KR920018595A - 분산형 멀티프로세서 데이타 시스템상의 유저보안키용 키링 메타포(Keyring Metaphor) - Google Patents
분산형 멀티프로세서 데이타 시스템상의 유저보안키용 키링 메타포(Keyring Metaphor) Download PDFInfo
- Publication number
- KR920018595A KR920018595A KR1019920003362A KR920003362A KR920018595A KR 920018595 A KR920018595 A KR 920018595A KR 1019920003362 A KR1019920003362 A KR 1019920003362A KR 920003362 A KR920003362 A KR 920003362A KR 920018595 A KR920018595 A KR 920018595A
- Authority
- KR
- South Korea
- Prior art keywords
- operator
- list
- key
- lock
- keys
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1016—Devices or methods for securing the PIN and other transaction-data, e.g. by encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
- G06F15/16—Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2149—Restricted operating environment
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Databases & Information Systems (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Security & Cryptography (AREA)
- Storage Device Security (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
내용 없음
Description
본 내용은 요부공개 건이므로 전문내용을 수록하지 않았음
제1도는 본 발명이 구현된 분산형 데이타 시스템의 전체 구성을 도시한 도면,
제2도는 본 발명에 따른 시스템의 워크스테이션 및 네트워크 관리시스템을 보다 상세히 도시한 도면,
제3도는 오퍼레이터의 임무에 의해 인덱스된 키리스트를 포함한 기억매체의 파일을 상세히 도시한 도면.
Claims (3)
- 오퍼레이터가 그 자신을 시스템에 식별시키고 특정 처리 동작을 수행하는 명령을 입력시키며, 처리에 대한 로크(키에 대한 특정워드 또는 숫자가 호출되지 않을때 정보에 대한 동작 또는 액세스를 거부하는 메카니즘)가 제공되는 멀티프로세스 데이타 시스템에서 키들을 오퍼레이터와 상관시키는 방법에 있어서, 잠재적인 각 오퍼레이터에 대하여 오퍼레이터가 조작하도록 허락된 키의 리스트를 기억하고 상기 리스트를 상기 잠재적인 각 오퍼레이터에 연관시키는 단계와; 오퍼레이터의 식별을 상기 오퍼레이터에 의해 입력된 어떤 명령 및 상기 명령에 의한 처리수행과 연관시키는 단계와; 로크가 제공된 각 처리에서, 상기 각 처리를 수행한 오퍼레이터와 연관되는 키의 리스트를 액세스 하는 단계와; 상기 오퍼레이터와 연관된 상기 키의 리스트가 상기 로크에 대하여 미리 결정된 키를 포함하는 경우에만 요구된 정보를 제공하거나 요구된 동작을 수행하는 단계를 포함한 것을 특징으로 하는 키 및 오퍼레이터간의 상관방법.
- 오퍼레이터가 그 자신을 소정 코드(ID)에 의해 시스템에 식별시키고 특정 처리의 동작을 수행하는 명령을 입력하며, 처리에 대한 로크(키에 대한 특정워드 또는 숫자가 호출되지 않을때 대한 동작 또는 액세스를 거부하는 메카니즘)가 제공되는 멀티프로세스 데이타 시스템에서 키들을 오퍼레이터와 상관시키는 방법에 있어서, 각 ID와 연관되는 임무의 리스트와 각 임무와 연관되는 키의 리스트를 포함하는 파일을 유지하는 단계와; 오퍼레이터가 그 자신을 시스템에 식별시켰을때 그 오퍼레이터에 의해 제공된 ID와 연관된 임무의 리스트를 검색하는 단계, 및 상기 각 임무와 연관된 키의 리스트를 검색하고 오퍼레이터의 ID와 연관된 모든 키를 키리스트에 기억하는 단계와; 오퍼레이터가 명령을 입력하였을 때 상기 명령에 대응하는 처리를 수행하도록 지정된 처리에 대하여 디스패치하는 단계, 처리가 로크되어 있는지의 여부를 판정하는 단계, 및 처리가 로크되어 있는 경우에 상기 키리스트로 부터 오퍼레이터의 ID와 연관된 키를 검색하고 어떤 키가 상기 로크에 의해 요구된 키인지를 판정하며 그 키가 상기 로크에 대하여 미리 결정된 키인 경우에만 요구된 처리를 수행하는 단계를 포함한 것을 특징으로 하는 키 및 오퍼레이터간의 상관방법.
