corresponding to that entry.
  • Each entry comprises a type (deny or allow) indicator, flags, a security identifier (SID) and access rights in the form of a bitmask wherein each bit corresponds to a permission (e.g., one bit for read access, one for write and so on) .
  • the security mechanism 78 compares the security IDs in the token 60 along with the type of action or actions requested by the process 70 against the entries in the ACL 80. If a match is found with an allowed user or group, and the type of access desired is allowable for the user or group, a handle to the object 72 is returned to the process 70, otherwise access is denied.
  • a user with a token identifying the user as a member of the * ccounting" group may wish to access a particular file object with read and write access. If the file object has the "Accounting" group identifier of type allow m an entry of its ACL 80, and the group has rights enabling read and write access, a handle granting read and write access is returned, otherwise access is denied. Note that for efficiency reasons, the security check is performed only when the process 70 first attempts to access the object 72 (create or open), and thus the handle to the object stores the type of access information so as to limit the actions that can be performed therethrough.
  • the security descriptor 76 also includes a system ACL, or SACL 81, which comprises entries of type audit corresponding to client actions that are to be audited. Flags m each entry indicate whether the audit is monitoring successful or failed operations, and a bitmask m the entry indicates the type of operations that are to be audited. A security ID m the entry indicates the user or group being audited. For example, consider a situation wherein a particular group is being audited so as to determine whenever a member of that group that does not have write access to a file object attempts to write to that file.
  • the SACL 81 for that file object includes an audit entry having the group security identifier therein along with an appropriately set fail flag and write access bit. Whenever a client belonging to that particular group attempts to write to the file object and fails, the operation is logged.
  • the ACL 80 may contain one or more identifiers that are marked for denying users of groups access (as to all rights or selected rights) rather than granting access thereto. For example, one entry listed m the ACL 80 may otherwise allow members of w Group 3 " access to the object 72, but another entry m the ACL 80 may specifically deny "Group? ' all access. If the token "
  • the security check is arranged so as to not allow access via the "Groups" entry before checking the "DENY ALL" status of the Group 2 4 entry, such as by placing all DENY entries at the front of the ACL 80.
  • this arrangement provides for improved efficiency, as one or more isolated members of a group may be separately excluded in the ACL 80 rather than having to individually list each of the remaining members of a group to allow their access.
  • a caller may request a MAXIMUM_ALLOWED access, whereby an algorithm determines the maximum type of access allowed, based on the normal UserAndGroups list versus each of the entries in the ACL 80. More particularly, the algorithm walks down the list of identifiers accumulating the rights for a given user (i.e., OR-ing the various bitmasks) . Once the rights are accumulated, the user is given the accumulated rights. However, if during the walkthrough a deny entry is found that matches a user or group identifier and the requested rights, access is denied.
  • a restricted token is created from an existing access token (either restricted or unrestricted) as described below. As also described below, if the restricted token includes any restricted security IDs, the token is subject to an additional access check wherein the restricted security IDs are compared against the entries in the object's ACL.
  • the primary use of a restricted token is for a process to create a new process with a restricted version of its own token. The restricted process is then limited in the actions it may perform on resources. For example, a file object resource may have in its ACL a single restricted SID identifying the Microsoft Word application program, such that only restricted processes having the same Microsoft Word restricted SID in its associated restricted token may access the file object.
  • the ACL also needs to contain an access control entry granting the user access, as well as the Microsoft Word program. Then, for example, untrusted code such as downloaded via a browser could be run in a restricted process that did not have the Microsoft Word restricted Security ID in its restricted token, preventing that code's access to the file object.
  • SeAssignPrimaryToken privilege For security reasons, creating a process with a different token normally requires a privilege known as the SeAssignPrimaryToken privilege.
  • process management allows one process with sufficient access to another process to modify its primary token to a restricted token, if the restricted token is derived from the primary token.
  • the operating system 35 may ensure that the process is only creating a restricted version of itself.
  • a restricted token 84 has less access than its parent token, and may, for example, prevent access to an object based on the type of process (as well as the user or group) that is attempting to access the object, instead of simply allowing or denying access solely based on the user or group information.
  • a restricted token may also not allow access via one or more user or group security IDs specially marked as "USE_FOR_DENY_ONLY," even though the parent token allows access via those SIDs, and/or may have privileges removed that are present in the parent token.
  • one way in which to reduce access is to change an attribute of one or more user and/or group security identifiers in a restricted token so as to be unable to allow access, rather than grant access therewith.
  • Security IDs marked USE_FOR_DENY_ONLY are effectively ignored for purposes of granting access, however, an ACL that has a "DENY" entry for that security ID will still cause access to be denied.
  • the Group 2 security ID in the restricted token 84 (FIG. 3) is marked USE_FOR_DENY__ONLY, when the user's process attempts to access an object 72 having the ACL 80 that lists Group 2 as allowed, that entry is effectively ignored and the process will have to gain access by some other security ID.
  • the ACL 80 includes an entry listing Group 2 as DENY with respect to the requested type of action, then once tested, no access will be granted regardless of other security IDs.
  • Another way to reduce access in a restricted token is to remove one or more privileges relative to the parent token.
  • a user having a normal token with administrative privileges may set up a system such that unless that user specifically informs the system otherwise, the user' s processes will run with a restricted token having no privileges.
  • this prevents inadvertent errors that may occur when the user is not intentionally acting in an administrative capacity.
  • programs may be developed to run in different modes depending on a user's privileges, whereby an administrative-level user has to run the program with administrative privileges to perform some operations, but operate with reduced privileges to perform more basic operations. Again, this helps to prevent serious errors that might otherwise occur when such a user is simply attempting to perform normal operations but is running with elevated privileges.
  • Restricted security IDs are numbers representing processes, resource operations and the like, made unique such as by adding a prefix to GUIDs or numbers generated via a cryptographic hash or the like, and may include information to distinguish these Security IDs from other Security IDs.
  • APIs application programming interfaces
  • GUID to Security ID conversion represent the Security IDs in human readable form, and so on.
  • Security IDs may be developed based on likely restricted uses of a resource.
  • a Security ID such as "USE_WINDOWS” would be placed in the default ACLs of windowstations and the desktop to allow access thereto only by a process having a corresponding
  • the default ACL of a printer object may include a USE_PRINTING SID in its default ACL, so that a process could create a restricted process with only this Security ID listed in its restricted token, whereby the restricted process would be able to access the printer but no other resource.
  • numerous other Security IDs for accessing other resources may be implemented.
  • restricted security IDs are placed in a special field 82 of a restricted token 84, such as for identifying a process that is requesting an action.
  • an object may selectively grant access based on a requesting process (as well as a user or group) .
  • a requesting process as well as a user or group
  • an object such as a file object may allow Microsoft Word, Microsoft Excel or Windows Explorer processes to access it, but deny access to any other process.
  • each of the allowed processes may be granted different access rights.
  • the design provides for significant flexibility and granularity within the context of a user to control what different processes are allowed to do.
  • One usage model for these features includes a distinction between trusted applications and untrusted applications.
  • application is used in a generic sense to describe any piece of code that may be executed in "user mode" under a given security context.
  • an application such as Microsoft Word may run as a process from an ActiveX control, which may be loaded into an existing process and executed.
  • Applications which launch other applications such as Microsoft's Internet Explorer, may introduce a "trust model" using this infrastructure.
  • an application such as Internet Explorer can use restricted tokens to execute untrusted executable code under different processes, and control what those processes can do within the user' s overall access rights and privileges.
  • the Internet Explorer application creates a restricted token from its own token, and determines which restricted security IDs will be placed in the restricted token. Then, the untrusted executable code is restricted to accessing only those objects that the restricted context may access.
  • entries corresponding to restricted SIDs and other restrictions may be placed in a field of the
  • SACL 81 for auditing purposes.
  • the SACL of a resource may be set up to audit each time that Internet Explorer program attempts read or write access of that resource, and/or the use of SIDs marked USE_FOR_DENY_ONLY may be audited.
  • SIDs marked USE_FOR_DENY_ONLY may be audited.
  • auditing will not be described in detail hereinafter, however it can be readily appreciated that the concepts described with respect to access control via restricted SIDs are applicable to auditing operations.
  • API application programming interface
  • NtFilterToken API is wrapped under a Win32 API named CreateRestrictedToken, further set forth below:
  • these APIs 86 work in conjunction to take an existing token 60, either restricted or unrestricted, and create a modified (restricted) token 84 therefrom.
  • the structure of a restricted token which contains the identification information about an instance of a logged-on user, includes three new fields, ParentTokenld, RestrictedSidCount and RestrictedSids (shown in boldface below) :
  • a process calls the CreateRestrictedToken API with appropriate flag settings and/or information in the input fields, which in turn invokes the NtFilterToken API.
  • the NtFilterToken API checks to see if a flag named DISABLE_MAX_SIDS is set, which indicates that all Security IDs for groups in the new, restricted token 84 should be marked as USE_FOR_DENY_ONLY .
  • the flag provides a convenient way to restrict the (possibly many) groups in a token without needing to individually identify each of the groups.
  • step 400 branches to step 402 which sets a bit indicating USE_FOR_DENY__ONLY on each of the group security IDs in the new token 84. If the flag is set, step 400 branches to step 404 to test if any security IDs are individually listed in a SidsToDisable Field of the NtFilterToken API. As shown at step 404 of FIG. 4, when the optional SidsToDisable input field is present, at step 406, any Security IDs listed therein that are also present in the UserAndGroups field 62 of the parent token "
  • step 410 of FIG. 4 wherein a flag named DISABLE_MAX_PRIVILEGES is tested. This flag may be similarly set as a convenient shortcut to indicate that all privileges in the new, restricted token 84 should be removed. If set, step 410 branches to step 412 which deletes all privileges from the new token 84.
  • step 410 branches to step 414 wherein the optional PrivilegesToDelete field is examined. If present when the NtFilterToken API 86 is called, then at step 416, any privileges listed in this input field that are also present in the privileges field 68 of the existing token 60 are individually removed from the privileges field 90 of the new token 84. In the example shown in FIG. 2, the privileges shown as
  • An API, IsTokenRestricted is called at step 422, and resolves this question by querying (via the NtQuerylnformationToken API) the RestrictingSids field of the parent token to see if it is not NULL, whereby if not NULL, the parent token is a restricted token and the API returns a TRUE. If the test is not satisfied, the parent token is a normal token and the API returns a FALSE.
  • a parent token that is restricted but does not have restricted SIDs may be treated as being not restricted.
  • step 424 if the parent token is restricted, step 424 branches to step 426 wherein any security IDs that are in both the parent token' s restricted Security ID field and the API's restricted Security ID input list are put into the restricted Security ID field 92 of the new token 84. Requiring restricted security IDs to be common to both lists prevents a restricted execution context from adding more security IDs to the restricted Security ID field 92, an event which would effectively increase rather than decrease access. Similarly, if none are common at step 426, any token created still has to be restricted without increasing the access thereof, such as by leaving at least one restricted SID from the original token in the new token. Otherwise, an empty restricted SIDs field in the new token might indicate that the token is not restricted, an event which would effectively increase rather than decrease access.
  • the RestrictingSids field 92 of the new token 84 is set to those listed in the input field. Note that although this adds security IDs, access is actually decreased since a token having restricted SIDs is subject to a secondary access test, as described m more detail below.
  • step 430 is also executed, whereby the ParentTokenld 93 m the new token 84 is set to tne
  • Tokenld of the existing (parent) token This provides the operating system with the option of later allowing a process to use a restricted version of its token m places that would not normally be allowed except to the parent token.
  • a restricted process 94 has been created and is attempting to open a file object 70 with read/write access.
  • the ACL 80 has a number of security IDs listed therein along with the type of access allowed for each ID, wherein "RO” indicates that read only access is allowed, "WR” indicates read/write access and "SYNC” indicates that synchronization access is allowed. Note that "XJones” is specifically denied access to the object 72, even if "XJones" would otherwise be allowed access through membership m an allowed group.
  • restricted security contexts are primarily implemented m the Windows NT kernel.
  • the process 94 provides the object manager 74 with information identifying the object to which access is desired along with the type of access desired, (FIG. 8, step 800) .
  • the object manager 74 works m conjunction with the security mechanism 78 to compare the user and group security IDs listed m the token 84 (associated with the process 94) against the entries m the ACL 80, to determine if the desired access should be granted or denied.
  • the security check denies access at step 814. However, if the result of the user and group portion of the access check indicates allowable access at step 804, the security process branches to step 806 to determine if the restricted token 84 has any restricted security IDs. If not, there are no additional restrictions, whereby the access check is complete and access is granted at step 812 (a handle to the object is returned) based solely on user and group access. In this manner, a normal token is essentially checked as before. However, if the token includes restricted security IDs as determined by step 806, then a secondary access check is performed at step 808 by comparing the restricted security IDs against the entries in the ACL 80.
  • this secondary access test allows access at step 810, access to the object is granted at step 812. If not, access is denied at step 814.
  • a two-part test is thus performed whenever restricted Security IDs are present m the token 84. Considering the security IDs m the token 84 and the desired access bits 96 against the security descriptor of the object 72, both the normal access test and (bitwise AND) the restricted security IDs access test must grant access m order for the process to be granted access to the object.
  • the normal access test proceeds first, and if access is denied, no further testing is necessary. Note that access may be denied either because no security ID in the token matched an identifier in the ACL, or because an ACL entry specifically denied access to the token based on a security identifier therein.
  • the process 94 was restricted so as to only be able to access objects having an "Internet Explorer" SID (non-DENY) in their ACLs .
  • the caller may have specified MAXIMUM_ALLOWED access, whereby as described above, an algorithm walks through the ACL 80 determining the maximum access.
  • restricted tokens if any type of user or group access at all is granted, the type or types of access rights allowable following the user and groups run is specified as the desired access for the second run, which checks the RestrictedSids list. In this way, a restricted token is certain to be granted less than or equal to access than the normal token.
  • security model of the described herein may be used in conjunction with other security models.
  • capability-based security models residing on top of an operating system may be used above the operating system-level security model of the present invention.
  • a Job is a kernel object having a set of processes organized therein, wherein each job may have a different type of restriction associated therewith.
  • restricted tokens may be integrated with Windows NT Job Objects to allow management of multiple processes running under the same restrictions.
  • a Job object restriction is set forth below:
  • a ob 110 has a number of processes (e.g., processes 112 - 114) assigned thereto via the job NtAssignProcessToJobObject API.
  • Each process 112 - 114 has a respective token 116 - 116 associated therewith that is the same with respect to its restrictions, shown as "Restrictions R.”
  • the Job object 110 restricts the processes 112 - 114 therein to only perform certain operations, because the tokens 116 a -116 under which they are running have certain Security IDs (e.g., Administrator SID) disabled, certain privileges removed and/or a set of restricted Security IDs added.
  • certain Security IDs e.g., Administrator SID
  • the tokens may be the same with respect to their other access rights as well, m which event all of the tokens are essentially identical, but this is not required. If a process (e.g., the process 114) produces another process 118, that process 118 also runs m the job 110 with the same restrictions R, as the job object 110 ensures that the same restrictions R are associated with the new process 118 via its token 116 ⁇ .
  • restricted tokens are used to set up restricted security contexts for running untrusted content.
  • One type of content that is typically not trusted is content downloaded from an Internet site.
  • a restricted process may be set up for running each site that is browsed, by associating the process with (at least) a gene ⁇ cally restricted token along with other restrictions.
  • the process may also be within a job object, whereby any processes created by the site's process are automatically given the same restrictions.
  • windowing operations may be restricted, so that, for example, a process cannot shut down the machine or access clipboard data.
  • any actions that the site's content performs takes place within the process, whereby it is subject to the restrictions of the process.
  • different frames are treated as different sites, regardless of their actual site source, even though multiple frames may simultaneously be displayed in windows on the screen.
  • any content accessed via a browser 130 such as Internet Explorer, may be run in a process 132 that has a restricted token 134 including an "Internet Explorer" restricted SID m its restricted SIDs field 136. As described above, this automatically prevents access to any resource not having an allow entry corresponding to the Internet Explorer SID, (unless access is via another matching restricted
  • the process 132 may render HTML pages m a window of Internet Explorer, but is restricted from doing much else unless an ACL of a resource specifically includes an entry with a corresponding restricted SID that allows the action.
  • each site has a unique URL (Uniform Resource Locator) , and may have a binary certificate ID.
  • the browser 130 acts as a discrimination mechanism that passes the site URL 138 to a converter 140 that converts the URL string into a restricted SID.
  • One such mechanism uses a one-way cryptographic hash such as MD5 to convert the string into 128-bit binary value, which then becomes a restricted SID by adding a small amount of information such as a header or the like thereto indicating that the number is a SID and how the number was generated.
  • Such a SID is, to an extremely high probability, unique with respect to other SIDs. Note that if a binary certificate ID is available for the site, then that value may be used to generate the restricted SID. In any event, as shown in FIG. 10, the restricted SID is placed in the restricted SIDs field 136 of the restricted token 134 associated with the process 132 set up for that site.
  • the restriction may be based on Internet zones (a collection of sites) .
  • Internet zones a collection of sites
  • user may set up a zone comprising a list of specifically trusted sites, and another for specifically untrusted.
  • the trusted zone will correspond to one restricted SID while the untrusted zone will correspond to another.
  • Zones may also be set up to distinguish between Intranet sites and Internet sites.
  • a further distinction may be made for Internet sites having one type of certificate and so on, to any desired granularity wherein a distinction may be made.
  • the browser 130 has access to information 131 that groups sites into zones, whereby a restricted SID may be generated that corresponds to the site's zone, and placed in the restricted token 136 to identify the zone to system resources for ACL-based security checking.
  • the security mechanism 78 performs an access evaluation with a user and group check followed by (if the user and group test is passed) a check of the restricted SIDs.
  • the ACL for each resource determines how untrusted code is handled by the presence or absence of corresponding entries therein.
  • a file object may allow read access to a specifically trusted site or zone, but not any other type of access or any access whatsoever to any other site or zone.
  • a highly confidential file may specifically deny access to any restricted token having the "Internet Explorer" SID therein so as to prevent any access via some other restricted SID.
  • the Resource A (142) allows read access to the process 132 because its ACL 144 contains a
  • Windows sockets (the AFD device driver) has its ACL set up to either allow or deny networking, but cannot practically distinguish between each site or zone. To deny networking altogether prevents a process from accessing its own corresponding site, yet allowing a process to access any site allows the process access to other sites, which can potentially divulge confidential information about a client.
  • Reasons to restrict network access include preventing access to unsecured files on file servers not normally accessible from the Internet, preventing access to unsecured internal databases, preventing attacks on network resources (for example via bad packets or DHCP responses) and preventing information leaks about other possible ways to reach the network.
  • the present invention generally restricts the process from networking, but employs a trusted helper process that can perform networking for the site.
  • the helper process restricts the process to an extent that allows the restricted process to access only selected sites (e.g., all sites ending in "Microsoft.com") as determined by the helper process. More particularly, as shown in FIG. 13, the restricted process 132 is denied direct access to the windows sockets AFD driver 150, (as represented by the "X"), whereby the restricted process 132 cannot directly get the socket handle for any site, including its own.
  • the device driver 150 may not be accessed by the restricted process 132 via some other manner, such as by directly calling into the kernel.
  • a helper process 154 which is trusted, has access to the driver 150 via its own non-restricted token 156 and can retrieve a socket handle.
  • the Winsock connect ( ) API 158 to invoke the helper process 154 whenever a restricted process 132 attempts to retrieve a socket handle, the handle to one of a site' s verified or allowed sockets is returned when the appropriate mechanism (i.e., the API 158) is used.
  • step 1400 when the Winsock socket () and connect ( ) API 158 is called at step 1400 to return a handle to a socket, the connect ( ) API 158 first checks at step 1502 to see if the calling process 132 is restricted via an appropriate restricted SID in its token 134. If not restricted, step 1402 branches to step 1404, wherein the connect ( ) API 158 operates as before to return a socket handle or an appropriate errorcode (e.g., no socket available, host unreachable, access denied and so on) .
  • an appropriate errorcode e.g., no socket available, host unreachable, access denied and so on
  • the connect ( ) API 158 calls the helper process 154 (FIGS. 13 and 18) at step 1406.
  • the helper process 154 extracts the site information of the site from the restricted token 134, and at step 1512, compares the site' s allowed (or denied) addresses with the requested address. If they are not allowed, step
  • step 1512 branches to step 1514 wherein the socket request is effectively denied such as by setting an appropriate errorcode. If they are the same, step 1512 branches to step 1516, wherein the helper process 154 accesses the device driver 150 to obtain the socket handle to the site corresponding to the process 132 (assuming a handle is available and that there are no other errors) .
  • the helper process 154 duplicates the handle at step 1518, then returns to the connect ( ) API 158 (FIG. 14) with either the duplicated handle or some indication of an error, after which the connect ( ) API 158 returns the socket handle or an errorcode to the restricted process 132 at step 1420 (FIG. 14) . In this manner, if a handle is returned, the restricted process 132 may thereafter access the verified / allowed site via the handle, but no other sites. Note that the helper process 154 is trusted, and is carefully written to allow only that site's socket handle.
  • the Wininet.dll which (among other functions) downloads URL-identified data at the file level employs a helper process when a restricted process downloads a file.
  • the helper process extracts and validates the URL that a site is requesting, a d if validated, does the downloading and other Wininet work while providing notifications to the restricted process.
  • helper process allowing the helper process to set the ACLs on downloaded files secures those files from other sites.
  • the API invokes the appropriate helper process.
  • a restricted process set up for a site is restricted from accessing files other than its own.
  • any file created by a site on the user's system is placed in a folder that has an ACL entry specifically corresponding to that site.
  • folders are represented as triangles to indicate the hierarchical folder structure
  • each site Sitei.com to Site n .com
  • the APIS for creating and opening files are set up to recognize (by examining the restricted SIDs in the restricted token 134) when a process 132 set up for an Internet site is calling, and adjust the path to appropriately place and/or locate each file based on the restricted token 134. Note that since other file operations (e.g., read, write and delete) use the file handle returned by these APIs, the other APIs need not be modified for path redirection.
  • a restricted process 132 may only indirectly access the system registry 174, but in accordance with the invention, only via a virtualized view of the registry, e.g., under its own site-based key name (regardless of the key name provided by the process) .
  • a site may include an Active-X control that tries to write to the system registry 174.
  • the registry WIN32 APIs 176 for accessing the registry e.g., the RegSaveKeyO and RegRestoreKey ( ) APIs
  • the untrusted content believes it is able to register information in the registry 174 at the specified location, but actually is restricted to accessing a subtree or virtual registry 178, thereby effectively isolating the existing registry information.
  • FIG. 12 shows exemplary components for determining trust based on the identity of the sender, wherein a mail application 133 passes the identity 135 to a discrimination mechanism 137.
  • the discrimination mechanism 137 determines a trust level of the user in order to convert the user identity
  • a restricted SID 139 (and other criteria such as some authentication verifying that the identity is true) to a restricted SID 139, such as by looking up the restricted SID 139 in a trust level to SID table 141 or the like.
  • the process 143 in which the mail content is run is associated with a restricted token 145 that includes the restricted SID 139.
  • FIG. 19 represents the general logic used by the discrimination mechanism 137 for an exemplary way to restrict access based on the sender of an e-mail message.
  • the "From" field of the message is used to determine the purported identity of the sender, while an authentication mechanism (e.g., within the e-mail application 133) such as via a digital signature may be used to verify that the sender is indeed the source of the message.
  • an authentication mechanism e.g., within the e-mail application 133
  • source- based restrictions may be similarly set up for on-line news, whereby the downloaded news content runs in a restricted context based on the identity of the sender.
  • an e-mail message sender is either highly trusted, trusted or untrusted, and the sender may or may not be authenticated.
  • an individual's supervisor and immediate co-workers may be highly trusted senders, employees and close friends trusted senders, and all others untrusted.
  • the resource ACLs are set up with entries corresponding to restricted SIDs such that a process with a restricted token having a restricted SID indicating a trust level of one is able to read and write files, while a trust level two process may only read files.
  • a process with a restricted token having a restricted SID indicating a trust level of three is denied access to any resources.
  • a trust level of zero means that the normal (non-restricted) token will be associated with the process.
  • step 1902 is executed to determine if the sender is authenticated. For example, the message may be digitally signed such that the recipient is assured of the true identity of the sender. If authenticated, then step 1904 sets the trust level to zero and step 1906 associates the normal token with the process set up for the message. If not authenticated, step 1908 sets the trust level to two, after which step 1920 creates a restricted token for the process that set up for the message based on the trust level of two and associates the restricted token with the process set up for the message.
  • step 1900 branches to step 1910 to determine if the user is trusted or untrusted.
  • step 1910 branches to step 1912 to determine if the sender is authenticated. If so, the message process is set up so as to be level one trusted (read and write access) at steps 1914 and 1920. If not authenticated at step 1912, then the trust level is set to two (read only) at step 1908 and the process restricted accordingly at step 1920, again by looking up and inserting the appropriate restricted SID into the restricted token.
  • step 1910 branches to step 1916 wherein the trust level is set to three and at step 1920 the process is correspondingly restricted so as to be denied access to the system resources.
  • the above security policy suggests implementation via a point system, i.e., accumulate various points depending on the sender identity and various points if authenticated, and determine an access level based on the total points.
  • a similar policy may be set up to restrict attachments. However, in addition to restricting based on the sender of an attachment, the attachment may be checked for its type.
  • executable files (*.exe, *.bat, *.com and so on) files may be differentiated from text only documents, which in turn are treated differently with respect to restrictions than Microsoft Word and Microsoft Excel documents (which may contain viruses or other unruly code via macros) .
  • any number of criteria may be employed and/or combined with other criteria to set up restricted security contexts according to a desired security policy.
  • a first way for a web server to use contexts is to launch all such content in restricted contexts that prevent them from harming any core operating system data and from interfering with the data of other helper programs. As described above, this may be accomplished by setting up a process associated with an appropriately restricted token for each piece of untrusted content, thereby denying access to system data files via their ACLs and isolating any files of the untrusted content as desired. Note that memory protection is already present via process boundaries.
  • restrictions may be based on the server script being run, such as by discriminating according to the author of the script and/or determining whether the script needs access to any files or needs to share files with other users or system files.
  • a script may be limited to only those resources it needs and no others, effectively limiting it from doing anything other than that for which it is intended.
  • the Scriptl 200 may access the ResourceX (218) and the ResourceZ (226) because each of their respective ACLs 220, 228 includes a "Scriptl" entry.
  • the Script2 210 may access the ResourceY (222) and the ResourceZ (226) because each of their respective ACLs 224, 228 includes a "Script2" entry.
  • ResourceZ is designed to be a shared file.
  • the resource Z (226) may be a read only data file with respect to these processes 202, 212, whereby both scripts 200, 210 may use the file's information but not change it.
  • Another option provided by the present invention is to create a Job object, which as described above, is a kernel-level object that contains the restrictions for all processes therein.
  • a job object may contain other limitations such as how much of a CPU' s processing may be consumed.
  • any process added to that job receives the same restrictions, whereby the web server can create processes on the client's behalf and then add the process to an existing job. The restrictions are then automatically applied to the process.
  • the web server may further choose what restrictions to apply to client processes and the like based on any number of criteria, including the identity of the client (e.g., are they a company employee or not) , the method of authentication used by the client (e.g., by presenting a password, a certificate, using a smartcard, or even a thumbprint/retma scan), and also the client's location (e.g., based on whether the client is on the same network, dialing m, or connecting over the Internet) .
  • FIG. 21 shows an exemplary flow diagram showing the logic for setting up trust levels depending on the type of authentication, and depending on whether the authentication took place via some remote (and thus theoretically less secure) connection, as opposed to via the local machine.
  • an Internet Service Provider can use restricted execution contexts to safely host multiple web sites on a single web server.
  • each web site runs m a separate restricted execution context compose ⁇ of a job object and a restricted token.
  • the job object provides quotas, so that a portion of the web server's resources is allocated to each web site.
  • the restricted token provides isolation between the web sites, protecting private data such as customer lists, from unauthorized access.
  • restricted execution contexts of the present invention restrict the access of untrusted content to system resources. Restrictions may be applied on a resource-by-resource basis, dependent on any criteria available to the system.

