WO1999064948A1 - Security model using restricted tokens - Google Patents

Security model using restricted tokens Download PDF

Info

Publication number
WO1999064948A1
WO1999064948A1 PCT/US1999/013057 US9913057W WO9964948A1 WO 1999064948 A1 WO1999064948 A1 WO 1999064948A1 US 9913057 W US9913057 W US 9913057W WO 9964948 A1 WO9964948 A1 WO 9964948A1
Authority
WO
WIPO (PCT)
Prior art keywords
access
token
restricted
security
resource
Prior art date
Application number
PCT/US1999/013057
Other languages
French (fr)
Inventor
Gregory Jensenworth
Praerit Garg
Michael M. Swift
Mario C. Goertzel
Shannon J. Chan
Original Assignee
Microsoft Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Microsoft Corporation filed Critical Microsoft Corporation
Priority to JP2000553885A priority Critical patent/JP4809530B2/en
Priority to EP99927413A priority patent/EP1084464B1/en
Priority to AT99927413T priority patent/ATE518179T1/en
Publication of WO1999064948A1 publication Critical patent/WO1999064948A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • G06F21/335User authentication using certificates for accessing specific resources, e.g. using Kerberos tickets
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • G06F21/645Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2145Inheriting rights or properties, e.g., propagation of permissions or restrictions within a hierarchy
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2149Restricted operating environment

Definitions

  • the invention relates generally to computer systems, and more particularly to an improved security model for computer systems.
  • executable content could only installed on a computer system by physically bringing magnetic media to the computer and having someone with administrative privileges install it.
  • the Internet has made it very easy and popular for ordinary computer users to download executable content such as ActiveX controls, programs, and scripts.
  • executable content may be downloaded and executed via the Internet without the user even realizing that such an event took place.
  • ⁇ trojans the ubiquitous presence of World Wide Web has made these problems widespread, and in some cases out of control.
  • client operating environments are not adequately protected against unruly code.
  • Some operating systems already have an existing security mechanism that limits what non-privileged users may do.
  • the security system built into the Windows NT operating system controls access to resources based on the identities of users.
  • the security mechanism in Windows NT compares a client' s user and group IDs and privileges associated with that process against security information assigned to that resource to grant or deny access to the resource. In this manner, unauthorized users are prevented from accessing resources and potentially causing harm, while authorized users may be limited in the actions they are allowed to perform.
  • the present invention provides restricted access tokens, each of which are a modified, restricted version of an access token created from an existing (parent) token.
  • a restricted token has less access than the parent token from which it is copied, and may be created by changing an attribute of one or more security identifiers that allow access in the parent token to a setting that disables access for allow in the restricted token, and/or removing one or more privileges from the restricted token that are present in the parent token.
  • a restricted token may also be created by placing restricted security identifiers therein.
  • a process is associated with a restricted token, such as by an application that launches that process.
  • a kernel mode security mechanism first compares the user-based security identifiers and the intended type of action against a list of identifiers and actions associated with the resource. If there are no restricted security identifiers in the restricted token, access is determined by the result of this first comparison. If there are restricted security identifiers in the restricted token, a second access check for this action compares the restricted security identifiers against the list of identifiers and actions associated with the resource. With a token having restricted security identifiers, the process is granted access to the resource only if both the first and second access checks pass.
  • a process can launch another process in a restricted context that is a subset of its own rights and privileges. In this manner, a process is capable of restricting another process, such as possibly unruly code, in the actions it can perform to resources .
  • FIGURE 1 is a block diagram representing a computer system into which the present invention may be incorporated;
  • FIG. 2 is a block diagram generally representing the creation of a restricted token from an existing token in accordance with one aspect of the present invention;
  • FIG. 3 is a block diagram generally representing the various components for determining whether a process may access a resource;
  • FIGS. 4 - 5 comprise a flow diagram representing the general steps taken to create a restricted token from an existing token in accordance with one aspect of the present invention
  • FIG. 6 is a block diagram generally representing a process having a restricted token associated therewith attempting to access a resource in accordance with one aspect of the present invention
  • FIG. 7 is a block diagram generally representing the logic for determining access to an object of a process having a restricted token associated therewith in accordance with an aspect of the present invention
  • FIG. 8 is a flow diagram representing the general steps taken when determining whether to grant a process access to a resource in accordance with an aspect of the present invention
  • FIG. 9 is a representation of a job object having multiple processes therein with common restrictions
  • FIG. 10 is a representation showing an implementation of restricted tokens over a network in accordance with another aspect of the present invention.