- 제2항에 있어서, 데이타 시스템이 디지탈 컴퓨터 또늠 메모리 수단을 각각 구비한 복수의 상호 접속된 디지탈 컴퓨터를 포함하고; 오퍼레이터에 의해 수행될 수 있는 처리가 존재하는 디지탈 컴퓨터에서 상기 키리스트의 카피가 상기 컴퓨터의 메모리 수단에 유지되는 것을 특징으로 하는 상관방법.※ 참고사항 : 최초출원 내용에 의하여 공개하는 것임.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US662,861 | 1991-03-01 | ||
US07/662,861 US5274824A (en) | 1991-03-01 | 1991-03-01 | Keyring metaphor for user's security keys on a distributed multiprocess data system |
Publications (2)
Publication Number | Publication Date |
---|---|
KR920018595A true KR920018595A (ko) | 1992-10-22 |
KR960012656B1 KR960012656B1 (ko) | 1996-09-23 |
Family
ID=24659539
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1019920003362A KR960012656B1 (ko) | 1991-03-01 | 1992-02-29 | 분산형 멀티프로세서 데이타 시스템상의 유저보안키용 키링 메타포(keyring Metaphor) |
Country Status (6)
Country | Link |
---|---|
US (1) | US5274824A (ko) |
EP (1) | EP0501475B1 (ko) |
JP (1) | JPH0561833A (ko) |
KR (1) | KR960012656B1 (ko) |
AU (1) | AU643366B2 (ko) |
DE (1) | DE69229755T2 (ko) |
Families Citing this family (39)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP3305737B2 (ja) * | 1991-11-27 | 2002-07-24 | 富士通株式会社 | 情報処理装置の機密情報管理方式 |
US5423044A (en) * | 1992-06-16 | 1995-06-06 | International Business Machines Corporation | Shared, distributed lock manager for loosely coupled processing systems |
JPH06236325A (ja) * | 1993-02-08 | 1994-08-23 | Sansei Denshi Japan Kk | データ記憶装置 |
CA2138627A1 (en) * | 1993-12-23 | 1995-06-24 | Timothy L. Smokoff | Method and system for launching application programs on an application server system |
US5944794A (en) * | 1994-09-30 | 1999-08-31 | Kabushiki Kaisha Toshiba | User identification data management scheme for networking computer systems using wide area network |
SE517910C2 (sv) * | 1994-11-29 | 2002-07-30 | Telia Ab | Datornätverk med behörighetskontroll |
SE518320C2 (sv) * | 1994-11-29 | 2002-09-24 | Telia Ab | Databasinloggning |
US5787175A (en) * | 1995-10-23 | 1998-07-28 | Novell, Inc. | Method and apparatus for collaborative document control |
US5771291A (en) * | 1995-12-11 | 1998-06-23 | Newton; Farrell | User identification and authentication system using ultra long identification keys and ultra large databases of identification keys for secure remote terminal access to a host computer |
US20030195848A1 (en) | 1996-06-05 | 2003-10-16 | David Felger | Method of billing a purchase made over a computer network |
US7013001B1 (en) * | 1996-06-05 | 2006-03-14 | David Felger | Method of billing a communication session conducted over a computer network |
US7555458B1 (en) | 1996-06-05 | 2009-06-30 | Fraud Control System.Com Corporation | Method of billing a purchase made over a computer network |
US8229844B2 (en) | 1996-06-05 | 2012-07-24 | Fraud Control Systems.Com Corporation | Method of billing a purchase made over a computer network |
US5867646A (en) * | 1996-07-12 | 1999-02-02 | Microsoft Corporation | Providing secure access for multiple processes having separate directories |
US5826021A (en) * | 1996-09-17 | 1998-10-20 | Sun Microsystems, Inc. | Disconnected write authorization in a client/server computing system |
US6055637A (en) * | 1996-09-27 | 2000-04-25 | Electronic Data Systems Corporation | System and method for accessing enterprise-wide resources by presenting to the resource a temporary credential |
JP3338654B2 (ja) * | 1998-08-24 | 2002-10-28 | 三菱プレシジョン株式会社 | 駐車場端末装置の遠隔管理方式 |
EP1149339A1 (en) | 1998-12-09 | 2001-10-31 | Network Ice Corporation | A method and apparatus for providing network and computer system security |
US7346929B1 (en) | 1999-07-29 | 2008-03-18 | International Business Machines Corporation | Method and apparatus for auditing network security |
US8006243B2 (en) | 1999-12-07 | 2011-08-23 | International Business Machines Corporation | Method and apparatus for remote installation of network drivers and software |