Abstract

Restricted execution contexts are provided for untrusted content, such as computer code or other data downloaded from websites, electronic mail messages and any attachments thereto, and scripts or client processes run on a server. A restricted process is set up for the untrusted content, and any actions attempted by the content are subject to the restrictions of the process, which may be based on various criteria. Whenever a process attempt to access a resource, a token associated with that process is compared against security information of that resource to determine if the type of access is allowed. The security information of each resource thus determines the extent to which the restricted process, and thus the untrusted content, has access. In general, the criteria used for setting up restrictions for each untrusted content's process is information indicative of how trusted or untrusted the content is likely to be.

Description

METHOD AND SYSTEM FOR SECURE RUNNING OF UNTRUSTED CONTENT
FIELD OF THE INVENTION
The invention relates generally to computer systems, and more particularly to improvements in security for computer systems .
BACKGROUND OF THE INVENTION
Historically, executable content could only installed on a computer system by physically bringing magnetic media to the computer and having someone with administrative privileges install it. At present, however, the Internet has made it very easy and popular for ordinary computer users to download executable content such as programs, HTML pages and controls. In many cases, executable content may be downloaded and executed via the Internet without the user even realizing that such an event took place. Similarly, computer users may receive electronic mail or news containing files that include executable content, such as executable programs and/or documents containing macros, and moreover, the mail or news itself may be an HTML page. Opening such a message or an attachment therein exposes the recipient' s system to whatever executable content is present. Unfortunately, such executable content is often unruly, e.g., it may be malicious and intentionally destroy data on the client machine, error-prone and cause the client machine to crash, or well-intentioned but careless and divulge confidential information about the client. Although these types of computer problems have previously existed in the form of "viruses" and "trojans," the ubiquitous presence of World Wide Web has made these problems widespread, and in some cases out of control . On the server side, web servers launch server programs such as CGI scripts on behalf of clients and return data from the programs back to the clients. The source of such scripts is not necessarily carefully controlled, nor are all such scripts well written. As a result, poorly written CGI scripts have caused web server machines to crash or to slow down by using too many computer resources. Moreover, poorly written server programs may be tricked by a malicious client into performing actions it should not do, such as executing other applications or writing or reading data to or from storage. Lastly, some web servers even allow a client program to send scripts to the server to be executed on the client's behalf, posing many dangers. In general, client and server operating environments are not adequately protected against unruly executable content. At the same time, because so much executable content is valuable, the need to be able to receive and run executable content continues to grow despite the inherent risks of untrusted content.
SUMMARY OF THE INVENTION
Briefly, the present invention provides restricted execution contexts for untrusted content (such as executable code, dynamic HTML, Java or Active-X controls) that restricts the resources that the content may access. A restricted process is set up for untrusted content, and any actions attempted by the content are subject to the restrictions of the process, which are based on various criteria. Whenever a process attempts to access a resource, a restricted token associated with each process is compared against security information of the resource to determine if the type of access is allowed. The resource's security information thus determines whether a process, and thus the untrusted content, may access the resource, and if so, the type of access that is allowed.
Untrusted content includes data downloaded from websites, and each such site has a restricted process set up therefor based on the site identity and the zone in which the site is categorized. APIs and helper processes enable the website to access its own site, files and registry keys, while ACLs on other resources not related to the site restrict the access of that site as desired, based on the site identity, zone or other criteria.
Other untrusted content includes electronic mail messages or news along with any attachments thereto. Such content is similarly run in a restricted execution context wherein the restrictions are based on criteria such as the identity of the sender. Servers also may run untrusted content such as scripts and client processes in restricted execution contexts, whereby the restrictions may be based on criteria such as the script author, the method of client authentication used, and/or any other information available to the server indicative of how trusted or untrusted the content may be.
Other advantages will become apparent from the following detailed description when taken in conjunction with the drawings, in which:
BRIEF DESCRIPTION OF THE DRAWINGS
FIGURE 1 is a block diagram representing a computer system into which the present invention may be incorporated; FIG. 2 is a block diagram generally representing the creation of a restricted token from an existing token;
FIG. 3 is a block diagram generally representing the various components for determining whether a process may access a resource; FIGS. 4 - 5 comprise a flow diagram representing the general steps taken to create a restricted token from an existing token;
FIG. 6 is a block diagram generally representing a process having a restricted token associated therewith attempting to access a resource;
FIG. 7 is a block diagram generally representing the logic for determining access to an object of a process having a restricted token associated therewith; FIG. 8 is a flow diagram representing the general steps taken when determining whether to grant a process access to a resource;
FIG. 9 is a representation of a job object having multiple processes therein having common restrictions; FIG. 10 is a block diagram generally representing untrusted content in a process set up therefor and restricted with respect to access to resources in accordance with one aspect of the present invention;
FIGS. 11 - 12 are block diagrams representing components in accordance with another aspect of the present invention for restricting processes according to criteria for untrusted site and e-mail content, respectively;
FIG. 13 is a block diagram generally representing a helper process for accessing a resource on behalf of a restricted process in accordance with another aspect of the present invention;
FIGS. 14 and 15 comprise a flow diagram showing how an application programming interface (API) uses a helper process to return information from a resource to a process that is restricted from accessing the resource in accordance with another aspect of the present invention;
FIG. 16 is a representation of a site's files isolated from the files of other sites in a file system in accordance with another aspect of the present invention;
FIGS. 17 and 18 are a block diagrams representing how untrusted content's file system and registry requests, respectively, are redirected in accordance with another aspect of the present invention;
FIG. 19 is a flow diagram representing an example of how e-mail content may be restricted according to criteria including the identity of the sender, in accordance with another aspect of the present invention; FIG. 20 is a block diagram generally representing untrusted scripts in a processes set up therefor and restricted with respect to their access to resources in accordance with another aspect of the present invention; and
FIG. 21 is a flow diagram representing an example of how client processes may be restricted on a server according to criteria, including how the client was authenticated, in accordance with another aspect of the present invention.
DETAILED DESCRIPTION
Exemplary Operating Environment
Figure 1 and the following discussion are intended to provide a brief general description of a suitable computing environment in which the invention may be implemented. Although not required, the invention will be described in the general context of computer- executable instructions, such as program modules, being executed by a personal computer. Generally, program modules include routines, programs, objects, components, data structures and the like that perform particular tasks or implement particular abstract data types. Moreover, those skilled m the art will appreciate that the invention may be practiced with other computer system configurations, including hand-held devices, multiprocessor systems, microprocessor-based or programmable consumer electronics, network PCs, minicomputers, mainframe computers and the like. The invention may also be practiced m distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located m both local and remote memory storage devices.
With reference to FIG. 1, an exemplary system for implementing the invention includes a general purpose computing device m the form of a conventional personal computer 20 or the like, including a processing unit 21, a system memory 22, and a system bus 23 that couples various system components including tne system memory to the processing unit 21. The system bus 23 may be any of several types of bus structures including a memory bus or memory controller, a peripheral bus, and a local bus using any of a variety of bus architectures. The system memory includes read-only memory (ROM) 24 and random access memory (RAM) 25. A basic input/output; system 26 (BIOS) , containing the basic routines that help to transfer information between elements within the personal computer 20, such as during start-up, is stored m ROM 24. The personal computer 20 may further include a hard disk drive 27 for reading from and writing to a hard disk, not shown, a magnetic disk drive 28 for reading from or writing to a removable magnetic disk 29, and an optical disk drive 30 for reading from or writing to a removable optical disk 31 such as a CD-ROM or other optical media. The hard disk drive 27, magnetic disk drive 28, and optical disk drive 30 are connected to the system bus 23 by a hard disk drive interface 32, a magnetic disk drive interface 33, and an optical drive interface 34, respectively. The drives and their associated computer-readable media provide non-volatile storage of computer readable instructions, data structures, program modules and other data for the personal computer 20. Although the exemplary environment described herein employs a hard disk, a removable magnetic disk 29 and a removable optical disk 31, it should be appreciated by those skilled m the art that other types of computer readable media which can store data that is accessible by a computer, such as magnetic cassettes, flash memory cards, digital video disks, Bernoulli cartridges, random access memories (RAMs) , read-only memories (ROMs) and the like may also be used m the exemplary operating environment.
A numoer of program modules may be stored on the hard disk, magnetic disk 29, optical disk 31, ROM 24 or RAM 25, including an operating system 35 (preferably Windows NT) , one or more application programs 36, other program modules 37 and program data 38. A user may enter commands and information into the personal computer 20 through input devices such as a keyboard 40 and pointing device 42. Other input devices (not shown) may include a microphone, joystick, game pad, satellite dish, scanner or the like. These and other input devices are often connected to the processing unit 21 through a serial port interface 46 that is coupled to the system bus, but may be connected by other interfaces, such as a parallel port, game port or universal serial bus (USB) . A monitor 47 or other type of display device is also connected to the system bus 23 via an interface, such as a video adapter 48. In addition to the monitor 47, personal computers typically include other peripheral output devices (not shown), such as speakers and printers.
The personal computer 20 may operate in a networked environment using logical connections to one or more remote computers, such as a remote computer 49. The remote computer 49 may be another personal computer, a server, a router, a network PC, a peer device or other common network node, and typically includes many or all of the elements described above relative to the personal computer 20, although only a memory storage device 50 has been illustrated in FIG. 1. The logical connections depicted in FIG. 1 include a local area network (LAN) 51 and a wide area network (WAN) 52. Such networking environments are commonplace in offices, enterprise-wide computer networks, Intranets and the Internet.
When used in a LAN networking environment, the personal computer 20 is connected to the local network 51 through a network interface or adapter 53. When used in a WAN networking environment, the personal computer 20 typically includes a modem 54 or other means for establishing communications over the wide area network 52, such as the Internet. The modem 54, which may be internal or external, is connected to the system bus 23 via the serial port interface 46. In a networked environment, program modules depicted relative to the personal computer 20, or portions thereof, may be stored in the remote memory storage device. It will be appreciated that the network connections shown are exemplary and other means of establishing a communications link between the computers may be used.
The General Securi ty Model
The preferred security model of the present invention is described herein with reference to the Windows NT security model. Notwithstanding, there is no intention to limit the present invention to the Windows NT operating system, but on the contrary, the present invention is intended to operate with and provide benefits with any mechanism that performs security checks at the operating system level. In addition, the present invention may also be used with software-fault isolation on a per-thread basis, or with a virtual machine where restrictions are determined from the stack of classes currently executing. Moreover, the present invention does not necessarily depend on kernel-mode operation, as with software-fault isolation or a virtual machine it may be implemented in user-mode.
In general, in the Windows NT operating system, a user performs tasks by accessing the system' s resources via processes (and their threads) . For purposes of simplicity herein, a process and its threads will be considered conceptually equivalent, and will thus hereinafter simply be referred to as a process. Also, the system's resources, including files, shared memory and physical devices, which in Windows NT are represented by objects, will be ordinarily referred to as either resources or objects herein.
When a user logs on to the Windows NT operating system and is authenticated, a security context is set up for that user, which includes building an access token 60. As shown in the left portion of FIG. 2, a conventional user-based access token 60 includes a UserAndGroups field 62 including a security identifier (Security ID, or SID) 64 based on the user's credentials and one or more group IDs 66 identifying groups (e.g., within an organization) to which that user belongs. The token 60 also includes a privileges field 68 listing any privileges assigned to the user. For example, one such privilege may give an administrative-level user the ability to set the system clock through a particular application programming interface (API). Note that privileges over-ride access control checks, described below, that are otherwise performed before granting access to an object.
As will be described in more detail below and as generally represented in FIG. 3, a process 70 desiring access to an object 72 specifies the type of access it desires (e.g., obtain read/write access to a file object) and at the operating system (e.g., kernel) level provides its associated token 60 to an object manager 74. The object 72 has a security descriptor 76 associated therewith, and the object manager 74 provides the security descriptor 76 and the token 60 to a security mechanism 78. The contents of the security descriptor 76 are typically determined by the owner (e.g., creator) of the object, and generally comprise a (discretionary) access control list (ACL) 80 of access control entries, and for each entry, one or more access rights (allowed or denied actions) corresponding to that entry. Each entry comprises a type (deny or allow) indicator, flags, a security identifier (SID) and access rights in the form of a bitmask wherein each bit corresponds to a permission (e.g., one bit for read access, one for write and so on) . The security mechanism 78 compares the security IDs in the token 60 along with the type of action or actions requested by the process 70 against the entries in the ACL 80. If a match is found with an allowed user or group, and the type of access desired is allowable for the user or group, a handle to the object 72 is returned to the process 70, otherwise access is denied.
By way of example, a user with a token identifying the user as a member of the * ccounting" group may wish to access a particular file object with read and write access. If the file object has the "Accounting" group identifier of type allow m an entry of its ACL 80, and the group has rights enabling read and write access, a handle granting read and write access is returned, otherwise access is denied. Note that for efficiency reasons, the security check is performed only when the process 70 first attempts to access the object 72 (create or open), and thus the handle to the object stores the type of access information so as to limit the actions that can be performed therethrough.
The security descriptor 76 also includes a system ACL, or SACL 81, which comprises entries of type audit corresponding to client actions that are to be audited. Flags m each entry indicate whether the audit is monitoring successful or failed operations, and a bitmask m the entry indicates the type of operations that are to be audited. A security ID m the entry indicates the user or group being audited. For example, consider a situation wherein a particular group is being audited so as to determine whenever a member of that group that does not have write access to a file object attempts to write to that file. The SACL 81 for that file object includes an audit entry having the group security identifier therein along with an appropriately set fail flag and write access bit. Whenever a client belonging to that particular group attempts to write to the file object and fails, the operation is logged.
Note that the ACL 80 may contain one or more identifiers that are marked for denying users of groups access (as to all rights or selected rights) rather than granting access thereto. For example, one entry listed m the ACL 80 may otherwise allow members of wGroup3" access to the object 72, but another entry m the ACL 80 may specifically deny "Group? ' all access. If the token "
60 includes the "Group24" security ID, access will be denied regardless of the presence of the "Group3" security ID. Of course to function properly, the security check is arranged so as to not allow access via the "Groups" entry before checking the "DENY ALL" status of the Group24 entry, such as by placing all DENY entries at the front of the ACL 80. As can be appreciated, this arrangement provides for improved efficiency, as one or more isolated members of a group may be separately excluded in the ACL 80 rather than having to individually list each of the remaining members of a group to allow their access.
Note that instead of specifying a type of access, a caller may request a MAXIMUM_ALLOWED access, whereby an algorithm determines the maximum type of access allowed, based on the normal UserAndGroups list versus each of the entries in the ACL 80. More particularly, the algorithm walks down the list of identifiers accumulating the rights for a given user (i.e., OR-ing the various bitmasks) . Once the rights are accumulated, the user is given the accumulated rights. However, if during the walkthrough a deny entry is found that matches a user or group identifier and the requested rights, access is denied.
Restricted Tokens
A restricted token is created from an existing access token (either restricted or unrestricted) as described below. As also described below, if the restricted token includes any restricted security IDs, the token is subject to an additional access check wherein the restricted security IDs are compared against the entries in the object's ACL. The primary use of a restricted token is for a process to create a new process with a restricted version of its own token. The restricted process is then limited in the actions it may perform on resources. For example, a file object resource may have in its ACL a single restricted SID identifying the Microsoft Word application program, such that only restricted processes having the same Microsoft Word restricted SID in its associated restricted token may access the file object. Note that the original user still needs to have access to the object, so to access it, the ACL also needs to contain an access control entry granting the user access, as well as the Microsoft Word program. Then, for example, untrusted code such as downloaded via a browser could be run in a restricted process that did not have the Microsoft Word restricted Security ID in its restricted token, preventing that code's access to the file object.
For security reasons, creating a process with a different token normally requires a privilege known as the SeAssignPrimaryToken privilege. However, to allow processes to be associated with restricted tokens, process management allows one process with sufficient access to another process to modify its primary token to a restricted token, if the restricted token is derived from the primary token. By comparing the ParentTokenld of the new process's token with the Tokenld of the existing process' token, the operating system 35 may ensure that the process is only creating a restricted version of itself. A restricted token 84 has less access than its parent token, and may, for example, prevent access to an object based on the type of process (as well as the user or group) that is attempting to access the object, instead of simply allowing or denying access solely based on the user or group information. A restricted token may also not allow access via one or more user or group security IDs specially marked as "USE_FOR_DENY_ONLY," even though the parent token allows access via those SIDs, and/or may have privileges removed that are present in the parent token.
Thus, one way in which to reduce access is to change an attribute of one or more user and/or group security identifiers in a restricted token so as to be unable to allow access, rather than grant access therewith.
Security IDs marked USE_FOR_DENY_ONLY are effectively ignored for purposes of granting access, however, an ACL that has a "DENY" entry for that security ID will still cause access to be denied. By way of example, if the Group2 security ID in the restricted token 84 (FIG. 3) is marked USE_FOR_DENY__ONLY, when the user's process attempts to access an object 72 having the ACL 80 that lists Group2 as allowed, that entry is effectively ignored and the process will have to gain access by some other security ID. However, if the ACL 80 includes an entry listing Group2 as DENY with respect to the requested type of action, then once tested, no access will be granted regardless of other security IDs.
Note that access to objects cannot be safely reduced by simply removing a security ID from a user's token, since that security ID may be marked as "DENY" in the ACL of some objects, whereby removing that identifier would grant rather than deny access to those objects. Thus, a SID's attributes may be modified to USE_FOR_DE Y_ONLY m a restricted token. Moreover, no mechanism is provided to turn off this USE_FOR_DENY__ONLY security check.
Another way to reduce access in a restricted token is to remove one or more privileges relative to the parent token. For example, a user having a normal token with administrative privileges may set up a system such that unless that user specifically informs the system otherwise, the user' s processes will run with a restricted token having no privileges. As can be appreciated, this prevents inadvertent errors that may occur when the user is not intentionally acting in an administrative capacity. Similarly, programs may be developed to run in different modes depending on a user's privileges, whereby an administrative-level user has to run the program with administrative privileges to perform some operations, but operate with reduced privileges to perform more basic operations. Again, this helps to prevent serious errors that might otherwise occur when such a user is simply attempting to perform normal operations but is running with elevated privileges.
Yet another way to reduce a token's access is to add restricted security IDs thereto. Restricted security IDs are numbers representing processes, resource operations and the like, made unique such as by adding a prefix to GUIDs or numbers generated via a cryptographic hash or the like, and may include information to distinguish these Security IDs from other Security IDs. Although not necessary to the invention, for convenience, various application programming interfaces (APIs) are provided to interface applications and users with Security IDs, such as to accomplish a GUID to Security ID conversion, represent the Security IDs in human readable form, and so on.
In addition to restricting access to a resource based on the application (process) requesting access, specific Security IDs may be developed based on likely restricted uses of a resource. By way of example, a Security ID such as "USE_WINDOWS" would be placed in the default ACLs of windowstations and the desktop to allow access thereto only by a process having a corresponding
SID in its restricted token. Similarly, the default ACL of a printer object may include a USE_PRINTING SID in its default ACL, so that a process could create a restricted process with only this Security ID listed in its restricted token, whereby the restricted process would be able to access the printer but no other resource. As can be appreciated, numerous other Security IDs for accessing other resources may be implemented. As shown in FIG. 3, restricted security IDs are placed in a special field 82 of a restricted token 84, such as for identifying a process that is requesting an action. As described in more detail below, by requiring that both at least one user (or group) security ID and at least one restricted security ID be granted access to an object, an object may selectively grant access based on a requesting process (as well as a user or group) . For example, an object such as a file object may allow Microsoft Word, Microsoft Excel or Windows Explorer processes to access it, but deny access to any other process. Moreover, each of the allowed processes may be granted different access rights.
The design provides for significant flexibility and granularity within the context of a user to control what different processes are allowed to do. One usage model for these features, described in detail below, includes a distinction between trusted applications and untrusted applications. Note that the term "application" is used in a generic sense to describe any piece of code that may be executed in "user mode" under a given security context. For example, an application such as Microsoft Word may run as a process from an ActiveX control, which may be loaded into an existing process and executed. Applications which launch other applications, such as Microsoft's Internet Explorer, may introduce a "trust model" using this infrastructure.
By way of example, and as described in more detail below, an application such as Internet Explorer can use restricted tokens to execute untrusted executable code under different processes, and control what those processes can do within the user' s overall access rights and privileges. To this end, the Internet Explorer application creates a restricted token from its own token, and determines which restricted security IDs will be placed in the restricted token. Then, the untrusted executable code is restricted to accessing only those objects that the restricted context may access.
Moreover, entries corresponding to restricted SIDs and other restrictions may be placed in a field of the
SACL 81 for auditing purposes. For example, the SACL of a resource may be set up to audit each time that Internet Explorer program attempts read or write access of that resource, and/or the use of SIDs marked USE_FOR_DENY_ONLY may be audited. For purposes of simplicity, auditing will not be described in detail hereinafter, however it can be readily appreciated that the concepts described with respect to access control via restricted SIDs are applicable to auditing operations. To create a restricted token from an existing token, an application programming interface (API) is provided, named NtFilterToken, as set forth below:
NTSTATUS
NtFilterToken (
IN HANDLE ExistingTokenHandle,
IN ULONG Flags,
IN PTOKEN GROUPS SidsToDisable OPTIONAL,
IN pTOKEN" PRIVILEGES Privileges ;ToDelete OPTIONAL,
IN PTOKEN" GROUPS RestrictingSids OPTIONAL,
OUT PHANDLE NewTokenHandle );
- The NtFilterToken API is wrapped under a Win32 API named CreateRestrictedToken, further set forth below:
WINADVAPI
BOOL
APIENTRY
CreateRestric "tedToken (
IN HANDLE ExistingTokenHandle,
IN DWORD Flags,
IN DWORD DisableSidCount,
IN PSID AND ATTRIBUTES SidsToDisable OPTIONAL,
IN DWORD DeletePrivilegeCount,
IN PLUID AND ATTRIBUTES PrivilegesToDelete OPTIONAL,
IN DWORD RestrictedSidCount,
IN PSID AND ATTRIBUTES SidsToRestπct OPTIONAL,
OUT PHANDLE NewTokenHandle ) ;
As represented m FIGS. 2 and 4 - 5, these APIs 86 work in conjunction to take an existing token 60, either restricted or unrestricted, and create a modified (restricted) token 84 therefrom. The structure of a restricted token, which contains the identification information about an instance of a logged-on user, includes three new fields, ParentTokenld, RestrictedSidCount and RestrictedSids (shown in boldface below) :
Typedef struct TOKEN {
TOKEN SOURCE TokenSource; // Ro: 16-Bytes
LUID Tokenld; // Ro: 8-Bytes
LUID Authentications; // Ro: 8-Bytes
LUID ParentTokenld; // Ro: 8-Bytes
LARGE INTEGER ExpirationTime; // Ro: 8-Bytes
LUID Modifiedld; // r: 8-Bytes
ULONG UserAndGroupCount; // Ro: 4-Bytes
ULONG RestrictedSidCount; // Ro: 4-Bytes
ULONG PrivilegeCount; // Ro: 4-Bytes
ULONG VariableLength; // Ro: 4-Bytes
ULONG DynamicCharged; // Ro: 4-Bytes
ULONG DynamicAvailable; // Wr: 4-Bytes (Mod)
ULONG DefaultOwnerlndex; // Wr: 4-Bytes (Mod)
PSID AND ATTRIBUTES UserAndGroups ; // Wr: 4-Bytes (Mod)
PSID AND ATTRIBUTES RestrictedSids; // Ro: 4-Bytes PSID PrimaryGroup; // Wr: 4-Bytes (Mod)
PLUID AND ATTRIBUTES Privileges; // Wr: 4-Bytes (Mod)
PULONG DynamicPart; // Wr: 4-Bytes (Mod)
PACL DefaultDacl; // Wr: 4-Bytes (Mod)
TOKEN TYPE TokenType; // Ro: 1-Byte
SECURITY_IMPERSONATION LEVEL
ImpersonationLevel ; // Ro: 1-Byte
UCHAR TokenFlags; // Ro: 4-Bytes
BOOLEAN TokenlnUse; // Wr: 1-Byte
PSECURITY TOKEN PROXY DATA ProxyData; // Ro: 4-Bytes
PSECURITY TOKEN AUDIT DATA AuditData; // Ro: 4-Bytes
ULONG VariablePart; // Wr: 4-Bytes (Mod)
} TOKEN, * PTOKEN;
Note that when a normal (non-restricted) token is now created, via a CreateToken API, the RestrictedSids field is empty, as is the ParentTokenld field.
To create a restricted token 84, a process calls the CreateRestrictedToken API with appropriate flag settings and/or information in the input fields, which in turn invokes the NtFilterToken API. As represented beginning at step 400 of FIG. 4, the NtFilterToken API checks to see if a flag named DISABLE_MAX_SIDS is set, which indicates that all Security IDs for groups in the new, restricted token 84 should be marked as USE_FOR_DENY_ONLY . The flag provides a convenient way to restrict the (possibly many) groups in a token without needing to individually identify each of the groups. If the flag is set, step 400 branches to step 402 which sets a bit indicating USE_FOR_DENY__ONLY on each of the group security IDs in the new token 84. If the DISABLE_MAX_SIDS flag is not set, then step 400 branches to step 404 to test if any security IDs are individually listed in a SidsToDisable Field of the NtFilterToken API. As shown at step 404 of FIG. 4, when the optional SidsToDisable input field is present, at step 406, any Security IDs listed therein that are also present in the UserAndGroups field 62 of the parent token "