  • FIGS. 11 - 12 comprise a flow diagram representing the general steps taken when using restricted tokens over a network.
  • FIG. 1 and the following discussion are intended to provide a brief general description of a suitable computing environment in which the invention may be implemented.
  • the invention will be described in the general context of computer- executable instructions, such as program modules, being executed by a personal computer.
  • program modules include routines, programs, objects, components, data structures and the like that perform particular tasks or implement particular abstract data types.
  • program modules include routines, programs, objects, components, data structures and the like that perform particular tasks or implement particular abstract data types.
  • the invention may be practiced with other computer system configurations, including hand-held devices, multiprocessor systems, microprocessor-based or programmable consumer electronics, network PCs, minicomputers, mainframe computers and the like.
  • the invention may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network.
  • an exemplary system for implementing the invention includes a general purpose computing device in the form of a conventional personal computer 20 or the like, including a processing unit 21, a system memory 22, and a system bus 23 that couples various system components including the system memory to the processing unit 21.
  • the system bus 23 may be any of several types of bus structures including a memory bus or memory controller, a peripheral bus, and a local bus using any of a variety of bus architectures.
  • the system memory includes read-only memory (ROM) 24 and random access memory (RAM) 25.
  • a basic input/output system 26 (BIOS) , containing the basic routines that help to transfer information between elements within the personal computer 20, such as during start-up, is stored in ROM 24.
  • the personal computer 20 may further include a hard disk drive 27 for reading from and writing to a hard disk, not shown, a magnetic disk drive 28 for reading from or writing to a removable magnetic disk 29, and an optical disk drive 30 for reading from or writing to a removable optical disk 31 such as a CD-ROM or other optical media.
  • the hard disk drive 27, magnetic disk drive 28, and optical disk drive 30 are connected to the system bus 23 by a hard disk drive interface 32, a magnetic disk drive interface 33, and an optical drive interface 34, respectively.
  • the drives and their associated computer-readable media provide non-volatile storage of computer readable instructions, data structures, program modules and other data for the personal computer 20.
  • the exemplary environment described herein employs a hard disk, a removable magnetic disk 29 and a removable optical disk 31, it should be appreciated by those skilled in the art that other types of computer readable media which can store data that is accessible by a computer, such as magnetic cassettes, flash memory cards, digital video disks, Bernoulli cartridges, random access memories (RAMs) , read-only memories (ROMs) and the like may also be used in the exemplary operating environment.
  • a number of program modules may be stored on the hard disk, magnetic disk 29, optical disk 31, ROM 24 or RAM
  • an operating system 35 preferably Windows NT
  • application programs 36 other program modules 37 and program data 38.
  • a user may enter commands and information into the personal computer 20 through input devices such as a keyboard 40 and pointing device 42.
  • Other input devices may include a microphone, joystick, game pad, satellite dish, scanner or the like.
  • serial port interface 46 that is coupled to the system bus, but may be connected by other interfaces, such as a parallel port, game port or universal serial bus (USB) .
  • a monitor 47 or other type of display device is also connected to the system bus 23 via an interface, such as a video adapter 48.
  • personal computers typically include other peripheral output devices (not shown), such as speakers and printers.
  • the personal computer 20 may operate in a networked environment using logical connections to one or more remote computers, such as a remote computer 49.
  • the remote computer 49 may be another personal computer, a server, a router, a network PC, a peer device or other common network node, and typically includes many or all of the elements described above relative to the personal computer 20, although only a memory storage device 50 has been illustrated in FIG. 1.
  • the logical connections depicted in FIG. 1 include a local area network (LAN) 51 and a wide area network (WAN) 52.
  • LAN local area network
  • WAN wide area network
  • the personal computer 20 When used in a LAN networking environment, the personal computer 20 is connected to the local network 51 through a network interface or adapter 53. When used in a WAN networking environment, the personal computer 20 typically includes a modem 54 or other means for establishing communications over the wide area network 52, such as the Internet.
  • the modem 54 which may be internal or external, is connected to the system bus 23 via the serial port interface 46.
  • program modules depicted relative to the personal computer 20, or portions thereof may be stored in the remote memory storage device. It will be appreciated that the network connections shown are exemplary and other means of establishing a communications link between the computers may be used.