US7574740B1 (en) | 2000-04-28 | 2009-08-11 | International Business Machines Corporation | Method and system for intrusion detection in a computer network |
AU2001257400A1 (en) | 2000-04-28 | 2001-11-12 | Internet Security Systems, Inc. | System and method for managing security events on a network |
US7162649B1 (en) * | 2000-06-30 | 2007-01-09 | Internet Security Systems, Inc. | Method and apparatus for network assessment and authentication |
US7178166B1 (en) | 2000-09-19 | 2007-02-13 | Internet Security Systems, Inc. | Vulnerability assessment and authentication of a computer by a local scanner |
US9027121B2 (en) * | 2000-10-10 | 2015-05-05 | International Business Machines Corporation | Method and system for creating a record for one or more computer security incidents |
US7146305B2 (en) | 2000-10-24 | 2006-12-05 | Vcis, Inc. | Analytical virtual machine |
US7130466B2 (en) | 2000-12-21 | 2006-10-31 | Cobion Ag | System and method for compiling images from a database and comparing the compiled images with known images |
AU2002243763A1 (en) | 2001-01-31 | 2002-08-12 | Internet Security Systems, Inc. | Method and system for configuring and scheduling security audits of a computer network |
US7188243B2 (en) * | 2001-02-16 | 2007-03-06 | Microsoft Corporation | System and method for over the air configuration security |
US7237264B1 (en) | 2001-06-04 | 2007-06-26 | Internet Security Systems, Inc. | System and method for preventing network misuse |
US7657419B2 (en) | 2001-06-19 | 2010-02-02 | International Business Machines Corporation | Analytical virtual machine |
US20030046344A1 (en) * | 2001-08-31 | 2003-03-06 | International Business Machines Corp. | Method and system for controlling and securing teleconference sessions |
US7243853B1 (en) * | 2001-12-04 | 2007-07-17 | Visa U.S.A. Inc. | Method and system for facilitating memory and application management on a secured token |
US7673137B2 (en) | 2002-01-04 | 2010-03-02 | International Business Machines Corporation | System and method for the managed security control of processes on a computer system |
US7370360B2 (en) | 2002-05-13 | 2008-05-06 | International Business Machines Corporation | Computer immune system and method for detecting unwanted code in a P-code or partially compiled native-code program executing within a virtual machine |
US20040139021A1 (en) | 2002-10-07 | 2004-07-15 | Visa International Service Association | Method and system for facilitating data access and management on a secure token |
US7913303B1 (en) | 2003-01-21 | 2011-03-22 | International Business Machines Corporation | Method and system for dynamically protecting a computer system from attack |
US7657938B2 (en) | 2003-10-28 | 2010-02-02 | International Business Machines Corporation | Method and system for protecting computer networks by altering unwanted network data traffic |
JP2011108183A (ja) * | 2009-11-20 | 2011-06-02 | Fujitsu Ltd | 通信制御システム、中央装置、端末装置及びコンピュータプログラム |
Family Cites Families (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4525780A (en) * | 1981-05-22 | 1985-06-25 | Data General Corporation | Data processing system having a memory using object-based information and a protection scheme for determining access rights to such information |
US4439830A (en) * | 1981-11-09 | 1984-03-27 | Control Data Corporation | Computer system key and lock protection mechanism |
JPS59214946A (ja) * | 1983-05-20 | 1984-12-04 | Hitachi Ltd | デ−タのセキユリテイ制御方式 |
US4845715A (en) * | 1984-10-29 | 1989-07-04 | Francisco Michael H | Method for maintaining data processing system securing |
US4688169A (en) * | 1985-05-30 | 1987-08-18 | Joshi Bhagirath S | Computer software security system |
US4864494A (en) * | 1986-03-21 | 1989-09-05 | Computerized Data Ssytems For Mfg., Inc. | Software usage authorization system with key for decrypting/re-encrypting/re-transmitting moving target security codes from protected software |
