KR920018595A - 분산형 멀티프로세서 데이타 시스템상의 유저보안키용 키링 메타포(Keyring Metaphor) - Google Patents

분산형 멀티프로세서 데이타 시스템상의 유저보안키용 키링 메타포(Keyring Metaphor) Download PDF

Info

Publication number
KR920018595A
KR920018595A KR1019920003362A KR920003362A KR920018595A KR 920018595 A KR920018595 A KR 920018595A KR 1019920003362 A KR1019920003362 A KR 1019920003362A KR 920003362 A KR920003362 A KR 920003362A KR 920018595 A KR920018595 A KR 920018595A
Authority
KR
South Korea
Prior art keywords
operator
list
key
lock
keys
Prior art date
Application number
KR1019920003362A
Other languages
English (en)
Other versions
KR960012656B1 (ko
Inventor
아이. 호워쓰 데이비드
Original Assignee
원본미기재
뷸 핸 인포메이숀 시스템즈 인코오포레이티드
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 원본미기재, 뷸 핸 인포메이숀 시스템즈 인코오포레이티드 filed Critical 원본미기재
Publication of KR920018595A publication Critical patent/KR920018595A/ko
Application granted granted Critical
Publication of KR960012656B1 publication Critical patent/KR960012656B1/ko

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1016Devices or methods for securing the PIN and other transaction-data, e.g. by encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F15/00Digital computers in general; Data processing equipment in general
    • G06F15/16Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2149Restricted operating environment

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Security & Cryptography (AREA)
  • Storage Device Security (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

내용 없음

Description

분산형 멀티프로세서 데이타 시스템상의 유저보안키용 키링 메타포(Keyring Metaphor)
본 내용은 요부공개 건이므로 전문내용을 수록하지 않았음
제1도는 본 발명이 구현된 분산형 데이타 시스템의 전체 구성을 도시한 도면,
제2도는 본 발명에 따른 시스템의 워크스테이션 및 네트워크 관리시스템을 보다 상세히 도시한 도면,
제3도는 오퍼레이터의 임무에 의해 인덱스된 키리스트를 포함한 기억매체의 파일을 상세히 도시한 도면.

Claims (3)

  1. 오퍼레이터가 그 자신을 시스템에 식별시키고 특정 처리 동작을 수행하는 명령을 입력시키며, 처리에 대한 로크(키에 대한 특정워드 또는 숫자가 호출되지 않을때 정보에 대한 동작 또는 액세스를 거부하는 메카니즘)가 제공되는 멀티프로세스 데이타 시스템에서 키들을 오퍼레이터와 상관시키는 방법에 있어서, 잠재적인 각 오퍼레이터에 대하여 오퍼레이터가 조작하도록 허락된 키의 리스트를 기억하고 상기 리스트를 상기 잠재적인 각 오퍼레이터에 연관시키는 단계와; 오퍼레이터의 식별을 상기 오퍼레이터에 의해 입력된 어떤 명령 및 상기 명령에 의한 처리수행과 연관시키는 단계와; 로크가 제공된 각 처리에서, 상기 각 처리를 수행한 오퍼레이터와 연관되는 키의 리스트를 액세스 하는 단계와; 상기 오퍼레이터와 연관된 상기 키의 리스트가 상기 로크에 대하여 미리 결정된 키를 포함하는 경우에만 요구된 정보를 제공하거나 요구된 동작을 수행하는 단계를 포함한 것을 특징으로 하는 키 및 오퍼레이터간의 상관방법.
  2. 오퍼레이터가 그 자신을 소정 코드(ID)에 의해 시스템에 식별시키고 특정 처리의 동작을 수행하는 명령을 입력하며, 처리에 대한 로크(키에 대한 특정워드 또는 숫자가 호출되지 않을때 대한 동작 또는 액세스를 거부하는 메카니즘)가 제공되는 멀티프로세스 데이타 시스템에서 키들을 오퍼레이터와 상관시키는 방법에 있어서, 각 ID와 연관되는 임무의 리스트와 각 임무와 연관되는 키의 리스트를 포함하는 파일을 유지하는 단계와; 오퍼레이터가 그 자신을 시스템에 식별시켰을때 그 오퍼레이터에 의해 제공된 ID와 연관된 임무의 리스트를 검색하는 단계, 및 상기 각 임무와 연관된 키의 리스트를 검색하고 오퍼레이터의 ID와 연관된 모든 키를 키리스트에 기억하는 단계와; 오퍼레이터가 명령을 입력하였을 때 상기 명령에 대응하는 처리를 수행하도록 지정된 처리에 대하여 디스패치하는 단계, 처리가 로크되어 있는지의 여부를 판정하는 단계, 및 처리가 로크되어 있는 경우에 상기 키리스트로 부터 오퍼레이터의 ID와 연관된 키를 검색하고 어떤 키가 상기 로크에 의해 요구된 키인지를 판정하며 그 키가 상기 로크에 대하여 미리 결정된 키인 경우에만 요구된 처리를 수행하는 단계를 포함한 것을 특징으로 하는 키 및 오퍼레이터간의 상관방법.
  3. 제2항에 있어서, 데이타 시스템이 디지탈 컴퓨터 또늠 메모리 수단을 각각 구비한 복수의 상호 접속된 디지탈 컴퓨터를 포함하고; 오퍼레이터에 의해 수행될 수 있는 처리가 존재하는 디지탈 컴퓨터에서 상기 키리스트의 카피가 상기 컴퓨터의 메모리 수단에 유지되는 것을 특징으로 하는 상관방법.
    ※ 참고사항 : 최초출원 내용에 의하여 공개하는 것임.
KR1019920003362A 1991-03-01 1992-02-29 분산형 멀티프로세서 데이타 시스템상의 유저보안키용 키링 메타포(keyring Metaphor) KR960012656B1 (ko)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US662,861 1991-03-01
US07/662,861 US5274824A (en) 1991-03-01 1991-03-01 Keyring metaphor for user's security keys on a distributed multiprocess data system