  • the General Securi ty Model The preferred security model of the present invention is described herein with reference to the Windows NT security model. Notwithstanding, there is no intention to limit the present invention to the Windows NT operating system, but on the contrary, the present invention is intended to operate with and provide benefits with any mechanism that performs security checks at the operating system level.
  • the present invention may also be used with software-fault isolation on a per-thread basis, or with a virtual machine where restrictions are determined from the stack of classes currently executing.
  • the present invention does not necessarily depend on kernel-mode operation, as with software-fault isolation or a virtual machine it may be implemented in user-mode.
  • a user performs tasks by accessing the system's resources via processes (and their threads) .
  • a process and its threads will be considered conceptually equivalent, and will thus hereinafter simply be referred to as a process.
  • the system's resources, including files, shared memory and physical devices, which in Windows NT are represented by objects, will be ordinarily referred to as either resources or objects herein.
  • a conventional user-based access token 60 includes a UserAndGroups field 62 including a security identifier (Security ID, or SID) 64 based on the user's credentials and one or more group IDs 66 identifying groups (e.g., within an organization) to which that user belongs.
  • the token 60 also includes a privileges field 68 listing any privileges assigned to the user. For example, one such privilege may give an administrative-level user the ability to set the system clock through a particular application programming interface (API). Note that privileges over-ride access control checks, described below, that are otherwise performed before granting access to an object.
  • API application programming interface
  • a process 70 desiring access to an object 72 specifies the type of access it desires (e.g., obtain read/write access to a file object) and at the kernel level provides its associated token 60 to an object manager 74.
  • the object 72 has a kernel level security descriptor 76 associated therewith, and the object manager 74 provides the security descriptor 76 and the token 60 to a security mechanism 78.
  • the contents of the security descriptor 76 are typically determined by the owner (e.g., creator) of the object, and generally comprise a (discretionary) access control list (ACL) 80 of access control entries, and for each entry, one or more access rights (allowed or denied actions) corresponding to that entry.
  • ACL access control list
  • Each entry comprises a type (deny or allow) indicator, flags, a security identifier (SID) and access rights in the form of a bitmask wherein each bit corresponds to a permission (e.g., one bit for read access, one for write and so on) .
  • the security mechanism 78 compares the security IDs in the token 60 along with the type of action or actions requested by the process 70 against the entries in the ACL 80. If a match is found with an allowed user or group, and the type of access desired is allowable for the user or group, a handle to the object 72 is returned to the process 70, otherwise access is denied.
  • a user with a token identifying the user as a member of the V ⁇ Accounting" group may wish to access a particular file object with read and write access. If the file object has the ""Accounting" group identifier of type allow in an entry of its ACL 80, and the group has rights enabling read and write access, a handle granting read and write access is returned, otherwise access is denied. Note that for efficiency reasons, the security check is performed only when the process 70 first attempts to access the object 72 (create or open), and thus the handle to the object stores the type of access information so as to limit the actions that can be performed therethrough.
  • the security descriptor 76 also includes a system ACL, or SACL 81, which comprises entries of type audit corresponding to client actions that are to be audited. Flags in each entry indicate whether the audit is monitoring successful or failed operations, and a bitmask in the entry indicates the type of operations that are to be audited. A security ID in the entry indicates the user or group being audited. For example, consider a situation wherein a particular group is being audited so as to determine whenever a member of that group that does not have write access to a file object attempts to write to that file.
  • the SACL 81 for that file object includes an audit entry having the group security identifier therein along with an appropriately set fail flag and write access bit.
  • the ACL 80 may contain one or more identifiers that are marked for denying users of groups access (as to all rights or selected rights) rather than granting access thereto. For example, one entry listed in the ACL 80 may otherwise allow members of w Group 3 " access to the object 72, but another entry in the ACL 80 may specifically deny *Group 2 4" all access. If the token 60 includes the '"Group24" security ID, access will be denied regardless of the presence of the *Group 3 " security ID.
  • the security check is arranged so as to not allow access via the 'Groups" entry before checking the 'DENY ALL" status of the Group 2 4 entry, such as by placing all DENY entries at the front of the ACL 80.
  • this arrangement provides for improved efficiency, as one or more isolated members of a group may be separately excluded in the ACL 80 rather than having to individually list each of the remaining members of a group to allow their access.
  • a caller may request a MAXIMUM_ALLOWED access, whereby an algorithm determines the maximum type of access allowed, based on the normal UserAndGroups list versus each of the entries in the ACL 80. More particularly, the algorithm walks down the list of identifiers accumulating the rights for a given user (i.e., OR-ing the various bitmasks) . Once the rights are accumulated, the user is given the accumulated rights. However, if during the walkthrough a deny entry is found that matches a user or group identifier and the requested rights, access is denied.