60 are individually marked as USE_FOR_DENY_ONLY in the UserAndGroups field 88 of the new restricted token 84. As described above, such Security IDs can only be used to deny access and cannot be used to grant access, and moreover, cannot later be removed or enabled. Thus, in the example shown in FIG. 2, the Group2 security ID is marked as USE_FOR_DENY_ONLY in the restricted token 84 by having specified the Group2 security ID in the SidsToDisable input field of the NtFilterToken API 86. The filter process then continues to step 410 of FIG. 4, wherein a flag named DISABLE_MAX_PRIVILEGES is tested. This flag may be similarly set as a convenient shortcut to indicate that all privileges in the new, restricted token 84 should be removed. If set, step 410 branches to step 412 which deletes all privileges from the new token 84.
If the flag is not set, step 410 branches to step 414 wherein the optional PrivilegesToDelete field is examined. If present when the NtFilterToken API 86 is called, then at step 416, any privileges listed in this input field that are also present in the privileges field 68 of the existing token 60 are individually removed from the privileges field 90 of the new token 84. In the example shown in FIG. 2, the privileges shown as
"Privilege2 " to "Privilege/' have been removed from the privileges field 90 of the new token 84 by having specified those privileges in the PrivilegesToDelete input field of the NtFilterToken API 86. This provides the ability to reduce the privileges available in a token. The process continues to step 420 of FIG. 5.
When creating a restricted token 84, if SIDs are present in the RestrictingSids input field at step 420, then a determination is made as to whether the parent token is a normal token or is itself a restricted token having restricted SIDs. An API, IsTokenRestricted is called at step 422, and resolves this question by querying (via the NtQuerylnformationToken API) the RestrictingSids field of the parent token to see if it is not NULL, whereby if not NULL, the parent token is a restricted token and the API returns a TRUE. If the test is not satisfied, the parent token is a normal token and the API returns a FALSE. Note that for purposes of the subsequent steps 426 or 428, a parent token that is restricted but does not have restricted SIDs (i.e., by having privileges removed and/or USE_FOR_DENY__ONLY SIDs) may be treated as being not restricted.
At step 424, if the parent token is restricted, step 424 branches to step 426 wherein any security IDs that are in both the parent token' s restricted Security ID field and the API's restricted Security ID input list are put into the restricted Security ID field 92 of the new token 84. Requiring restricted security IDs to be common to both lists prevents a restricted execution context from adding more security IDs to the restricted Security ID field 92, an event which would effectively increase rather than decrease access. Similarly, if none are common at step 426, any token created still has to be restricted without increasing the access thereof, such as by leaving at least one restricted SID from the original token in the new token. Otherwise, an empty restricted SIDs field in the new token might indicate that the token is not restricted, an event which would effectively increase rather than decrease access.
Alternatively, if at step 424 the parent token is determined to be a normal token, then at step 428 the RestrictingSids field 92 of the new token 84 is set to those listed in the input field. Note that although this adds security IDs, access is actually decreased since a token having restricted SIDs is subject to a secondary access test, as described m more detail below.
Lastly, step 430 is also executed, whereby the ParentTokenld 93 m the new token 84 is set to tne
Tokenld of the existing (parent) token. This provides the operating system with the option of later allowing a process to use a restricted version of its token m places that would not normally be allowed except to the parent token.
Turning an explanation of the operation of restricted tokens with particular reference to FIGS. 6 - 8, as represented m FIG. 6, a restricted process 94 has been created and is attempting to open a file object 70 with read/write access. In the security descriptor of the object 72, the ACL 80 has a number of security IDs listed therein along with the type of access allowed for each ID, wherein "RO" indicates that read only access is allowed, "WR" indicates read/write access and "SYNC" indicates that synchronization access is allowed. Note that "XJones" is specifically denied access to the object 72, even if "XJones" would otherwise be allowed access through membership m an allowed group. Moreover, the process 94 having this token 84 associated therewith will not be allowed to access any object via the "Basketball" security ID m the token 84, because this identifier is marked " DENY" (i.e., USE__FOR_DENY_ONLY) .
For purposes of security, restricted security contexts are primarily implemented m the Windows NT kernel. To attempt to access the object 72, the process 94 provides the object manager 74 with information identifying the object to which access is desired along with the type of access desired, (FIG. 8, step 800) . In response, as represented at step 802, the object manager 74 works m conjunction with the security mechanism 78 to compare the user and group security IDs listed m the token 84 (associated with the process 94) against the entries m the ACL 80, to determine if the desired access should be granted or denied.
As generally represented at step 804, if access is not allowed for the listed user or groups, the security check denies access at step 814. However, if the result of the user and group portion of the access check indicates allowable access at step 804, the security process branches to step 806 to determine if the restricted token 84 has any restricted security IDs. If not, there are no additional restrictions, whereby the access check is complete and access is granted at step 812 (a handle to the object is returned) based solely on user and group access. In this manner, a normal token is essentially checked as before. However, if the token includes restricted security IDs as determined by step 806, then a secondary access check is performed at step 808 by comparing the restricted security IDs against the entries in the ACL 80. If this secondary access test allows access at step 810, access to the object is granted at step 812. If not, access is denied at step 814. As logically represented m FIG. 7, a two-part test is thus performed whenever restricted Security IDs are present m the token 84. Considering the security IDs m the token 84 and the desired access bits 96 against the security descriptor of the object 72, both the normal access test and (bitwise AND) the restricted security IDs access test must grant access m order for the process to be granted access to the object. Although not necessary to the invention, as described above, the normal access test proceeds first, and if access is denied, no further testing is necessary. Note that access may be denied either because no security ID in the token matched an identifier in the ACL, or because an ACL entry specifically denied access to the token based on a security identifier therein.
Thus, in the example shown in FIG. 6, no access to the object 72 will be granted to the process 94 because the only Restricted SID in the token 84 (field 92) identifies "Internet Explorer," while there is no counterpart restricted SID in the object's ACL 80.
Although the user had the right to access the object via a process running with a normal token, the process 94 was restricted so as to only be able to access objects having an "Internet Explorer" SID (non-DENY) in their ACLs . Note that instead of specifying a type of access, the caller may have specified MAXIMUM_ALLOWED access, whereby as described above, an algorithm walks through the ACL 80 determining the maximum access. With restricted tokens, if any type of user or group access at all is granted, the type or types of access rights allowable following the user and groups run is specified as the desired access for the second run, which checks the RestrictedSids list. In this way, a restricted token is certain to be granted less than or equal to access than the normal token.
Lastly, it should be noted that the security model of the described herein may be used in conjunction with other security models. For example, capability-based security models residing on top of an operating system may be used above the operating system-level security model of the present invention. JOΓJS
A Job is a kernel object having a set of processes organized therein, wherein each job may have a different type of restriction associated therewith. In keeping with the present invention, restricted tokens may be integrated with Windows NT Job Objects to allow management of multiple processes running under the same restrictions. A Job object restriction is set forth below:
Typedef struct JOBOBJECT SECURITY LIMIT INFORMATION {
ULONG SecurityLimitFlags ;
HANDLE JobToken ;
PTOKEN GROUPS SidsToDisable ;
PTOKEN PRIVILEGES PrivilegesToDelete ;
PTOKEN GROUPS RestrictedSids ;
} JOBOBJECT SECURITY LIMIT INFORMATION,
*PJOBOBJECT SECURITY LIMIT INFORMATION ;
wherein the relevant SecurityLimitFlags may be:
Figure imgf000027_0001
These various pieces of information can be set on a Job object using an NtSetlnformationJobObject API, while a process is assigned to a job using the NtAssignProcessToJobObject API. The security limit set on the job takes effect when a process is assigned. To restrict a job, the JOB_OBJECT_SECURITY_FILTER_TOKENS limit flag is set, whereby the primary token of the process being assigned to the job is filtered using the SidsToDisable, PrivilegesToDelete and RestrictedSids information provided in the security limit information, m a similar manner to how tokens associated with processes are filtered as described above.
As shown m FIG. 9, a ob 110 has a number of processes (e.g., processes 112 - 114) assigned thereto via the job NtAssignProcessToJobObject API. Each process 112 - 114 has a respective token 116 - 116 associated therewith that is the same with respect to its restrictions, shown as "Restrictions R." For example, the Job object 110 restricts the processes 112 - 114 therein to only perform certain operations, because the tokens 116a -116 under which they are running have certain Security IDs (e.g., Administrator SID) disabled, certain privileges removed and/or a set of restricted Security IDs added. Note that the tokens may be the same with respect to their other access rights as well, m which event all of the tokens are essentially identical, but this is not required. If a process (e.g., the process 114) produces another process 118, that process 118 also runs m the job 110 with the same restrictions R, as the job object 110 ensures that the same restrictions R are associated with the new process 118 via its token 116α.
Running Untrusted Content In accordance with one aspect of the present invention, restricted tokens are used to set up restricted security contexts for running untrusted content. One type of content that is typically not trusted is content downloaded from an Internet site. To restrict such content, a restricted process may be set up for running each site that is browsed, by associating the process with (at least) a geneπcally restricted token along with other restrictions. Note that the process may also be within a job object, whereby any processes created by the site's process are automatically given the same restrictions. Another advantage to job objects is that windowing operations may be restricted, so that, for example, a process cannot shut down the machine or access clipboard data. In any event, any actions that the site's content performs, such as via dynamic HTML, Java or Active-X controls, takes place within the process, whereby it is subject to the restrictions of the process. Note that different frames are treated as different sites, regardless of their actual site source, even though multiple frames may simultaneously be displayed in windows on the screen.
By way of example, as shown m FIG. 10, any content accessed via a browser 130, such as Internet Explorer, may be run in a process 132 that has a restricted token 134 including an "Internet Explorer" restricted SID m its restricted SIDs field 136. As described above, this automatically prevents access to any resource not having an allow entry corresponding to the Internet Explorer SID, (unless access is via another matching restricted
SID) . Thus, for example, the process 132 may render HTML pages m a window of Internet Explorer, but is restricted from doing much else unless an ACL of a resource specifically includes an entry with a corresponding restricted SID that allows the action.
Another way m which to restrict downloaded Internet content is to restrict access to resources based on the site identity. For example, each site has a unique URL (Uniform Resource Locator) , and may have a binary certificate ID. To restrict based on the URL, as shown m FIG. 11, the browser 130 acts as a discrimination mechanism that passes the site URL 138 to a converter 140 that converts the URL string into a restricted SID. One such mechanism uses a one-way cryptographic hash such as MD5 to convert the string into 128-bit binary value, which then becomes a restricted SID by adding a small amount of information such as a header or the like thereto indicating that the number is a SID and how the number was generated. Such a SID is, to an extremely high probability, unique with respect to other SIDs. Note that if a binary certificate ID is available for the site, then that value may be used to generate the restricted SID. In any event, as shown in FIG. 10, the restricted SID is placed in the restricted SIDs field 136 of the restricted token 134 associated with the process 132 set up for that site.
Further, the restriction may be based on Internet zones (a collection of sites) . For example, as also shown in FIG. 11, user may set up a zone comprising a list of specifically trusted sites, and another for specifically untrusted. The trusted zone will correspond to one restricted SID while the untrusted zone will correspond to another. Zones may also be set up to distinguish between Intranet sites and Internet sites. A further distinction may be made for Internet sites having one type of certificate and so on, to any desired granularity wherein a distinction may be made. In any event, the browser 130 has access to information 131 that groups sites into zones, whereby a restricted SID may be generated that corresponds to the site's zone, and placed in the restricted token 136 to identify the zone to system resources for ACL-based security checking.
As described above, once a restricted SID is present in a token, the security mechanism 78 performs an access evaluation with a user and group check followed by (if the user and group test is passed) a check of the restricted SIDs. As a result, the ACL for each resource determines how untrusted code is handled by the presence or absence of corresponding entries therein. For example, a file object may allow read access to a specifically trusted site or zone, but not any other type of access or any access whatsoever to any other site or zone. A highly confidential file may specifically deny access to any restricted token having the "Internet Explorer" SID therein so as to prevent any access via some other restricted SID. Thus, for example, as shown in FIG. 10, the Resource A (142) allows read access to the process 132 because its ACL 144 contains a
"Sitel.com" entry corresponding to the "Sitel.com" restricted SID in the restricted token 134 of the process 132. However, Resource B (146) will not allow access because no corresponding entry is present. While the above mechanism functions to restrict access, certain difficulties arise in that resources may lack the granularity to discriminate based on the various distinctions such as sites or zones. For example, the process set up for a particular Internet site may need to access that site. However, the driver that handles
Windows sockets (the AFD device driver) has its ACL set up to either allow or deny networking, but cannot practically distinguish between each site or zone. To deny networking altogether prevents a process from accessing its own corresponding site, yet allowing a process to access any site allows the process access to other sites, which can potentially divulge confidential information about a client. Reasons to restrict network access include preventing access to unsecured files on file servers not normally accessible from the Internet, preventing access to unsecured internal databases, preventing attacks on network resources (for example via bad packets or DHCP responses) and preventing information leaks about other possible ways to reach the network. To resolve this dilemma by selectively restricting a process to certain sites, the present invention generally restricts the process from networking, but employs a trusted helper process that can perform networking for the site. The helper process restricts the process to an extent that allows the restricted process to access only selected sites (e.g., all sites ending in "Microsoft.com") as determined by the helper process. More particularly, as shown in FIG. 13, the restricted process 132 is denied direct access to the windows sockets AFD driver 150, (as represented by the "X"), whereby the restricted process 132 cannot directly get the socket handle for any site, including its own. Note that by denying access to restricted processes via the ACL 152 of the device driver 150, the device driver 150 may not be accessed by the restricted process 132 via some other manner, such as by directly calling into the kernel. However, a helper process 154, which is trusted, has access to the driver 150 via its own non-restricted token 156 and can retrieve a socket handle. By modifying the Winsock connect ( ) API 158 to invoke the helper process 154 whenever a restricted process 132 attempts to retrieve a socket handle, the handle to one of a site' s verified or allowed sockets is returned when the appropriate mechanism (i.e., the API 158) is used.
More particularly, as shown in FIG. 14, when the Winsock socket () and connect ( ) API 158 is called at step 1400 to return a handle to a socket, the connect ( ) API 158 first checks at step 1502 to see if the calling process 132 is restricted via an appropriate restricted SID in its token 134. If not restricted, step 1402 branches to step 1404, wherein the connect ( ) API 158 operates as before to return a socket handle or an appropriate errorcode (e.g., no socket available, host unreachable, access denied and so on) .
However, when a restricted process 132 makes the connect ( ) call as determined by step 1402, the connect ( ) API 158 calls the helper process 154 (FIGS. 13 and 18) at step 1406. As represented by step 1510 of FIG. 15, the helper process 154 extracts the site information of the site from the restricted token 134, and at step 1512, compares the site' s allowed (or denied) addresses with the requested address. If they are not allowed, step
1512 branches to step 1514 wherein the socket request is effectively denied such as by setting an appropriate errorcode. If they are the same, step 1512 branches to step 1516, wherein the helper process 154 accesses the device driver 150 to obtain the socket handle to the site corresponding to the process 132 (assuming a handle is available and that there are no other errors) . The helper process 154 (FIG. 15) duplicates the handle at step 1518, then returns to the connect ( ) API 158 (FIG. 14) with either the duplicated handle or some indication of an error, after which the connect ( ) API 158 returns the socket handle or an errorcode to the restricted process 132 at step 1420 (FIG. 14) . In this manner, if a handle is returned, the restricted process 132 may thereafter access the verified / allowed site via the handle, but no other sites. Note that the helper process 154 is trusted, and is carefully written to allow only that site's socket handle.
Similarly, the Wininet.dll which (among other functions) downloads URL-identified data at the file level employs a helper process when a restricted process downloads a file. The helper process extracts and validates the URL that a site is requesting, a d if validated, does the downloading and other Wininet work while providing notifications to the restricted process.
As can be readily appreciated, allowing the helper process to set the ACLs on downloaded files secures those files from other sites. Again, when a restricted process calls the wininet-related API, the API invokes the appropriate helper process.
In addition to restricted access to other sites, a restricted process set up for a site is restricted from accessing files other than its own. To this end, any file created by a site on the user's system is placed in a folder that has an ACL entry specifically corresponding to that site. For example, as shown in FIG. 16, (wherein folders are represented as triangles to indicate the hierarchical folder structure), each site (Sitei.com to Siten.com) has its own subfolder 160: - 160n in the file system, such as under an Internet site file folder 162. Since only the process of that site (e.g., Sitel.com) will have a restricted SID in its token that corresponds to the entry in its ACL 164ι, no other site (e.g., Site2.com) will be able to access its files, and vice- versa. Such isolation enables sites to access (e.g., create, open, read, write and delete) its own files, but prevents content from another site from accessing those files . AS shown in FIG. 17, the mechanism for accomplishing isolation of files based on a site may be built into the APIs 170 for opening and creating files. The APIS for creating and opening files are set up to recognize (by examining the restricted SIDs in the restricted token 134) when a process 132 set up for an Internet site is calling, and adjust the path to appropriately place and/or locate each file based on the restricted token 134. Note that since other file operations (e.g., read, write and delete) use the file handle returned by these APIs, the other APIs need not be modified for path redirection.
Similarly, as shown in FIG. 18, a restricted process 132 may only indirectly access the system registry 174, but in accordance with the invention, only via a virtualized view of the registry, e.g., under its own site-based key name (regardless of the key name provided by the process) . For example, a site may include an Active-X control that tries to write to the system registry 174. To provide a virtualized view of the registry for a restricted process, the registry WIN32 APIs 176 for accessing the registry (e.g., the RegSaveKeyO and RegRestoreKey ( ) APIs) redirect restricted processes to and from their site-specific subtree 178 in the registry (or copy thereof) . In this way, the untrusted content believes it is able to register information in the registry 174 at the specified location, but actually is restricted to accessing a subtree or virtual registry 178, thereby effectively isolating the existing registry information.
Another way in which untrusted content may be downloaded to a machine is via electronic mail (e-mail) . With e-mail, the level of trust depends on who sent the message, and, if there are any attachments, the type (and if known, the origin) of the attachments. FIG. 12 shows exemplary components for determining trust based on the identity of the sender, wherein a mail application 133 passes the identity 135 to a discrimination mechanism 137. The discrimination mechanism 137 determines a trust level of the user in order to convert the user identity
(and other criteria such as some authentication verifying that the identity is true) to a restricted SID 139, such as by looking up the restricted SID 139 in a trust level to SID table 141 or the like. The process 143 in which the mail content is run is associated with a restricted token 145 that includes the restricted SID 139.
FIG. 19 represents the general logic used by the discrimination mechanism 137 for an exemplary way to restrict access based on the sender of an e-mail message. Note that the "From" field of the message is used to determine the purported identity of the sender, while an authentication mechanism (e.g., within the e-mail application 133) such as via a digital signature may be used to verify that the sender is indeed the source of the message. It should further be noted that source- based restrictions may be similarly set up for on-line news, whereby the downloaded news content runs in a restricted context based on the identity of the sender. By way of example, consider the following simplified policy that may be set up on a machine, wherein an e-mail message sender is either highly trusted, trusted or untrusted, and the sender may or may not be authenticated. For example, an individual's supervisor and immediate co-workers may be highly trusted senders, employees and close friends trusted senders, and all others untrusted. On the machine, the resource ACLs are set up with entries corresponding to restricted SIDs such that a process with a restricted token having a restricted SID indicating a trust level of one is able to read and write files, while a trust level two process may only read files. A process with a restricted token having a restricted SID indicating a trust level of three is denied access to any resources. A trust level of zero means that the normal (non-restricted) token will be associated with the process.
As shown in FIG. 19 at step 1900, if the user is highly trusted (e.g., by comparing the name in the "From" field with a list of names), then step 1902 is executed to determine if the sender is authenticated. For example, the message may be digitally signed such that the recipient is assured of the true identity of the sender. If authenticated, then step 1904 sets the trust level to zero and step 1906 associates the normal token with the process set up for the message. If not authenticated, step 1908 sets the trust level to two, after which step 1920 creates a restricted token for the process that set up for the message based on the trust level of two and associates the restricted token with the process set up for the message. Note that the restricted SIDs for trust levels of one, two and three are predetermined and are stored on the machine such as in the table 141 or the like. If the user is not highly trusted then step 1900 branches to step 1910 to determine if the user is trusted or untrusted. In accordance with the security policy, if trusted, step 1910 branches to step 1912 to determine if the sender is authenticated. If so, the message process is set up so as to be level one trusted (read and write access) at steps 1914 and 1920. If not authenticated at step 1912, then the trust level is set to two (read only) at step 1908 and the process restricted accordingly at step 1920, again by looking up and inserting the appropriate restricted SID into the restricted token.
Lastly, if the user is untrusted, step 1910 branches to step 1916 wherein the trust level is set to three and at step 1920 the process is correspondingly restricted so as to be denied access to the system resources. Note that the above security policy suggests implementation via a point system, i.e., accumulate various points depending on the sender identity and various points if authenticated, and determine an access level based on the total points. As can be readily appreciated, a similar policy may be set up to restrict attachments. However, in addition to restricting based on the sender of an attachment, the attachment may be checked for its type. For example, executable files (*.exe, *.bat, *.com and so on) files may be differentiated from text only documents, which in turn are treated differently with respect to restrictions than Microsoft Word and Microsoft Excel documents (which may contain viruses or other unruly code via macros) . Indeed, any number of criteria may be employed and/or combined with other criteria to set up restricted security contexts according to a desired security policy.
Turning to a consideration of untrusted content on web servers, client processes, scripts and other such helper programs may be limited via restricted execution contexts as to what such content can do. In accordance with another aspect of the present invention, a first way for a web server to use contexts is to launch all such content in restricted contexts that prevent them from harming any core operating system data and from interfering with the data of other helper programs. As described above, this may be accomplished by setting up a process associated with an appropriately restricted token for each piece of untrusted content, thereby denying access to system data files via their ACLs and isolating any files of the untrusted content as desired. Note that memory protection is already present via process boundaries.
Moreover, restrictions may be based on the server script being run, such as by discriminating according to the author of the script and/or determining whether the script needs access to any files or needs to share files with other users or system files. For example, as shown in FIG. 20, by running a web server helper script 200 in a process 202 that is restricted by creating a restricted token 204 including a restricted SID 206 especially therefor, a script may be limited to only those resources it needs and no others, effectively limiting it from doing anything other than that for which it is intended. Thus, as shown in FIG. 20, the Scriptl 200 may access the ResourceX (218) and the ResourceZ (226) because each of their respective ACLs 220, 228 includes a "Scriptl" entry. Similarly, the Script2 210 may access the ResourceY (222) and the ResourceZ (226) because each of their respective ACLs 224, 228 includes a "Script2" entry. Thus, if the resources shown are data files, Scriptl cannot interfere with the data of Script2 and vice-versa, except possibly in resourceZ, however ResourceZ is designed to be a shared file. For example, via its ACL entries, the resource Z (226) may be a read only data file with respect to these processes 202, 212, whereby both scripts 200, 210 may use the file's information but not change it. Another option provided by the present invention is to create a Job object, which as described above, is a kernel-level object that contains the restrictions for all processes therein. Moreover, a job object may contain other limitations such as how much of a CPU' s processing may be consumed. As described above, any process added to that job receives the same restrictions, whereby the web server can create processes on the client's behalf and then add the process to an existing job. The restrictions are then automatically applied to the process.
In keeping with the present invention, the web server may further choose what restrictions to apply to client processes and the like based on any number of criteria, including the identity of the client (e.g., are they a company employee or not) , the method of authentication used by the client (e.g., by presenting a password, a certificate, using a smartcard, or even a thumbprint/retma scan), and also the client's location (e.g., based on whether the client is on the same network, dialing m, or connecting over the Internet) . FIG. 21 shows an exemplary flow diagram showing the logic for setting up trust levels depending on the type of authentication, and depending on whether the authentication took place via some remote (and thus theoretically less secure) connection, as opposed to via the local machine. For purposes of simplicity, the individual steps and logic of FIG. 21 will not be described m detail, since trust levels and their use m retrieving corresponding restricted SIDs to set up restricted tokens are similarly described above. Note, however, that m general, the more trusted the authentication, the lower the assigned trust level (which herein corresponds to increased access rights). Lastly, an Internet Service Provider can use restricted execution contexts to safely host multiple web sites on a single web server. To this end, each web site runs m a separate restricted execution context composeα of a job object and a restricted token. The job object provides quotas, so that a portion of the web server's resources is allocated to each web site. The restricted token provides isolation between the web sites, protecting private data such as customer lists, from unauthorized access. As can be seen from the foregoing detailed description, restricted execution contexts of the present invention restrict the access of untrusted content to system resources. Restrictions may be applied on a resource-by-resource basis, dependent on any criteria available to the system.
While the invention is susceptible to various modifications and alternative constructions, certain illustrated embodiments thereof are shown in the drawings and have been described above in detail. It should be understood, however, that there is no intention to limit the invention to the specific forms disclosed, but on the contrary, the intention is to cover all modifications, alternative constructions, and equivalents falling within the spirit and scope of the invention.