Publications (2)

Publication Number Publication Date
KR920018595A true KR920018595A (ko) 1992-10-22
KR960012656B1 KR960012656B1 (ko) 1996-09-23

Family

ID=24659539

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1019920003362A KR960012656B1 (ko) 1991-03-01 1992-02-29 분산형 멀티프로세서 데이타 시스템상의 유저보안키용 키링 메타포(keyring Metaphor)

Country Status (6)

Country Link
US (1) US5274824A (ko)
EP (1) EP0501475B1 (ko)
JP (1) JPH0561833A (ko)
KR (1) KR960012656B1 (ko)
AU (1) AU643366B2 (ko)
DE (1) DE69229755T2 (ko)

Families Citing this family (39)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3305737B2 (ja) * 1991-11-27 2002-07-24 富士通株式会社 情報処理装置の機密情報管理方式
US5423044A (en) * 1992-06-16 1995-06-06 International Business Machines Corporation Shared, distributed lock manager for loosely coupled processing systems
JPH06236325A (ja) * 1993-02-08 1994-08-23 Sansei Denshi Japan Kk データ記憶装置
CA2138627A1 (en) * 1993-12-23 1995-06-24 Timothy L. Smokoff Method and system for launching application programs on an application server system
US5944794A (en) * 1994-09-30 1999-08-31 Kabushiki Kaisha Toshiba User identification data management scheme for networking computer systems using wide area network
SE517910C2 (sv) * 1994-11-29 2002-07-30 Telia Ab Datornätverk med behörighetskontroll
SE518320C2 (sv) * 1994-11-29 2002-09-24 Telia Ab Databasinloggning
US5787175A (en) * 1995-10-23 1998-07-28 Novell, Inc. Method and apparatus for collaborative document control
US5771291A (en) * 1995-12-11 1998-06-23 Newton; Farrell User identification and authentication system using ultra long identification keys and ultra large databases of identification keys for secure remote terminal access to a host computer
US20030195848A1 (en) 1996-06-05 2003-10-16 David Felger Method of billing a purchase made over a computer network
US7013001B1 (en) * 1996-06-05 2006-03-14 David Felger Method of billing a communication session conducted over a computer network
US7555458B1 (en) 1996-06-05 2009-06-30 Fraud Control System.Com Corporation Method of billing a purchase made over a computer network
US8229844B2 (en) 1996-06-05 2012-07-24 Fraud Control Systems.Com Corporation Method of billing a purchase made over a computer network
US5867646A (en) * 1996-07-12 1999-02-02 Microsoft Corporation Providing secure access for multiple processes having separate directories
US5826021A (en) * 1996-09-17 1998-10-20 Sun Microsystems, Inc. Disconnected write authorization in a client/server computing system
US6055637A (en) * 1996-09-27 2000-04-25 Electronic Data Systems Corporation System and method for accessing enterprise-wide resources by presenting to the resource a temporary credential
JP3338654B2 (ja) * 1998-08-24 2002-10-28 三菱プレシジョン株式会社 駐車場端末装置の遠隔管理方式
EP1149339A1 (en) 1998-12-09 2001-10-31 Network Ice Corporation A method and apparatus for providing network and computer system security
US7346929B1 (en) 1999-07-29 2008-03-18 International Business Machines Corporation Method and apparatus for auditing network security