  • a restricted token is created from an existing access token (either restricted or unrestricted) as described below. As also described below, if the restricted token includes any restricted security IDs, the token is subject to an additional access check wherein the restricted security IDs are compared against the entries in the object's ACL.
  • a restricted token The primary use of a restricted token is for a process to create a new process with a restricted version of its own token.
  • the restricted process is then limited in the actions it may perform on resources.
  • a file object resource may have in its ACL a single restricted SID identifying the Microsoft Word application program, such that only restricted processes having the same Microsoft Word restricted SID in its associated restricted token may access the file object.
  • the ACL also needs to contain an access control entry granting the user access, as well as the Microsoft Word program.
  • untrusted code such as downloaded via a browser could be run in a restricted process that did not have the Microsoft Word restricted Security ID in its restricted token, preventing that (possibly unruly) code's access to the file object.
  • creating a process with a different token normally requires a privilege known as the SeAssignPrimaryToken privilege.
  • SeAssignPrimaryToken privilege a privilege known as the SeAssignPrimaryToken privilege.
  • process management allows one process with sufficient access to another process to modify its primary token to a restricted token, if the restricted token is derived from the primary token.
  • the operating system 35 may ensure that the process is only creating a restricted version of itself.
  • a restricted token 84 has less access than (i.e., has a subset of the rights and privileges of) its parent token, and may, for example, prevent access to an object based on the type of process (as well as the user or group) that is attempting to access the object, instead of simply allowing or denying access solely based on the user or group information.
  • a restricted token may also not allow access via one or more user or group security IDs specially marked as *USE_FOR_DENY_ONLY," even though the parent token allows access via those SIDs, and/or may have privileges removed that are present in the parent token.
  • one way in which to reduce access is to change an attribute of one or more user and/or group security identifiers in a restricted token so as to be unable to allow access, rather than grant access therewith.
  • Security IDs marked USE_FOR_DENY_ONLY are effectively ignored for purposes of granting access, however, an ACL that has a W DENY" entry for that security ID will still cause access to be denied.
  • the Group 2 security ID in the restricted token 84 (FIG. 3)
  • USE_FOR_DENY_ONLY when the user' s process attempts to access an object 72 having the ACL 80 that lists Group 2 as allowed, that entry is effectively ignored and the process will have to gain access by some other security ID.
  • the ACL 80 includes an entry listing Group 2 as DENY with respect to the requested type of action, then once tested, no access will be granted regardless of other security IDs.
  • the present invention allows a SID' s attributes to be modified to USE_FOR_DENY_ONLY in a restricted token. Moreover, no mechanism is provided to turn off this USE_FOR_DENY_ONLY security check.
  • Another way to reduce access in a restricted token is to remove one or more privileges relative to the parent token.
  • a user having a normal token with administrative privileges may set up a system such that unless that user specifically informs the system otherwise, the user's processes will run with a restricted token having no privileges.
  • this prevents inadvertent errors that may occur when the user is not intentionally acting in an administrative capacity.
  • programs may be developed to run in different modes depending on a user's privileges, whereby an administrative-level user has to run the program with administrative privileges to perform some operations, but operate with reduced privileges to perform more basic operations. Again, this helps to prevent serious errors that might otherwise occur when such a user is simply attempting to perform normal operations but is running with elevated privileges.
  • Restricted security IDs are numbers representing processes, resource operations and the like, made unique such as by adding a prefix to GUIDs or numbers generated via a cryptographic hash or the like, and may include information to distinguish these Security IDs from other Security IDs.
  • APIs application programming interfaces
  • GUID to Security ID conversion represent the Security IDs in human readable form, and so on.
  • a Security ID such as w USE_WINDOWS
  • the default ACL of a printer object may include a V USE_PRINTING" SID in its default ACL, so that a process could create a restricted process with only this Security ID listed in its restricted token, whereby the restricted process would be able to access the printer but no other resource.
  • numerous other Security IDs for accessing other resources may be implemented.
  • restricted security IDs are placed in a special field 82 of a restricted token 84, such as for identifying a process that is requesting an action.
  • an object may selectively grant access based on a requesting process (as well as a user or group) .
  • a requesting process as well as a user or group
  • an object such as a file object may allow Microsoft Word, Microsoft Excel or Windows Explorer processes to access it, but deny access to any other process.