Claims

WHAT IS CLAIMED IS:
1. In a system having an operating system provided security mechanism that determines access of processes to resources based on information in an access token associated with each of the processes against security information associated with each of the resources, a method of restricting access of content to resources, comprising the steps of, setting up a process for the content, determining restriction information based on criteria available to the system, adding the restriction information to a restricted access token, and using the restricted access token as the access token of the content's process.
2. The method of claim 1 wherein the content comprises data obtained from an untrusted source.
3. The method of claim 2 wherein the untrusted source is a floppy disk.
4. The method of claim 2 wherein the content writes a file to the system, and further comprising the steps of generating a restricted security identifier corresponding to the site, adding the security identifier to security information of the file, and storing the file in the system.
5. The method of claim 2 wherein the content writes a file to the system, and further comprising the step of redirecting a path provided by the content to a path associated with the site.
6. The method of claim 2 wherein the data comprises network data and the untrusted source is a network site.
7. The method of claim 6 wherein the site is an Internet site, and the step of determining restriction information includes the step of generating a security identifier from unique information of the Internet site.
8. The method of claim 7 wherein the unique information comprises a binary certificate identifier of the Internet site.
9. The method of claim 7 wherein the unique information comprises a Uniform Resource Locator (URL) of the Internet site, and wherein the step of generating a security identifier includes the step of converting the URL to the restricted security identifier.
10. The method of claim 9 wherein the step of converting the URL to the restricted security identifier includes the step of hashing the URL with a cryptographic hash function.
11. The method of claim 1 wherein the content comprises an electronic mail message.
12. The method of claim 11 wherein the step of determining restriction information includes the steps of determining the sender of the message.
13. The method of claim 12 wherein the step of determining the sender of the message includes the step of authenticating the sender.
14. The method of claim 1 wherein the content comprises a script.
15. The method of claim 14 wherein the system is a server, and wherein the step of determining restriction information includes the step of determining how the client was authenticated to the server.
16. The method of claim 1 wherein the content comprises data downloaded from a site, further comprising the steps of determining a zone corresponding to the site, and wherein the step of adding the restriction information to a restricted access token includes the step of adding a restricted security identifier corresponding to the zone to the restricted access token.
17. The method of claim 1 further comprising the step of accessing the resource through a helper process.
18. The method of claim 17 wherein the helper process extracts information associated with the content from the restricted token.
19. The method of claim 17 further comprising the steps of detecting at an application programming interface an attempt to access a resource from the process having the restricted token as its access token, and in response, calling the helper process to access the resource, and returning information from the helper process to the process having the restricted token as its access token.
20. The method of claim 17 further comprising the step of setting the security information of the resource to allow access to the helper process and deny access to the to the process having the restricted token as its access token.
21. The method of claim 1 further comprising the step of putting the process into a job object.
22. The method of claim 1 wherein the content attempts to access a system registry, and further comprising the step of redirecting a registry location provided by the content to a registry location associated with the content.
23. In a computer system, a system for restricting access of content to resources, comprising, a process set up for the content, a discrimination mechanism for determining at least one restricted security identifier based on information corresponding to the content, a mechanism for creating a restricted access token for the process by adding the at least one restricted security identifier to the restricted access token, and a security mechanism for determining access of the content's process to a resource by comparing information in the restricted access token to security information associated with the resource .
24. The system of claim 23 wherein the content comprises data downloaded from a site.
25. The system of claim 24 wherein the site is an Internet site, and wherein the discrimination mechanism generates a restricted security identifier from information of the Internet site.
26. The system of claim 25 wherein the information of the Internet site comprises a binary certificate identifier of the Internet site.
27. The system of claim 25 wherein the information of the Internet site comprises a Uniform Resource Locator (URL) , and further comprising a converter for converting the URL to the restricted security identifier.
28. The system of claim 27 wherein the converter includes a one-way cryptographic hash function.
29. The system of claim 23 wherein the content comprises an electronic mail message.
30. The system of claim 29 wherein the discrimination mechanism determines a restricted security identifier based on the sender of the message.
31. The system of claim 23 wherein the content comprises a script.
32. The system of claim 23 wherein the system is a server, and wherein a restricted security identifier is generated according to how the client was authenticated to connect to the server.
33. The system of claim 23 further comprising a helper process for extracting information associated with the content from the restricted token and for accessing the resource on behalf of the process.
34. The system of claim 23 further comprising a job object, wherein the process runs in the job object.
35. In a computer server, a system for restricting access of content to resources, comprising, a plurality of content arranged in distinct web sites, the content of each web site having a process set up therefor, a discrimination mechanism for determining at least one restricted security identifier based on information corresponding to each site, a mechanism for creating a restricted access token for each process by adding the at least one restricted security identifier corresponding to the site to the restricted access token for the process thereof, and a security mechanism for determining access of each content's process to a resource by comparing information in the restricted access token to security information associated with the resource.
PCT/US1999/012912 1998-06-12 1999-06-09 Method and system for secure running of untrusted content WO1999064946A1 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
EP99955547A EP1086413B1 (en) 1998-06-12 1999-06-09 Method and system for secure running of untrusted content
AT99955547T ATE518180T1 (en) 1998-06-12 1999-06-09 METHOD AND SYSTEM FOR SECURE EXECUTION OF UNRELIABLE CONTENT
JP2000553883A JP4906188B2 (en) 1998-06-12 1999-06-09 Method and system for safely executing untrusted content

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US09/097,218 US6505300B2 (en) 1998-06-12 1998-06-12 Method and system for secure running of untrusted content
US09/097,218 1998-06-12

Publications (1)

Publication Number Publication Date
WO1999064946A1 true WO1999064946A1 (en) 1999-12-16

Family

ID=22262174

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US1999/012912 WO1999064946A1 (en) 1998-06-12 1999-06-09 Method and system for secure running of untrusted content

Country Status (6)

Country Link
US (1) US6505300B2 (en)
EP (1) EP1086413B1 (en)
JP (2) JP4906188B2 (en)
AT (1) ATE518180T1 (en)
ES (1) ES2368200T3 (en)
WO (1) WO1999064946A1 (en)