US8006243B2 (en) 1999-12-07 2011-08-23 International Business Machines Corporation Method and apparatus for remote installation of network drivers and software
US7574740B1 (en) 2000-04-28 2009-08-11 International Business Machines Corporation Method and system for intrusion detection in a computer network
AU2001257400A1 (en) 2000-04-28 2001-11-12 Internet Security Systems, Inc. System and method for managing security events on a network
US7162649B1 (en) * 2000-06-30 2007-01-09 Internet Security Systems, Inc. Method and apparatus for network assessment and authentication
US7178166B1 (en) 2000-09-19 2007-02-13 Internet Security Systems, Inc. Vulnerability assessment and authentication of a computer by a local scanner
US9027121B2 (en) * 2000-10-10 2015-05-05 International Business Machines Corporation Method and system for creating a record for one or more computer security incidents
US7146305B2 (en) 2000-10-24 2006-12-05 Vcis, Inc. Analytical virtual machine
US7130466B2 (en) 2000-12-21 2006-10-31 Cobion Ag System and method for compiling images from a database and comparing the compiled images with known images
AU2002243763A1 (en) 2001-01-31 2002-08-12 Internet Security Systems, Inc. Method and system for configuring and scheduling security audits of a computer network
US7188243B2 (en) * 2001-02-16 2007-03-06 Microsoft Corporation System and method for over the air configuration security
US7237264B1 (en) 2001-06-04 2007-06-26 Internet Security Systems, Inc. System and method for preventing network misuse
US7657419B2 (en) 2001-06-19 2010-02-02 International Business Machines Corporation Analytical virtual machine
US20030046344A1 (en) * 2001-08-31 2003-03-06 International Business Machines Corp. Method and system for controlling and securing teleconference sessions
US7243853B1 (en) * 2001-12-04 2007-07-17 Visa U.S.A. Inc. Method and system for facilitating memory and application management on a secured token
US7673137B2 (en) 2002-01-04 2010-03-02 International Business Machines Corporation System and method for the managed security control of processes on a computer system
US7370360B2 (en) 2002-05-13 2008-05-06 International Business Machines Corporation Computer immune system and method for detecting unwanted code in a P-code or partially compiled native-code program executing within a virtual machine
US20040139021A1 (en) 2002-10-07 2004-07-15 Visa International Service Association Method and system for facilitating data access and management on a secure token
US7913303B1 (en) 2003-01-21 2011-03-22 International Business Machines Corporation Method and system for dynamically protecting a computer system from attack
US7657938B2 (en) 2003-10-28 2010-02-02 International Business Machines Corporation Method and system for protecting computer networks by altering unwanted network data traffic
JP2011108183A (ja) * 2009-11-20 2011-06-02 Fujitsu Ltd 通信制御システム、中央装置、端末装置及びコンピュータプログラム