  • each of the allowed processes may be granted different access rights.
  • the design provides for significant flexibility and granularity within the context of a user to control what different processes are allowed to do.
  • One expected usage model for these features includes a distinction between trusted applications and untrusted applications.
  • * application is used in a generic sense to describe any piece of code that may be executed in 'user mode" under a given security context.
  • an application such as Microsoft Word may run as a process from an ActiveX control, which may be loaded into an existing process and executed.
  • Applications which launch other applications such as Microsoft's Internet Explorer, may introduce a 'trust model" using this infrastructure.
  • an application such as Internet Explorer can use restricted tokens to execute untrusted executable code under different processes, and control what those processes can do within the user' s overall access rights and privileges.
  • the Internet Explorer application creates a restricted token from its own token, and determines which restricted security IDs will be placed in the restricted token. Then, the untrusted executable code is restricted to accessing only those objects that the restricted context may access.
  • entries corresponding to restricted SIDs and other restrictions may be placed in a field of the SACL 81 for auditing purposes.
  • the SACL of a resource may be set up to audit each time that Internet Explorer program attempts read or write access of that resource, and/or the use of SIDs marked USE_FOR_DENY_ONLY may be audited.
  • auditing will not be described in detail hereinafter, however it can be readily appreciated that the concepts described with respect to access control via restricted SIDs are applicable to auditing operations.
  • API application programming interface
  • the NtFilterToken API is wrapped under a Win32 API named CreateRestrictedToken, further set forth below:
  • these APIs 86 work in conjunction to take an existing token 60, either restricted or unrestricted, and create a modified token 60, either restricted or unrestricted, and create a modified token 60, either restricted or unrestricted, and create a modified token 60, either restricted or unrestricted, and create a modified token 60, either restricted or unrestricted, and create a modified token 60, either restricted or unrestricted, and create a modified
  • the structure of a restricted token which contains the identification information about an instance of a logged-on user, includes three new fields, ParentTokenld, RestrictedSidCount and RestrictedSids (shown in boldface below) : Typedef struct _TOKEN ⁇
  • a process calls the CreateRestrictedToken API with appropriate flag settings and/or information in the input fields, which in turn invokes the NtFilterToken API.
  • the NtFilterToken API checks to see if a flag named DISABLE_MAX_SIDS is set, which indicates that all Security IDs for groups in the new, restricted token 84 should be marked as USE_FOR_DENY_ONLY.
  • the flag provides a convenient way to restrict the (possibly many) groups in a token without needing to individually identify each of the groups. If the flag is set, step 400 branches to step 402 which sets a bit indicating USE_FOR_DENY_ONLY on each of the group security IDs in the new token 84.
  • step 400 branches to step 404 to test if any security IDs are individually listed in a SidsToDisable Field of the NtFilterToken API.
  • any Security IDs listed therein that are also present in the UserAndGroups field 62 of the parent token 60 are individually marked as USE_FOR_DENY_ONLY in the UserAndGroups field 88 of the new restricted token 84.
  • the Group 2 security ID is marked as USE_FOR_DENY_ONLY in the restricted token 84 by having specified the Group 2 security ID in the
  • step 410 of FIG. 4 a flag named DISABLE_MAX_PRIVILEGES is tested. This flag may be similarly set as a convenient shortcut to indicate that all privileges in the new, restricted token 84 should be removed. If set, step 410 branches to step 412 which deletes all privileges from the new token 84.
  • step 410 branches to step 414 wherein the optional PrivilegesToDelete field is examined. If present when the NtFilterToken API 86 is called, then at step 416, any privileges listed in this input field that are also present in the privileges field 68 of the existing token 60 are individually removed from the privileges field 90 of the new token 84. In the example shown in FIG. 2, the privileges shown as 'Privilege 2 " to 'PrivilegeTM" have been removed from the privileges field 90 of the new token 84 by having specified those privileges in the PrivilegesToDelete input field of the NtFilterToken API 86. In keeping with one aspect of the present invention, as described above, this provides the ability to reduce the privileges available in a token. The process continues to step 420 of FIG. 5.
  • An API, IsTokenRestricted is called at step 422, and resolves this question by querying (via the NtQuerylnformationToken API) the RestrictingSids field of the parent token to see if it is not NULL, whereby if not NULL, the parent token is a restricted token and the API returns a TRUE. If the test is not satisfied, the parent token is a normal token and the API returns a FALSE.