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002092221A (en) * 2000-08-18 2002-03-29 Hewlett Packard Co <Hp> Performance of service on computing platform
JP2002135334A (en) * 2000-10-27 2002-05-10 Nobuko Hirano Proxy transmission/reception method, and its system
JP2002247548A (en) * 2001-02-15 2002-08-30 Nec Access Technica Ltd Video display permission system and program for making computer perform video display
EP1513063A1 (en) * 2002-05-20 2005-03-09 NTT DoCoMo, Inc. Portable terminal, method, program, and storage medium for managing application start
US7130886B2 (en) 2002-03-06 2006-10-31 Research In Motion Limited System and method for providing secure message signature status and trust status indication
EP1483873B1 (en) * 2002-03-01 2006-11-02 Research In Motion Limited System and method for indicating the signature and trust status of a secure message
US7478136B2 (en) 2000-12-11 2009-01-13 Ntt Docomo, Inc. Terminal and repeater
GB2457305A (en) * 2008-02-11 2009-08-12 Symbian Software Ltd Controlling access to system resources using script and application identifiers
EP2187285A1 (en) * 2002-05-28 2010-05-19 Nokia Corporation Secure mobile wireless device
EP2332048A1 (en) * 2008-08-29 2011-06-15 Google, Inc. Altered token sandboxing
US8341399B2 (en) 2004-10-29 2012-12-25 Research In Motion Limited System and method for retrieving certificates associated with senders of digitally signed messages
US8539226B2 (en) 2001-06-12 2013-09-17 Blackberry Limited Certificate management and transfer system and method
US8826419B2 (en) 2011-09-02 2014-09-02 Avecto Limited Computer device with anti-tamper resource security
US8898473B2 (en) 2001-06-12 2014-11-25 Blackberry Limited System and method for compressing secure E-mail for exchange with a mobile data communication device
US9398023B2 (en) 2004-08-10 2016-07-19 Blackberry Limited Server verification of secure electronic messages
GB2561861A (en) * 2017-04-25 2018-10-31 Avecto Ltd Computer device and method for isolating untrusted content