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4525780A (en) * 1981-05-22 1985-06-25 Data General Corporation Data processing system having a memory using object-based information and a protection scheme for determining access rights to such information
US4439830A (en) * 1981-11-09 1984-03-27 Control Data Corporation Computer system key and lock protection mechanism
JPS59214946A (ja) * 1983-05-20 1984-12-04 Hitachi Ltd デ−タのセキユリテイ制御方式
US4845715A (en) * 1984-10-29 1989-07-04 Francisco Michael H Method for maintaining data processing system securing
US4688169A (en) * 1985-05-30 1987-08-18 Joshi Bhagirath S Computer software security system
US4864494A (en) * 1986-03-21 1989-09-05 Computerized Data Ssytems For Mfg., Inc. Software usage authorization system with key for decrypting/re-encrypting/re-transmitting moving target security codes from protected software
JPS62248048A (ja) * 1986-04-22 1987-10-29 Nec Corp フアイルの機密保護方式
JPS63223868A (ja) * 1987-03-12 1988-09-19 Oki Electric Ind Co Ltd 端末装置の取扱い業務管理方式
JPH01189752A (ja) * 1988-01-25 1989-07-28 Yamatake Honeywell Co Ltd 管理装置
US4962449A (en) * 1988-04-11 1990-10-09 Artie Schlesinger Computer security system having remote location recognition and remote location lock-out
US4941175A (en) * 1989-02-24 1990-07-10 International Business Machines Corporation Tamper-resistant method for authorizing access to data between a host and a predetermined number of attached workstations
DE4010094C2 (de) * 1990-03-29 1995-12-14 Sel Alcatel Ag Verfahren zur Überprüfung der Zugangsberechtigung eines Benutzers zu einem Prozeß

Also Published As

Publication number Publication date
AU643366B2 (en) 1993-11-11
KR960012656B1 (ko) 1996-09-23
AU1127092A (en) 1992-09-03
EP0501475A2 (en) 1992-09-02
JPH0561833A (ja) 1993-03-12
EP0501475A3 (en) 1992-10-28
US5274824A (en) 1993-12-28
DE69229755T2 (de) 2000-06-08
EP0501475B1 (en) 1999-08-11

Similar Documents

Publication Publication Date Title
KR920018595A (ko) 분산형 멀티프로세서 데이타 시스템상의 유저보안키용 키링 메타포(Keyring Metaphor)
Wilkes et al. The Cambridge CAP computer and its operating system
JP3081619B2 (ja) コンピュータ・システムとその保安方法
US5627967A (en) Automated generation on file access control system commands in a data processing system with front end processing of a master list
US5202983A (en) File accessing system using code name to access selected conversion table for converting simplified file name into original file name
US4930073A (en) Method to prevent use of incorrect program version in a computer system
Kung et al. On optimistic methods for concurrency control
US6035303A (en) Object management system for digital libraries
US20050102255A1 (en) Computer-implemented system and method for handling stored data
KR970068364A (ko) 객체 지향 환경에서 객체에 대한 지속형 메타상태를 가능하게 하기 위한 방법 및 장치
JPS58137200A (ja) デ−タ処理装置
CN101452397A (zh) 虚拟化环境中的强制访问控制方法及装置
Jones et al. Towards the design of secure systems
Friedman The authorization problem in shared files
JP2003108440A (ja) データ公開方法、データ公開プログラム、データ公開装置
CN108762942A (zh) 多线程访问方法及装置
US20200012808A1 (en) System and method for managing permissions of users for a single data type column-oriented data structure
Downs et al. A kernel design for a secure data base management system
Hoffman FORMULARY MODEL FOR ACCESS CONTROL AND PRIVACY IN COMPUTER SYSTEMS.
JPH05181734A (ja) データベースのアクセス権管理制御方式およびファイルシステムのアクセス権管理制御方式
Spier A model implementation for protective domains
RU2130643C1 (ru) Способ обеспечения доступа к данным в системе управления базами данных "линтер-вс"
Collmeyer Datebase Management in a Multi-Access Environment
Pirkola A file system for a general-purpose time-sharing environment
CN108762941A (zh) 多线程访问方法及装置

Legal Events

Date Code Title Description
A201 Request for examination
G160 Decision to publish patent application
E701 Decision to grant or registration of patent right
GRNT Written decision to grant
FPAY Annual fee payment

Payment date: 19990918

Year of fee payment: 4

LAPS Lapse due to unpaid annual fee