  • a parent token that is restricted but does not have restricted SIDs may be treated as being not restricted.
  • step 424 if the parent token is restricted, step 424 branches to step 426 wherein any security IDs that are in both the parent token's restricted Security ID field and the API's restricted Security ID input list are put into the restricted Security ID field 92 of the new token 84. Requiring restricted security IDs to be common to both lists prevents a restricted execution context from adding more security IDs to the restricted Security ID field 92, an event which would effectively increase rather than decrease access. Similarly, if none are common at step 426, any token created still has to be restricted without increasing the access thereof, such as by leaving at least one restricted SID from the original token in the new token. Otherwise, an empty restricted SIDs field in the new token might indicate that the token is not restricted, an event which would effectively increase rather than decrease access.
  • the RestrictingSids field 92 of the new token 84 is set to those listed in the input field. Note that although this adds security IDs, access is actually decreased since a token having restricted SIDs is subject to a secondary access test, as described in more detail below.
  • step 430 is also executed, whereby the ParentTokenld 93 in the new token 84 is set to the Tokenld of the existing (parent) token.
  • a restricted process 94 has been created and is attempting to open a file object 70 with read/write access.
  • the ACL 80 has a number of security IDs listed therein along with the type of access allowed for each ID, wherein "RO” indicates that read only access is allowed, "WR” indicates read/write access and "SYNC” indicates that synchronization access is allowed. Note that 'XJones” is specifically denied access to the object 72, even if 'XJones" would otherwise be allowed access through membership in an allowed group.
  • restricted security contexts are primarily implemented in the Windows NT kernel.
  • the process 94 provides the object manager 74 with information identifying the object to which access is desired along with the type of access desired, (FIG. 8, step 800) .
  • the object manager 74 works in conjunction with the security mechanism 78 to compare the user and group security IDs listed in the token 84 (associated with the process 94) against the entries in the ACL 80, to determine if the desired access should be granted or denied.
  • the security check denies access at step 814. However, if the result of the user and group portion of the access check indicates allowable access at step 804, the security process branches to step 806 to determine if the restricted token 84 has any restricted security IDs. If not, there are no additional restrictions, whereby the access check is complete and access is granted at step 812 (a handle to the object is returned) based solely on user and group access. In this manner, a normal token is essentially checked as before. However, if the token includes restricted security IDs as determined by step 806, then a secondary access check is performed at step 808 by comparing the restricted security IDs against the entries in the ACL 80. If this secondary access test allows access at step 810, access to the object is granted at step 812. If not, access is denied at step 814.
  • a two-part test is thus performed whenever restricted Security IDs are present in the token 84.
  • both the normal access test and (bitwise AND) the restricted security IDs access test must grant access in order for the process to be granted access to the object.
  • the normal access test proceeds first, and if access is denied, no further testing is necessary. Note that access may be denied either because no security ID in the token matched an identifier in the ACL, or because an ACL entry specifically denied access to the token based on a security identifier therein.
  • a token may be arranged to have multiple sets of restricted SIDS, with a more complex Boolean expression covering the evaluation of those SIDS, e.g., grant access if set A OR (set B AND set C) allow access.
  • the caller may have specified MAXIMUM_ALLOWED access, whereby as described above, an algorithm walks through the ACL 80 determining the maximum access.
  • MAXIMUM_ALLOWED access if any type of user or group access at all is granted, the type or types of access rights allowable following the user and groups run is specified as the desired access for the second run, which checks the RestrictedSids list. In this way, a restricted token is certain to be granted less than or equal to access than the normal token.
  • security model of the present invention may be used in conjunction with other security models.
  • capability-based security models residing on top of an operating system may be used above the operating system-level security model of the present invention.
  • a Job is a kernel object having a set of processes organized therein, wherein each job may have a different type of restriction associated therewith.
  • restricted tokens may be integrated with Windows NT Job Objects to allow management of multiple processes running under the same restrictions.
  • a Job object restriction is set forth below:
  • JOB_OBJECT_SECURITY_FILTER_TOKENS 0x00000008 These various pieces of information can be set on a Job object using an NtSetlnformationJobObject API, while a process is assigned to a job using the NtAssignProcessToJobObject API.
  • the security limit set on the job takes effect when a process is assigned.
  • the JOB_OBJECT_SECURITY_FILTER_TOKENS limit flag is set, whereby the primary token of the process being assigned to the job is filtered using the SidsToDisable, PrivilegesToDelete and RestrictedSids information provided in the security limit information, in a similar manner to how tokens associated with processes are filtered as described above.