Families Citing this family (301)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8079086B1 (en) 1997-11-06 2011-12-13 Finjan, Inc. Malicious mobile code runtime monitoring system and methods
US7058822B2 (en) 2000-03-30 2006-06-06 Finjan Software, Ltd. Malicious mobile code runtime monitoring system and methods
US9219755B2 (en) 1996-11-08 2015-12-22 Finjan, Inc. Malicious mobile code runtime monitoring system and methods
US7529856B2 (en) * 1997-03-05 2009-05-05 At Home Corporation Delivering multimedia services
US6370571B1 (en) 1997-03-05 2002-04-09 At Home Corporation System and method for delivering high-performance online multimedia services
US6986062B2 (en) * 1998-04-09 2006-01-10 Microsoft Corporation Set top box object security system
WO1999066383A2 (en) * 1998-06-15 1999-12-23 Dmw Worldwide, Inc. Method and apparatus for assessing the security of a computer system
US7162528B1 (en) * 1998-11-23 2007-01-09 The United States Of America As Represented By The Secretary Of The Navy Collaborative environment implemented on a distributed computer network and software therefor
US7225333B2 (en) * 1999-03-27 2007-05-29 Microsoft Corporation Secure processor architecture for use with a digital rights management (DRM) system on a computing device
US6647494B1 (en) * 1999-06-14 2003-11-11 Intel Corporation System and method for checking authorization of remote configuration operations
US6775828B2 (en) * 1999-07-19 2004-08-10 Microsoft Corporation Delayed uploading of user registration data
EP1085396A1 (en) 1999-09-17 2001-03-21 Hewlett-Packard Company Operation of trusted state in computing platform
US6678733B1 (en) * 1999-10-26 2004-01-13 At Home Corporation Method and system for authorizing and authenticating users
FR2802319B1 (en) * 1999-12-10 2004-10-01 Gemplus Card Int CAPACITY ACCESS CONTROL FOR ESPECIALLY COOPERATING APPLICATIONS IN A CHIP CARD
US7331058B1 (en) * 1999-12-16 2008-02-12 International Business Machines Corporation Distributed data structures for authorization and access control for computing resources
US7003571B1 (en) * 2000-01-31 2006-02-21 Telecommunication Systems Corporation Of Maryland System and method for re-directing requests from browsers for communication over non-IP based networks
US7246374B1 (en) 2000-03-13 2007-07-17 Microsoft Corporation Enhancing computer system security via multiple user desktops
US6842774B1 (en) * 2000-03-24 2005-01-11 Robert L. Piccioni Method and system for situation tracking and notification
US7373512B1 (en) * 2000-03-27 2008-05-13 Entrust Limited Method and apparatus for providing information security to prevent digital signature forgery
US6986037B1 (en) * 2000-04-07 2006-01-10 Sendmail, Inc. Electronic mail system with authentication/encryption methodology for allowing connections to/from a message transfer agent
US7577834B1 (en) * 2000-05-09 2009-08-18 Sun Microsystems, Inc. Message authentication using message gates in a distributed computing environment
KR20010107572A (en) * 2000-05-24 2001-12-07 포만 제프리 엘 Trust-based link access control
US7284124B1 (en) * 2000-06-05 2007-10-16 Microsoft Corporation Trust level based platform access regulation application
US6922782B1 (en) * 2000-06-15 2005-07-26 International Business Machines Corporation Apparatus and method for ensuring data integrity of unauthenticated code
US7155667B1 (en) * 2000-06-21 2006-12-26 Microsoft Corporation User interface for integrated spreadsheets and word processing tables
US7346848B1 (en) * 2000-06-21 2008-03-18 Microsoft Corporation Single window navigation methods and systems
US7624356B1 (en) * 2000-06-21 2009-11-24 Microsoft Corporation Task-sensitive methods and systems for displaying command sets
US6948135B1 (en) * 2000-06-21 2005-09-20 Microsoft Corporation Method and systems of providing information to computer users
WO2001098928A2 (en) * 2000-06-21 2001-12-27 Microsoft Corporation System and method for integrating spreadsheets and word processing tables
US7117435B1 (en) 2000-06-21 2006-10-03 Microsoft Corporation Spreadsheet fields in text
US6883168B1 (en) * 2000-06-21 2005-04-19 Microsoft Corporation Methods, systems, architectures and data structures for delivering software via a network
US7000230B1 (en) * 2000-06-21 2006-02-14 Microsoft Corporation Network-based software extensions
US7191394B1 (en) * 2000-06-21 2007-03-13 Microsoft Corporation Authoring arbitrary XML documents using DHTML and XSLT
US6874143B1 (en) 2000-06-21 2005-03-29 Microsoft Corporation Architectures for and methods of providing network-based software extensions
US6985963B1 (en) * 2000-08-23 2006-01-10 At Home Corporation Sharing IP network resources
US7660902B2 (en) * 2000-11-20 2010-02-09 Rsa Security, Inc. Dynamic file access control and management
US6938164B1 (en) * 2000-11-22 2005-08-30 Microsoft Corporation Method and system for allowing code to be securely initialized in a computer
GB2376763B (en) 2001-06-19 2004-12-15 Hewlett Packard Co Demonstrating integrity of a compartment of a compartmented operating system
US20030220880A1 (en) * 2002-01-17 2003-11-27 Contentguard Holdings, Inc. Networked services licensing system and method
US7603356B2 (en) * 2001-01-26 2009-10-13 Ascentive Llc System and method for network administration and local administration of privacy protection criteria
GB0102516D0 (en) * 2001-01-31 2001-03-21 Hewlett Packard Co Trusted gateway system
GB0102518D0 (en) * 2001-01-31 2001-03-21 Hewlett Packard Co Trusted operating system
GB2372345A (en) * 2001-02-17 2002-08-21 Hewlett Packard Co Secure email handling using a compartmented operating system
GB2372593B (en) * 2001-02-23 2005-05-18 Hewlett Packard Co Electronic communication
GB2372595A (en) * 2001-02-23 2002-08-28 Hewlett Packard Co Method of and apparatus for ascertaining the status of a data processing environment.
GB2372592B (en) 2001-02-23 2005-03-30 Hewlett Packard Co Information system
JP2002288093A (en) * 2001-03-26 2002-10-04 Fujitsu Ltd Electronic mail program
US7325193B2 (en) * 2001-06-01 2008-01-29 International Business Machines Corporation Automated management of internet and/or web site content
CN1265640C (en) * 2001-06-11 2006-07-19 松下电器产业株式会社 License management server, license management system and usage restriction method
GB2376765B (en) * 2001-06-19 2004-12-29 Hewlett Packard Co Multiple trusted computing environments with verifiable environment identities
GB2376762A (en) * 2001-06-19 2002-12-24 Hewlett Packard Co Renting a computing environment on a trusted computing platform
GB0114898D0 (en) * 2001-06-19 2001-08-08 Hewlett Packard Co Interaction with electronic services and markets
GB2376764B (en) * 2001-06-19 2004-12-29 Hewlett Packard Co Multiple trusted computing environments
GB2376761A (en) * 2001-06-19 2002-12-24 Hewlett Packard Co An arrangement in which a process is run on a host operating system but may be switched to a guest system if it poses a security risk
GB2378013A (en) * 2001-07-27 2003-01-29 Hewlett Packard Co Trusted computer platform audit system
US7523496B2 (en) * 2001-07-31 2009-04-21 International Business Machines Corporation Authenticating without opening electronic mail
US7698713B2 (en) 2001-09-20 2010-04-13 Google Inc. Altered states of software component behavior
US7076797B2 (en) * 2001-10-05 2006-07-11 Microsoft Corporation Granular authorization for network user sessions
US8261095B1 (en) 2001-11-01 2012-09-04 Google Inc. Methods and systems for using derived user accounts
US7617529B1 (en) * 2001-11-02 2009-11-10 Cisco Technology, Inc. Robust and flexible group structure
GB2382419B (en) * 2001-11-22 2005-12-14 Hewlett Packard Co Apparatus and method for creating a trusted environment
US20030105830A1 (en) * 2001-12-03 2003-06-05 Duc Pham Scalable network media access controller and methods
US7487233B2 (en) * 2001-12-05 2009-02-03 Canon Kabushiki Kaisha Device access based on centralized authentication
US6889210B1 (en) * 2001-12-12 2005-05-03 Pss Systems, Inc. Method and system for managing security tiers
US7380120B1 (en) 2001-12-12 2008-05-27 Guardian Data Storage, Llc Secured data format for access control
US7565683B1 (en) * 2001-12-12 2009-07-21 Weiqing Huang Method and system for implementing changes to security policies in a distributed security system
US7930756B1 (en) 2001-12-12 2011-04-19 Crocker Steven Toye Multi-level cryptographic transformations for securing digital assets
US7681034B1 (en) 2001-12-12 2010-03-16 Chang-Ping Lee Method and apparatus for securing electronic data
US10360545B2 (en) 2001-12-12 2019-07-23 Guardian Data Storage, Llc Method and apparatus for accessing secured electronic data off-line
USRE41546E1 (en) 2001-12-12 2010-08-17 Klimenty Vainstein Method and system for managing security tiers
US7562232B2 (en) * 2001-12-12 2009-07-14 Patrick Zuili System and method for providing manageability to security information for secured items
US7783765B2 (en) * 2001-12-12 2010-08-24 Hildebrand Hal S System and method for providing distributed access control to secured documents
US7921288B1 (en) 2001-12-12 2011-04-05 Hildebrand Hal S System and method for providing different levels of key security for controlling access to secured items
US10033700B2 (en) 2001-12-12 2018-07-24 Intellectual Ventures I Llc Dynamic evaluation of access rights
US7260555B2 (en) * 2001-12-12 2007-08-21 Guardian Data Storage, Llc Method and architecture for providing pervasive security to digital assets
US7178033B1 (en) 2001-12-12 2007-02-13 Pss Systems, Inc. Method and apparatus for securing digital assets
US7921450B1 (en) 2001-12-12 2011-04-05 Klimenty Vainstein Security system using indirect key generation from access rules and methods therefor
US7631184B2 (en) * 2002-05-14 2009-12-08 Nicholas Ryan System and method for imposing security on copies of secured items
US7921284B1 (en) 2001-12-12 2011-04-05 Gary Mark Kinghorn Method and system for protecting electronic data in enterprise environment
US8065713B1 (en) 2001-12-12 2011-11-22 Klimenty Vainstein System and method for providing multi-location access management to secured items
US8006280B1 (en) 2001-12-12 2011-08-23 Hildebrand Hal S Security system for generating keys from access rules in a decentralized manner and methods therefor
US7950066B1 (en) 2001-12-21 2011-05-24 Guardian Data Storage, Llc Method and system for restricting use of a clipboard application
US8176334B2 (en) 2002-09-30 2012-05-08 Guardian Data Storage, Llc Document security system that permits external users to gain access to secured files
WO2003075158A2 (en) * 2002-03-01 2003-09-12 Green Border Technologies Method and system for assured denotation of application semantics
JP4224250B2 (en) * 2002-04-17 2009-02-12 パイオニア株式会社 Speech recognition apparatus, speech recognition method, and speech recognition program
US8613102B2 (en) * 2004-03-30 2013-12-17 Intellectual Ventures I Llc Method and system for providing document retention using cryptography
US7748045B2 (en) * 2004-03-30 2010-06-29 Michael Frederick Kenrich Method and system for providing cryptographic document retention with off-line access
US7900048B2 (en) * 2002-05-07 2011-03-01 Sony Ericsson Mobile Communications Ab Method for loading an application in a device, device and smart card therefor
US7191469B2 (en) * 2002-05-13 2007-03-13 Green Border Technologies Methods and systems for providing a secure application environment using derived user accounts
WO2003104954A2 (en) * 2002-06-06 2003-12-18 Green Border Technologies Methods and systems for implementing a secure application execution environment using derived user accounts for internet content
US7334124B2 (en) * 2002-07-22 2008-02-19 Vormetric, Inc. Logical access block processing protocol for transparent secure file storage
US6678828B1 (en) * 2002-07-22 2004-01-13 Vormetric, Inc. Secure network file access control system
JP2004102373A (en) * 2002-09-05 2004-04-02 Hitachi Ltd Access management server, method and program
US7512810B1 (en) * 2002-09-11 2009-03-31 Guardian Data Storage Llc Method and system for protecting encrypted files transmitted over a network
US20040054790A1 (en) * 2002-09-12 2004-03-18 International Business Machines Corporation Management of security objects controlling access to resources
US6804687B2 (en) * 2002-09-30 2004-10-12 Scott E. Sampson File system management with user-definable functional attributes stored in a token action log
US20060168089A1 (en) * 2002-09-30 2006-07-27 Sampson Scott E Controlling incoming communication by issuing tokens
US7010565B2 (en) * 2002-09-30 2006-03-07 Sampson Scott E Communication management using a token action log
US20040073688A1 (en) * 2002-09-30 2004-04-15 Sampson Scott E. Electronic payment validation using Transaction Authorization Tokens
KR20040028257A (en) * 2002-09-30 2004-04-03 삼성전자주식회사 Network accessable apparatus, security method therefor and information storage medium thereof
US8051172B2 (en) 2002-09-30 2011-11-01 Sampson Scott E Methods for managing the exchange of communication tokens
US7143288B2 (en) 2002-10-16 2006-11-28 Vormetric, Inc. Secure file system server architecture and methods
US7836310B1 (en) 2002-11-01 2010-11-16 Yevgeniy Gutnik Security system that uses indirect password-based encryption
US7890990B1 (en) 2002-12-20 2011-02-15 Klimenty Vainstein Security system with staging capabilities
US7660790B1 (en) * 2005-02-24 2010-02-09 Symantec Operating Corporation Method and apparatus for utilizing a file change log
US7949957B2 (en) 2002-12-31 2011-05-24 International Business Machines Corporation Edit selection control
US7207058B2 (en) * 2002-12-31 2007-04-17 American Express Travel Related Services Company, Inc. Method and system for transmitting authentication context information
US20040143749A1 (en) * 2003-01-16 2004-07-22 Platformlogic, Inc. Behavior-based host-based intrusion prevention system
US7370212B2 (en) * 2003-02-25 2008-05-06 Microsoft Corporation Issuing a publisher use license off-line in a digital rights management (DRM) system
US7370066B1 (en) 2003-03-24 2008-05-06 Microsoft Corporation System and method for offline editing of data files
US7275216B2 (en) * 2003-03-24 2007-09-25 Microsoft Corporation System and method for designing electronic forms and hierarchical schemas
US7415672B1 (en) 2003-03-24 2008-08-19 Microsoft Corporation System and method for designing electronic forms
US7913159B2 (en) 2003-03-28 2011-03-22 Microsoft Corporation System and method for real-time validation of structured data files
US7296017B2 (en) * 2003-03-28 2007-11-13 Microsoft Corporation Validation of XML data files
US7516145B2 (en) * 2003-03-31 2009-04-07 Microsoft Corporation System and method for incrementally transforming and rendering hierarchical data files
US8707034B1 (en) 2003-05-30 2014-04-22 Intellectual Ventures I Llc Method and system for using remote headers to secure electronic files
US20040268139A1 (en) * 2003-06-25 2004-12-30 Microsoft Corporation Systems and methods for declarative client input security screening
US20040268229A1 (en) * 2003-06-27 2004-12-30 Microsoft Corporation Markup language editing with an electronic form
US7451392B1 (en) * 2003-06-30 2008-11-11 Microsoft Corporation Rendering an HTML electronic form by applying XSLT to XML using a solution
US7730543B1 (en) 2003-06-30 2010-06-01 Satyajit Nath Method and system for enabling users of a group shared across multiple file security systems to access secured files
US7197515B2 (en) * 2003-06-30 2007-03-27 Microsoft Corporation Declarative solution definition
WO2005008417A2 (en) * 2003-07-11 2005-01-27 Computer Associates Think, Inc. Method and system for protecting against computer viruses
US7406660B1 (en) * 2003-08-01 2008-07-29 Microsoft Corporation Mapping between structured data and a visual surface
US7334187B1 (en) 2003-08-06 2008-02-19 Microsoft Corporation Electronic form aggregation
US7530103B2 (en) * 2003-08-07 2009-05-05 Microsoft Corporation Projection of trustworthiness from a trusted environment to an untrusted environment
US8122511B2 (en) 2003-08-28 2012-02-21 International Business Machines Corporation Attribute information providing method
JP2005085266A (en) * 2003-09-04 2005-03-31 Stmicroelectronics Sa Access control of microprocessor peripheral device
KR101102717B1 (en) 2003-09-17 2012-01-05 파나소닉 주식회사 Application execution device, application execution method, integrated circuit, and computer-readable medium
US8127366B2 (en) 2003-09-30 2012-02-28 Guardian Data Storage, Llc Method and apparatus for transitioning between states of security policies used to secure electronic documents
US7703140B2 (en) * 2003-09-30 2010-04-20 Guardian Data Storage, Llc Method and system for securing digital assets using process-driven security policies
US20050086531A1 (en) * 2003-10-20 2005-04-21 Pss Systems, Inc. Method and system for proxy approval of security changes for a file security system
US7694328B2 (en) * 2003-10-21 2010-04-06 Google Inc. Systems and methods for secure client applications
US20050091658A1 (en) * 2003-10-24 2005-04-28 Microsoft Corporation Operating system resource protection
US20050091535A1 (en) * 2003-10-24 2005-04-28 Microsoft Corporation Application identity for software products
US7752320B2 (en) * 2003-11-25 2010-07-06 Avaya Inc. Method and apparatus for content based authentication for network access
US20050119902A1 (en) * 2003-11-28 2005-06-02 Christiansen David L. Security descriptor verifier
KR20050053401A (en) * 2003-12-02 2005-06-08 주식회사 하우리 Method for removing computer virus, and computer-readable storage medium recorded with virus-removing program
US7392527B2 (en) * 2003-12-10 2008-06-24 Microsoft Corporation Driver-specific context for kernel-mode shimming
US20050138371A1 (en) * 2003-12-19 2005-06-23 Pss Systems, Inc. Method and system for distribution of notifications in file security systems
US7702909B2 (en) * 2003-12-22 2010-04-20 Klimenty Vainstein Method and system for validating timestamps
US20050177724A1 (en) * 2004-01-16 2005-08-11 Valiuddin Ali Authentication system and method
US8819072B1 (en) 2004-02-02 2014-08-26 Microsoft Corporation Promoting data from structured data files
US7743423B2 (en) * 2004-02-03 2010-06-22 Microsoft Corporation Security requirement determination
US7430711B2 (en) * 2004-02-17 2008-09-30 Microsoft Corporation Systems and methods for editing XML documents
US7950000B2 (en) * 2004-03-17 2011-05-24 Microsoft Corporation Architecture that restricts permissions granted to a build process
US7617519B2 (en) * 2004-03-18 2009-11-10 Microsoft Corporation System and method for intelligent recommendation with experts for user trust decisions
US20050240995A1 (en) * 2004-04-23 2005-10-27 Ali Valiuddin Y Computer security system and method