JPS62248048A (ja) * | 1986-04-22 | 1987-10-29 | Nec Corp | フアイルの機密保護方式 |
JPS63223868A (ja) * | 1987-03-12 | 1988-09-19 | Oki Electric Ind Co Ltd | 端末装置の取扱い業務管理方式 |
JPH01189752A (ja) * | 1988-01-25 | 1989-07-28 | Yamatake Honeywell Co Ltd | 管理装置 |
US4962449A (en) * | 1988-04-11 | 1990-10-09 | Artie Schlesinger | Computer security system having remote location recognition and remote location lock-out |
US4941175A (en) * | 1989-02-24 | 1990-07-10 | International Business Machines Corporation | Tamper-resistant method for authorizing access to data between a host and a predetermined number of attached workstations |
DE4010094C2 (de) * | 1990-03-29 | 1995-12-14 | Sel Alcatel Ag | Verfahren zur Überprüfung der Zugangsberechtigung eines Benutzers zu einem Prozeß |
-
1991
- 1991-03-01 US US07/662,861 patent/US5274824A/en not_active Expired - Lifetime
-
1992
- 1992-02-26 AU AU11270/92A patent/AU643366B2/en not_active Ceased
- 1992-02-27 DE DE69229755T patent/DE69229755T2/de not_active Expired - Fee Related
- 1992-02-27 EP EP92103363A patent/EP0501475B1/en not_active Expired - Lifetime
- 1992-02-29 KR KR1019920003362A patent/KR960012656B1/ko not_active IP Right Cessation
- 1992-03-02 JP JP4487492A patent/JPH0561833A/ja active Pending
Also Published As
Publication number | Publication date |
---|---|
AU643366B2 (en) | 1993-11-11 |
KR960012656B1 (ko) | 1996-09-23 |
AU1127092A (en) | 1992-09-03 |
EP0501475A2 (en) | 1992-09-02 |
JPH0561833A (ja) | 1993-03-12 |
EP0501475A3 (en) | 1992-10-28 |
US5274824A (en) | 1993-12-28 |
DE69229755T2 (de) | 2000-06-08 |
EP0501475B1 (en) | 1999-08-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR920018595A (ko) | 분산형 멀티프로세서 데이타 시스템상의 유저보안키용 키링 메타포(Keyring Metaphor) | |
Wilkes et al. | The Cambridge CAP computer and its operating system | |
JP3081619B2 (ja) | コンピュータ・システムとその保安方法 | |
US5627967A (en) | Automated generation on file access control system commands in a data processing system with front end processing of a master list | |
US5202983A (en) | File accessing system using code name to access selected conversion table for converting simplified file name into original file name | |
US4930073A (en) | Method to prevent use of incorrect program version in a computer system | |
Kung et al. | On optimistic methods for concurrency control | |
US6035303A (en) | Object management system for digital libraries | |
US20050102255A1 (en) | Computer-implemented system and method for handling stored data | |
KR970068364A (ko) | 객체 지향 환경에서 객체에 대한 지속형 메타상태를 가능하게 하기 위한 방법 및 장치 | |
JPS58137200A (ja) | デ−タ処理装置 | |
CN101452397A (zh) | 虚拟化环境中的强制访问控制方法及装置 | |
Jones et al. | Towards the design of secure systems | |
Friedman | The authorization problem in shared files | |
JP2003108440A (ja) | データ公開方法、データ公開プログラム、データ公開装置 | |
CN108762942A (zh) | 多线程访问方法及装置 | |
US20200012808A1 (en) | System and method for managing permissions of users for a single data type column-oriented data structure | |
Downs et al. | A kernel design for a secure data base management system | |
Hoffman | FORMULARY MODEL FOR ACCESS CONTROL AND PRIVACY IN COMPUTER SYSTEMS. | |
JPH05181734A (ja) | データベースのアクセス権管理制御方式およびファイルシステムのアクセス権管理制御方式 | |
Spier | A model implementation for protective domains | |
RU2130643C1 (ru) | Способ обеспечения доступа к данным в системе управления базами данных "линтер-вс" | |
Collmeyer | Datebase Management in a Multi-Access Environment | |
Pirkola | A file system for a general-purpose time-sharing environment | |
CN108762941A (zh) | 多线程访问方法及装置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A201 | Request for examination | ||
G160 | Decision to publish patent application | ||
E701 | Decision to grant or registration of patent right | ||
GRNT | Written decision to grant | ||
FPAY | Annual fee payment |
Payment date: 19990918 Year of fee payment: 4 |
|
LAPS | Lapse due to unpaid annual fee |