  • a job 110 has a number of processes (e.g., processes 112 - 114) assigned thereto via the job NtAssignProcessToJobObject API.
  • Each process 112 - 114 has a respective token 116 a - 116 c associated therewith that is the same with respect to its restrictions, shown as 'Restrictions R.”
  • the Job object 110 restricts the processes 112 - 114 therein to only perform certain operations, because the tokens 116 a -116 c under which they are running have certain Security IDs (e.g., Administrator SID) disabled, certain privileges removed and/or a set of restricted Security IDs added.
  • certain Security IDs e.g., Administrator SID
  • the tokens may be the same with respect to their other access rights as well, in which event all of the tokens are essentially identical, but this is not required. If a process (e.g., the process 114) produces another process 118, that process 118 also runs in the job 110 with the same restrictions R, as the job object 110 ensures that the same restrictions R are associated with the new process 118 via its token 116 d .
  • restricted tokens may be used over a network connection, as described herein with particular reference to FIGS. 10 - 12.
  • some authentication protocols allow a client to specify special restrictions when authenticating.
  • the Kerberos protocol allows for specifying restrictions by adding a field to an authentication ticket that restricts the authority granted by the ticket.
  • this facility can be used by the client and server operating systems to enforce restrictions over a network connection.
  • a client 130 desires a connection to a server 132
  • authentication is required.
  • Kerberos protocol authentication of the connection to the server 132 is accomplished via a ticket 134.
  • the ticket is initially received by the client 130 from a ticket-issuing facility on the network known as a Key Distribution Center (KDC) 136.
  • KDC Key Distribution Center
  • the ticket 134 is re- useable for a period of time, whereby even if the session is terminated, the client 130 does not have to repeat the authentication process while the ticket 134 is still valid.
  • step 1100 when a process (e.g., the restricted process 138 having a restricted token 139 associated therewith) attempts to create an authenticated connection to another process 140 on another machine 132, at step 1100 the process 138 calls into the authentication code inside its operating system 142 requesting the connection.
  • the operating system code 142 first looks for an existing authentication ticket to the server 132. If there is no existing ticket, step 1102 will branch to step 1104 wherein the code will call the KDC 136 to request a ticket 144 for the service.
  • the client 130 may provide restrictions to be placed inside the ticket 144. Normally, however, none are included.
  • the ticket 144 enables the authentication (e.g., client request, server challenge, client response) to take place between the client and server.
  • Step 1110 takes place either when the client process is authenticated (if the process that initiated the original connection was the restricted process 138), or later, when the client operating system receives a request from the restricted process 138 to authenticate to a server 132.
  • the restricted process 138 requests the authenticated connection to the remote server process 140 (unless it has already done so) .
  • the client operating system 142 will look for an existing ticket to the server 132 having appropriate restrictions present in its restrictions field 146 therein. If the appropriate restrictions are not present, (e.g., as shown as NULL in FIG.
  • the operating system 142 will include the restrictions placed on the restricted client process 138, and at step 1116 will use the ticket-granting ticket 144 of the client 130 to request a new ticket 148 ⁇ from the KDC 136.
  • the KDC 136 will include these restrictions in a restrictions field 150 ⁇ of the ticket 148 ⁇ it returns.
  • the restrictions may comprise a list of restricted security IDs, a list of security IDs to mark as deny only, and/or a list of privileges to delete.
  • the client process 138 then sends a copy 148 2 of that ticket to the server process 140, as represented by step 1200 of FIG. 12.
  • the server operating system 152 constructs a token 154 from that ticket 148 2 , it will recognize the restrictions 150 2 , (step 1202) , and at step 1204 apply them to the (restricted) token it creates, i.e., a restricted token 154. If there are no restrictions, a normal token will be created via step 1206. In any event, the copy of the client's access token 154 on the server 132 has the same restrictions as the counterpart token 139 of the process 138 on the client machine 130. Note that privileges are removed in order to restrict a token, however once removed they are not known when a restricted token is sent to a remote location, and thus cannot be later recreated at that remote location.
  • a restricted process 138 is capable of directly requesting a ticket from the KDC 136 without going through the authenticating code (and its libraries) , the process 138 cannot obtain a ticket without obtaining a password from the user. This is because the process 138 does not have access to the client's password or ticket-granting ticket 144. This effectively limits the abilities of a restricted process 138 to those enforced by the authentication code in the operating system 142.