US8607299B2 (en) * 2004-04-27 2013-12-10 Microsoft Corporation Method and system for enforcing a security policy via a security virtual machine
US7743425B2 (en) * 2004-04-29 2010-06-22 Microsoft Corporation Security restrictions on binary behaviors
US7496837B1 (en) * 2004-04-29 2009-02-24 Microsoft Corporation Structural editing with schema awareness
US8108902B2 (en) * 2004-04-30 2012-01-31 Microsoft Corporation System and method for local machine zone lockdown with relation to a network browser
US7281018B1 (en) 2004-05-26 2007-10-09 Microsoft Corporation Form template data source change
US7774620B1 (en) * 2004-05-27 2010-08-10 Microsoft Corporation Executing applications at appropriate trust levels
US8566461B1 (en) 2004-06-09 2013-10-22 Digital River, Inc. Managed access to media services
US7707427B1 (en) * 2004-07-19 2010-04-27 Michael Frederick Kenrich Multi-level file digests
CN100481013C (en) 2004-08-03 2009-04-22 索芙特瑞斯提股份有限公司 System and method for controlling inter-application association through contextual policy control
US7484247B2 (en) 2004-08-07 2009-01-27 Allen F Rozman System and method for protecting a computer system from malicious software
US7797294B2 (en) * 2004-08-25 2010-09-14 International Business Machines Corporation Method, system and program for testing accessibility in data processing system programs
US7692636B2 (en) * 2004-09-30 2010-04-06 Microsoft Corporation Systems and methods for handwriting to a screen
US7516399B2 (en) * 2004-09-30 2009-04-07 Microsoft Corporation Structured-document path-language expression methods and systems
US20060074933A1 (en) * 2004-09-30 2006-04-06 Microsoft Corporation Workflow interaction
US7793350B2 (en) * 2004-10-28 2010-09-07 International Business Machines Corporation Apparatus, system, and method for simulated access to restricted computing resources
US8487879B2 (en) * 2004-10-29 2013-07-16 Microsoft Corporation Systems and methods for interacting with a computer through handwriting to a screen
US7712022B2 (en) 2004-11-15 2010-05-04 Microsoft Corporation Mutually exclusive options in electronic forms
US20060107224A1 (en) * 2004-11-15 2006-05-18 Microsoft Corporation Building a dynamic action for an electronic form
US7584417B2 (en) * 2004-11-15 2009-09-01 Microsoft Corporation Role-dependent action for an electronic form
US7721190B2 (en) * 2004-11-16 2010-05-18 Microsoft Corporation Methods and systems for server side form processing
US20060107327A1 (en) * 2004-11-16 2006-05-18 Sprigg Stephen A Methods and apparatus for enforcing application level restrictions on local and remote content
US7509353B2 (en) * 2004-11-16 2009-03-24 Microsoft Corporation Methods and systems for exchanging and rendering forms
US7904801B2 (en) * 2004-12-15 2011-03-08 Microsoft Corporation Recursive sections in electronic forms
US7437376B2 (en) * 2004-12-20 2008-10-14 Microsoft Corporation Scalable object model
US20060150247A1 (en) * 2004-12-30 2006-07-06 Andrew Gafken Protection of stored data
US7937651B2 (en) * 2005-01-14 2011-05-03 Microsoft Corporation Structural editing operations for network forms
US7802294B2 (en) * 2005-01-28 2010-09-21 Microsoft Corporation Controlling computer applications' access to data
US7810153B2 (en) * 2005-01-28 2010-10-05 Microsoft Corporation Controlling execution of computer applications
JP4717464B2 (en) * 2005-02-18 2011-07-06 キヤノン株式会社 Information processing apparatus, information processing method, and program
US8046831B2 (en) * 2005-03-02 2011-10-25 Actiance, Inc. Automating software security restrictions on system resources
US7870613B2 (en) 2005-03-02 2011-01-11 Facetime Communications, Inc. Automating software security restrictions on applications
US7725834B2 (en) * 2005-03-04 2010-05-25 Microsoft Corporation Designer-created aspect for an electronic form template
EP2194476B1 (en) 2005-03-22 2014-12-03 Hewlett-Packard Development Company, L.P. Method and apparatus for creating a record of a software-verification attestation
US7673228B2 (en) * 2005-03-30 2010-03-02 Microsoft Corporation Data-driven actions for network forms
US8725646B2 (en) * 2005-04-15 2014-05-13 Microsoft Corporation Output protection levels
US8010515B2 (en) * 2005-04-15 2011-08-30 Microsoft Corporation Query to an electronic form
US8566462B2 (en) * 2005-05-12 2013-10-22 Digital River, Inc. Methods of controlling access to network content referenced within structured documents
US8443094B2 (en) * 2005-05-12 2013-05-14 Oracle America, Inc. Computer system comprising a communication device
US8972743B2 (en) * 2005-05-16 2015-03-03 Hewlett-Packard Development Company, L.P. Computer security system and method
US20060265758A1 (en) 2005-05-20 2006-11-23 Microsoft Corporation Extensible media rights
US8078740B2 (en) * 2005-06-03 2011-12-13 Microsoft Corporation Running internet applications with low rights
US20070011665A1 (en) * 2005-06-21 2007-01-11 Microsoft Corporation Content syndication platform
US7543228B2 (en) * 2005-06-27 2009-06-02 Microsoft Corporation Template for rendering an electronic form
US8200975B2 (en) * 2005-06-29 2012-06-12 Microsoft Corporation Digital signatures for network forms
US7580933B2 (en) * 2005-07-28 2009-08-25 Microsoft Corporation Resource handling for taking permissions
US8984636B2 (en) * 2005-07-29 2015-03-17 Bit9, Inc. Content extractor and analysis system
US8272058B2 (en) * 2005-07-29 2012-09-18 Bit 9, Inc. Centralized timed analysis in a network security system
US20070028291A1 (en) * 2005-07-29 2007-02-01 Bit 9, Inc. Parametric content control in a network security system
US7895651B2 (en) * 2005-07-29 2011-02-22 Bit 9, Inc. Content tracking in a network security system
US7613996B2 (en) * 2005-08-15 2009-11-03 Microsoft Corporation Enabling selection of an inferred schema part
US20070036433A1 (en) * 2005-08-15 2007-02-15 Microsoft Corporation Recognizing data conforming to a rule
US20070061706A1 (en) * 2005-09-14 2007-03-15 Microsoft Corporation Mapping property hierarchies to schemas
US20070061467A1 (en) * 2005-09-15 2007-03-15 Microsoft Corporation Sessions and session states
US20070199072A1 (en) * 2005-10-14 2007-08-23 Softwareonline, Llc Control of application access to system resources
US20070199057A1 (en) * 2005-10-14 2007-08-23 Softwareonline, Llc Control of application access to system resources
WO2008048320A1 (en) * 2005-10-14 2008-04-24 Xeriton Corporation Control of application access to system resources
US7484173B2 (en) * 2005-10-18 2009-01-27 International Business Machines Corporation Alternative key pad layout for enhanced security
US8001459B2 (en) * 2005-12-05 2011-08-16 Microsoft Corporation Enabling electronic documents for limited-capability computing devices
WO2007074565A1 (en) * 2005-12-27 2007-07-05 Nec Corporation Program execution control method, device, and execution control program
US20070156871A1 (en) * 2005-12-30 2007-07-05 Michael Braun Secure dynamic HTML pages
US7779343B2 (en) 2006-01-30 2010-08-17 Microsoft Corporation Opening network-enabled electronic documents
US9754119B1 (en) * 2006-03-07 2017-09-05 Emc Corporation Containerized security for managed content
US9519399B1 (en) 2006-03-07 2016-12-13 Emc Corporation Providing a visual indication that stored content is associated with a collaboration environment
US7512578B2 (en) * 2006-03-30 2009-03-31 Emc Corporation Smart containers
US8117246B2 (en) 2006-04-17 2012-02-14 Microsoft Corporation Registering, transfering, and acting on event metadata
US20070250495A1 (en) * 2006-04-25 2007-10-25 Eran Belinsky Method and System For Accessing Referenced Information
US7814556B2 (en) * 2006-05-09 2010-10-12 Bea Systems, Inc. System and method for protecting APIs from untrusted or less trusted applications
US7979891B2 (en) * 2006-05-09 2011-07-12 Oracle International Corporation Method and system for securing execution of untrusted applications
EP2024894A4 (en) * 2006-05-12 2016-09-21 Samsung Electronics Co Ltd Apparatus and method of managing security data
US8117441B2 (en) * 2006-06-20 2012-02-14 Microsoft Corporation Integrating security protection tools with computer device integrity and privacy policy
US8429708B1 (en) * 2006-06-23 2013-04-23 Sanjay Tandon Method and system for assessing cumulative access entitlements of an entity in a system
US8185737B2 (en) 2006-06-23 2012-05-22 Microsoft Corporation Communication across domains
US8533778B1 (en) * 2006-06-23 2013-09-10 Mcafee, Inc. System, method and computer program product for detecting unwanted effects utilizing a virtual machine
JP4539613B2 (en) * 2006-06-28 2010-09-08 富士ゼロックス株式会社 Image forming apparatus, image generation method, and program
US20080126590A1 (en) * 2006-06-29 2008-05-29 Rothman Michael A Semiconductor based host protected addressing in computing devices
US20080040363A1 (en) * 2006-07-13 2008-02-14 Siemens Medical Solutions Usa, Inc. System for Processing Relational Database Data
JP2008027306A (en) * 2006-07-24 2008-02-07 Aplix Corp User space virtualization system
US8352733B2 (en) 2006-08-04 2013-01-08 Apple Inc. Resource restriction systems and methods
US8082442B2 (en) 2006-08-10 2011-12-20 Microsoft Corporation Securely sharing applications installed by unprivileged users
US9860274B2 (en) 2006-09-13 2018-01-02 Sophos Limited Policy management
JP2008084117A (en) * 2006-09-28 2008-04-10 Fujitsu Ltd Request transmission control program, device, and method
WO2008063185A1 (en) * 2006-10-14 2008-05-29 Xeriton Corporation Control of application access to system resources
WO2008051842A2 (en) 2006-10-20 2008-05-02 Citrix Systems, Inc. Methods and systems for accessing remote user files associated with local resources
US20080127142A1 (en) * 2006-11-28 2008-05-29 Microsoft Corporation Compiling executable code into a less-trusted address space
US8533291B1 (en) * 2007-02-07 2013-09-10 Oracle America, Inc. Method and system for protecting publicly viewable web client reference to server resources and business logic
JP4995590B2 (en) * 2007-02-14 2012-08-08 株式会社エヌ・ティ・ティ・ドコモ Content distribution management device, communication terminal, program, and content distribution system
US7797743B2 (en) * 2007-02-26 2010-09-14 Microsoft Corporation File conversion in restricted process
US8640215B2 (en) * 2007-03-23 2014-01-28 Microsoft Corporation Secure isolation of application pools
US20080263679A1 (en) * 2007-04-23 2008-10-23 Microsoft Corporation Storing information in closed computing devices
US8523666B2 (en) * 2007-05-25 2013-09-03 Microsoft Corporation Programming framework for closed systems
JP4395178B2 (en) * 2007-05-29 2010-01-06 インターナショナル・ビジネス・マシーンズ・コーポレーション Content processing system, method and program
US10019570B2 (en) * 2007-06-14 2018-07-10 Microsoft Technology Licensing, Llc Protection and communication abstractions for web browsers
US7386885B1 (en) 2007-07-03 2008-06-10 Kaspersky Lab, Zao Constraint-based and attribute-based security system for controlling software component interaction
US8621605B2 (en) * 2007-10-09 2013-12-31 International Business Machines Corporation Method for reducing the time to diagnose the cause of unexpected changes to system files
US8607324B2 (en) * 2008-01-15 2013-12-10 Microsoft Corporation Untrusted gaming system access to online gaming service
US8208375B2 (en) * 2008-03-17 2012-06-26 Microsoft Corporation Selective filtering of network traffic requests
US8639734B1 (en) * 2008-03-31 2014-01-28 Symantec Operating Corporation Use of external information about a file to determine virtualization
US8688641B1 (en) 2008-03-31 2014-04-01 Symantec Operating Corporation Per user and per process layer visibility
US9027123B2 (en) * 2008-12-08 2015-05-05 Nec Corporation Data dependence analyzer, information processor, data dependence analysis method and program
US20100199357A1 (en) * 2009-02-02 2010-08-05 Microsoft Corporation Secure hosting for untrusted code
US8544083B2 (en) * 2009-02-19 2013-09-24 Microsoft Corporation Identification security elevation
US9680964B2 (en) * 2009-03-11 2017-06-13 Microsoft Technology Licensing, Llc Programming model for installing and distributing occasionally connected applications
US8812451B2 (en) 2009-03-11 2014-08-19 Microsoft Corporation Programming model for synchronizing browser caches across devices and web services
US8826269B2 (en) * 2009-06-15 2014-09-02 Microsoft Corporation Annotating virtual application processes
US8819399B1 (en) 2009-07-31 2014-08-26 Google Inc. Predicated control flow and store instructions for native code module security
EP2312485B1 (en) 2009-08-31 2018-08-08 BlackBerry Limited System and method for controlling applications to mitigate the effects of malicious software
US8924553B2 (en) * 2009-08-31 2014-12-30 Red Hat, Inc. Multifactor validation of requests to thwart cross-site attacks
US9003517B2 (en) 2009-10-28 2015-04-07 Microsoft Technology Licensing, Llc Isolation and presentation of untrusted data
US8776168B1 (en) * 2009-10-29 2014-07-08 Symantec Corporation Applying security policy based on behaviorally-derived user risk profiles
US8775818B2 (en) * 2009-11-30 2014-07-08 Red Hat, Inc. Multifactor validation of requests to thwart dynamic cross-site attacks
US8904521B2 (en) * 2009-11-30 2014-12-02 Red Hat, Inc. Client-side prevention of cross-site request forgeries
US8495607B2 (en) * 2010-03-01 2013-07-23 International Business Machines Corporation Performing aggressive code optimization with an ability to rollback changes made by the aggressive optimizations
US8850573B1 (en) * 2010-04-14 2014-09-30 Google Inc. Computing device with untrusted user execution mode
KR101064143B1 (en) * 2010-08-20 2011-09-15 주식회사 파수닷컴 System for protecting data stored in clipboard in digital rights management environment and recording medium storing program for executing method of the same in computer
US20120192292A1 (en) * 2011-01-26 2012-07-26 Seatech Ltd Categorized content sharing, identical content maintanance and user protection in a peer-to-peer network
US9117083B2 (en) * 2011-02-14 2015-08-25 Blackberry Limited Managing booting of secure devices with untrusted software
US8650640B2 (en) * 2011-02-24 2014-02-11 International Business Machines Corporation Using a declaration of security requirements to determine whether to permit application operations
US9256720B2 (en) 2011-05-18 2016-02-09 Nextgenid, Inc. Enrollment kiosk including biometric enrollment and verification, face recognition and fingerprint matching systems
WO2012159070A2 (en) 2011-05-18 2012-11-22 Nextgenid, Inc. Multi-biometric enrollment kiosk including biometric enrollment and verification, face recognition and fingerprint matching systems
US8973158B2 (en) * 2011-07-20 2015-03-03 Microsoft Technology Licensing Llc Trust level activation
US8789143B2 (en) 2011-08-15 2014-07-22 Bank Of America Corporation Method and apparatus for token-based conditioning
US8539558B2 (en) 2011-08-15 2013-09-17 Bank Of America Corporation Method and apparatus for token-based token termination
US8806602B2 (en) 2011-08-15 2014-08-12 Bank Of America Corporation Apparatus and method for performing end-to-end encryption
US8950002B2 (en) * 2011-08-15 2015-02-03 Bank Of America Corporation Method and apparatus for token-based access of related resources
US8752124B2 (en) 2011-08-15 2014-06-10 Bank Of America Corporation Apparatus and method for performing real-time authentication using subject token combinations
US9118686B2 (en) * 2011-09-06 2015-08-25 Microsoft Technology Licensing, Llc Per process networking capabilities
US20130061316A1 (en) * 2011-09-06 2013-03-07 Microsoft Corporation Capability Access Management for Processes
US10445528B2 (en) * 2011-09-07 2019-10-15 Microsoft Technology Licensing, Llc Content handling for applications
US8990561B2 (en) 2011-09-09 2015-03-24 Microsoft Technology Licensing, Llc Pervasive package identifiers
US9773102B2 (en) 2011-09-09 2017-09-26 Microsoft Technology Licensing, Llc Selective file access for applications
US9800688B2 (en) 2011-09-12 2017-10-24 Microsoft Technology Licensing, Llc Platform-enabled proximity service
USD818464S1 (en) 2014-04-11 2018-05-22 Nextgenid, Inc. Kiosk
USD760711S1 (en) 2012-05-18 2016-07-05 NexgenID, Inc. Kiosk
US9069766B2 (en) 2012-11-02 2015-06-30 Microsoft Technology Licensing, Llc Content-based isolation for computing device security
US20140156787A1 (en) * 2012-12-05 2014-06-05 Yahoo! Inc. Virtual wall for writings associated with landmarks
US10356204B2 (en) 2012-12-13 2019-07-16 Microsoft Technology Licensing, Llc Application based hardware identifiers
US9858247B2 (en) 2013-05-20 2018-01-02 Microsoft Technology Licensing, Llc Runtime resolution of content references
US10171483B1 (en) 2013-08-23 2019-01-01 Symantec Corporation Utilizing endpoint asset awareness for network intrusion detection
US10212143B2 (en) * 2014-01-31 2019-02-19 Dropbox, Inc. Authorizing an untrusted client device for access on a content management system
US9684784B2 (en) * 2014-06-25 2017-06-20 Thi Chau Nguyen-Huu Systems and methods for securely storing data
US10002252B2 (en) 2014-07-01 2018-06-19 Fireeye, Inc. Verification of trusted threat-aware microvisor
US9680862B2 (en) 2014-07-01 2017-06-13 Fireeye, Inc. Trusted threat-aware microvisor
US9396343B2 (en) * 2014-10-20 2016-07-19 International Business Machines Corporation Policy access control lists attached to resources
US9881166B2 (en) 2015-04-16 2018-01-30 International Business Machines Corporation Multi-focused fine-grained security framework
US10191831B2 (en) * 2016-06-08 2019-01-29 Cylance Inc. Macro-script execution control
US10025691B1 (en) 2016-09-09 2018-07-17 Fireeye, Inc. Verification of complex software code using a modularized architecture
US10592678B1 (en) 2016-09-09 2020-03-17 Fireeye, Inc. Secure communications between peers using a verified virtual trusted platform module
US10897462B2 (en) * 2017-05-16 2021-01-19 Citrix Systems, Inc. Systems and methods for encoding additional authentication data into an active directory security identifier
US10885213B2 (en) 2017-09-12 2021-01-05 Sophos Limited Secure firewall configurations
GB2570924B (en) * 2018-02-12 2021-06-16 Avecto Ltd Managing registry access on a computer device
US11159322B2 (en) * 2019-01-31 2021-10-26 Baidu Usa Llc Secure multiparty computing framework using a restricted operating environment with a guest agent
US20230004638A1 (en) * 2021-06-30 2023-01-05 Citrix Systems, Inc. Redirection of attachments based on risk and context
US11811668B2 (en) 2021-08-19 2023-11-07 Bank Of America Corporation System for implementing disposition bias for validating network traffic from upstream applications
US20230185929A1 (en) * 2021-12-09 2023-06-15 Vmware, Inc. Enrolling a virtual device as an unprivileged user

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0588415A1 (en) * 1992-09-11 1994-03-23 International Business Machines Corporation Peer to peer connection authorizer
WO1997015008A1 (en) * 1995-06-06 1997-04-24 At & T Ipm Corp. System and method for database access control

Family Cites Families (40)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4962449A (en) 1988-04-11 1990-10-09 Artie Schlesinger Computer security system having remote location recognition and remote location lock-out
DE69031191T2 (en) 1989-05-15 1998-02-12 Ibm System for controlling access privileges
US5187790A (en) * 1989-06-29 1993-02-16 Digital Equipment Corporation Server impersonation of client processes in an object based computer operating system
US5138712A (en) 1989-10-02 1992-08-11 Sun Microsystems, Inc. Apparatus and method for licensing software on a network of computers
US5204961A (en) 1990-06-25 1993-04-20 Digital Equipment Corporation Computer network operating with multilevel hierarchical security with selectable common trust realms and corresponding security protocols
US5577209A (en) 1991-07-11 1996-11-19 Itt Corporation Apparatus and method for providing multi-level security for communication among computers and terminals on a network
US5276901A (en) 1991-12-16 1994-01-04 International Business Machines Corporation System for controlling group access to objects using group access control folder and group identification as individual user
AU662805B2 (en) * 1992-04-06 1995-09-14 Addison M. Fischer A method for processing information among computers which may exchange messages
US5412717A (en) * 1992-05-15 1995-05-02 Fischer; Addison M. Computer system security method and apparatus having program authorization information data structures
US5649099A (en) 1993-06-04 1997-07-15 Xerox Corporation Method for delegating access rights through executable access control program without delegating access rights not in a specification to any intermediary nor comprising server security
JPH0713842A (en) * 1993-06-25 1995-01-17 Hitachi Ltd Information processor
EP0775341B1 (en) 1994-08-09 1999-06-30 Shiva Corporation Apparatus and method for limiting access to a local computer network
EP0697662B1 (en) 1994-08-15 2001-05-30 International Business Machines Corporation Method and system for advanced role-based access control in distributed and centralized computer systems
US5864683A (en) 1994-10-12 1999-01-26 Secure Computing Corporartion System for providing secure internetwork by connecting type enforcing secure computers to external network for limiting access to data based on user and process access rights
US5682478A (en) 1995-01-19 1997-10-28 Microsoft Corporation Method and apparatus for supporting multiple, simultaneous services over multiple, simultaneous connections between a client and network server
JPH08263382A (en) * 1995-03-24 1996-10-11 Nec Corp Security management system
US5761669A (en) 1995-06-06 1998-06-02 Microsoft Corporation Controlling access to objects on multiple operating systems
US5675782A (en) 1995-06-06 1997-10-07 Microsoft Corporation Controlling access to objects on multiple operating systems
US5678041A (en) 1995-06-06 1997-10-14 At&T System and method for restricting user access rights on the internet based on rating information stored in a relational database
US5941947A (en) 1995-08-18 1999-08-24 Microsoft Corporation System and method for controlling access to data entities in a computer network
US5757916A (en) 1995-10-06 1998-05-26 International Series Research, Inc. Method and apparatus for authenticating the location of remote users of networked computing systems
US5859966A (en) * 1995-10-10 1999-01-12 Data General Corporation Security system for computer systems
US5638448A (en) 1995-10-24 1997-06-10 Nguyen; Minhtam C. Network with secure communications sessions
US5680461A (en) * 1995-10-26 1997-10-21 Sun Microsystems, Inc. Secure network protocol system and method
US5826029A (en) 1995-10-31 1998-10-20 International Business Machines Corporation Secured gateway interface
US5745676A (en) 1995-12-04 1998-04-28 International Business Machines Corporation Authority reduction and restoration method providing system integrity for subspace groups and single address spaces during program linkage
JPH09190236A (en) 1996-01-10 1997-07-22 Canon Inc Method, device and system for processing information
AU1829897A (en) 1996-01-16 1997-08-11 Raptor Systems, Inc. Transferring encrypted packets over a public network
US5925109A (en) 1996-04-10 1999-07-20 National Instruments Corporation System for I/O management where I/O operations are determined to be direct or indirect based on hardware coupling manners and/or program privilege modes
TW313642B (en) 1996-06-11 1997-08-21 Ibm A uniform mechanism for using signed content
US5987123A (en) * 1996-07-03 1999-11-16 Sun Microsystems, Incorporated Secure file system
US5845067A (en) 1996-09-09 1998-12-01 Porter; Jack Edward Method and apparatus for document management utilizing a messaging system
US5983350A (en) * 1996-09-18 1999-11-09 Secure Computing Corporation Secure firewall supporting different levels of authentication based on address or encryption status
US6167520A (en) * 1996-11-08 2000-12-26 Finjan Software, Inc. System and method for protecting a client during runtime from hostile downloadables
US5949882A (en) 1996-12-13 1999-09-07 Compaq Computer Corporation Method and apparatus for allowing access to secured computer resources by utilzing a password and an external encryption algorithm
US6317742B1 (en) * 1997-01-09 2001-11-13 Sun Microsystems, Inc. Method and apparatus for controlling software access to system resources
US6105132A (en) 1997-02-20 2000-08-15 Novell, Inc. Computer network graded authentication system and method
US5983270A (en) 1997-03-11 1999-11-09 Sequel Technology Corporation Method and apparatus for managing internetwork and intranetwork activity
US6167522A (en) * 1997-04-01 2000-12-26 Sun Microsystems, Inc. Method and apparatus for providing security for servers executing application programs received via a network
US6081807A (en) 1997-06-13 2000-06-27 Compaq Computer Corporation Method and apparatus for interfacing with a stateless network file system server

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0588415A1 (en) * 1992-09-11 1994-03-23 International Business Machines Corporation Peer to peer connection authorizer
WO1997015008A1 (en) * 1995-06-06 1997-04-24 At & T Ipm Corp. System and method for database access control

Cited By (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002092221A (en) * 2000-08-18 2002-03-29 Hewlett Packard Co <Hp> Performance of service on computing platform
JP2002135334A (en) * 2000-10-27 2002-05-10 Nobuko Hirano Proxy transmission/reception method, and its system
US7478136B2 (en) 2000-12-11 2009-01-13 Ntt Docomo, Inc. Terminal and repeater
JP2002247548A (en) * 2001-02-15 2002-08-30 Nec Access Technica Ltd Video display permission system and program for making computer perform video display
US8898473B2 (en) 2001-06-12 2014-11-25 Blackberry Limited System and method for compressing secure E-mail for exchange with a mobile data communication device
USRE45087E1 (en) 2001-06-12 2014-08-19 Blackberry Limited Certificate management and transfer system and method
US8539226B2 (en) 2001-06-12 2013-09-17 Blackberry Limited Certificate management and transfer system and method
EP1483873B1 (en) * 2002-03-01 2006-11-02 Research In Motion Limited System and method for indicating the signature and trust status of a secure message
US7130886B2 (en) 2002-03-06 2006-10-31 Research In Motion Limited System and method for providing secure message signature status and trust status indication
US7483950B2 (en) 2002-03-06 2009-01-27 Research In Motion Limited System and method for providing secure message signature status and trust status indication
EP1513063A1 (en) * 2002-05-20 2005-03-09 NTT DoCoMo, Inc. Portable terminal, method, program, and storage medium for managing application start
EP1513063A4 (en) * 2002-05-20 2007-11-21 Ntt Docomo Inc Portable terminal, method, program, and storage medium for managing application start
EP2187285A1 (en) * 2002-05-28 2010-05-19 Nokia Corporation Secure mobile wireless device
US9398023B2 (en) 2004-08-10 2016-07-19 Blackberry Limited Server verification of secure electronic messages
US8341399B2 (en) 2004-10-29 2012-12-25 Research In Motion Limited System and method for retrieving certificates associated with senders of digitally signed messages
US8775798B2 (en) 2004-10-29 2014-07-08 Blackberry Limited System and method for retrieving certificates associated with senders of digitally signed messages
US8788812B2 (en) 2004-10-29 2014-07-22 Blackberry Limited System and method for retrieving certificates associated with senders of digitally signed messages
GB2457305A (en) * 2008-02-11 2009-08-12 Symbian Software Ltd Controlling access to system resources using script and application identifiers
EP2332048A1 (en) * 2008-08-29 2011-06-15 Google, Inc. Altered token sandboxing
US8429741B2 (en) 2008-08-29 2013-04-23 Google, Inc. Altered token sandboxing
EP2332048A4 (en) * 2008-08-29 2012-03-21 Google Inc Altered token sandboxing
US8826419B2 (en) 2011-09-02 2014-09-02 Avecto Limited Computer device with anti-tamper resource security
GB2561861A (en) * 2017-04-25 2018-10-31 Avecto Ltd Computer device and method for isolating untrusted content

Also Published As

Publication number Publication date
JP4878647B2 (en) 2012-02-15
JP2010176690A (en) 2010-08-12
ATE518180T1 (en) 2011-08-15
EP1086413B1 (en) 2011-07-27
ES2368200T3 (en) 2011-11-15
EP1086413A1 (en) 2001-03-28
JP2002517852A (en) 2002-06-18
US6505300B2 (en) 2003-01-07
US20020019941A1 (en) 2002-02-14
JP4906188B2 (en) 2012-03-28

Similar Documents

Publication Publication Date Title
US6505300B2 (en) Method and system for secure running of untrusted content
EP1084464B1 (en) Security model using restricted tokens
EP1086414B1 (en) Least privilege via restricted tokens
US6308273B1 (en) Method and system of security location discrimination
US8931035B2 (en) Access authorization having embedded policies
Gong Java security architecture (JDK 1.2)
US7065784B2 (en) Systems and methods for integrating access control with a namespace
US7350204B2 (en) Policies for secure software execution
EP1299790B1 (en) Filtering a permission set using permission requests associated with a code assembly
US6272631B1 (en) Protected storage of core data secrets
US6389540B1 (en) Stack based access control using code and executor identifiers
Gong Java 2 platform security architecture
KR20060050768A (en) Access authorization api
JP2002149494A (en) Access control method and access controller, and recording medium
Jaeger Security in Ordinary Operating Systems
Taylor et al. A Comparison of Authentication, Authorization and Auditing in Windows and Linux
Indoria Trusted Operating System Appro

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): JP

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
ENP Entry into the national phase

Ref country code: JP

Ref document number: 2000 553883

Kind code of ref document: A

Format of ref document f/p: F

WWE Wipo information: entry into national phase

Ref document number: 1999955547

Country of ref document: EP

WWP Wipo information: published in national office

Ref document number: 1999955547

Country of ref document: EP