  • the present invention may be utilized in a Distributed Computing Environment (DCE) implementation of Kerberos.
  • DCE Distributed Computing Environment
  • both the original server's and the client's identity is sent.
  • the second server can then make access control decisions based on both sets of identities. If there are more than two servers, then the identity of the other intervening servers is also sent.
  • the present invention may be implemented with any other authentication protocol that enables additional information (i.e., restriction information) to be passed between a client and server along with the authentication credentials .
  • restricted tokens are created from a parent token which include security IDs that deny access rather than grant access relative to the parent token, remove privileges relative to the parent token and/or add restricted security IDs relative to the parent token. If restricted security IDs are added, a kernel mode security mechanism requires that both the user/group-based access check and the restricted security ID access check against a resource's access control list result in allowable access for the desired action, before access is granted to the resource.

Abstract

A restricted token may be created by changing an attribute of one or more security identifiers allowing access in the parent token to a setting that denies access in the restricted token and/or removing one or more privileges from the restricted token relative to the parent token. Once created, a process associates another process with the restricted token to launch the other process in a restricted context. A kernel-mode security mechanism determines whether the restricted process has access to a resource by first comparing user-based security identifiers in the restricted token and the intended type of action against a list of identifiers and actions associated with the resource. If no restricted security identifiers are in the restricted token, access is determined by this first check, otherwise a second access check further compares the restricted security identifiers against the list of identifiers and actions associated with the resource. With a token having restricted security identifiers, the process is granted access if both the first and the second access checks pass.

Description

SECURITY MODEL USING RESTRICTED TOKENS
FIELD OF THE INVENTION
The invention relates generally to computer systems, and more particularly to an improved security model for computer systems.
BACKGROUND OF THE INVENTION
Historically, executable content could only installed on a computer system by physically bringing magnetic media to the computer and having someone with administrative privileges install it. At present, however, the Internet has made it very easy and popular for ordinary computer users to download executable content such as ActiveX controls, programs, and scripts. In many cases, executable content may be downloaded and executed via the Internet without the user even realizing that such an event took place.
Unfortunately, such executable content is often unruly, e.g., it may be malicious and intentionally destroy data on the client machine, error-prone and cause the client machine to crash, or well-intentioned but careless and divulge confidential information about the client. Although these types of computer problems have previously existed in the form of viruses" and
^trojans," the ubiquitous presence of World Wide Web has made these problems widespread, and in some cases out of control. In general, client operating environments are not adequately protected against unruly code. Some operating systems already have an existing security mechanism that limits what non-privileged users may do. For example, the security system built into the Windows NT operating system controls access to resources based on the identities of users. When a Windows NT process wishes to access a resource to perform some action, the security mechanism in Windows NT compares a client' s user and group IDs and privileges associated with that process against security information assigned to that resource to grant or deny access to the resource. In this manner, unauthorized users are prevented from accessing resources and potentially causing harm, while authorized users may be limited in the actions they are allowed to perform. However, at present, when a user process has the appropriate rights or privileges to access a resource, the process, which may include executable content that is unruly, may access the resource with undesirable results. For example, a Windows NT user having appropriate credentials may download and execute unruly code, whereby any or all of the above-described adverse consequences may result. Other security models have similar and other drawbacks that make them vulnerable to the same problems.
SUMMARY OF THE INVENTION
Briefly, the present invention provides restricted access tokens, each of which are a modified, restricted version of an access token created from an existing (parent) token. A restricted token has less access than the parent token from which it is copied, and may be created by changing an attribute of one or more security identifiers that allow access in the parent token to a setting that disables access for allow in the restricted token, and/or removing one or more privileges from the restricted token that are present in the parent token. In addition, a restricted token may also be created by placing restricted security identifiers therein.
In use, a process is associated with a restricted token, such as by an application that launches that process. When the restricted process attempts to perform an action on a resource, a kernel mode security mechanism first compares the user-based security identifiers and the intended type of action against a list of identifiers and actions associated with the resource. If there are no restricted security identifiers in the restricted token, access is determined by the result of this first comparison. If there are restricted security identifiers in the restricted token, a second access check for this action compares the restricted security identifiers against the list of identifiers and actions associated with the resource. With a token having restricted security identifiers, the process is granted access to the resource only if both the first and second access checks pass.
By creating a restricted token, a process can launch another process in a restricted context that is a subset of its own rights and privileges. In this manner, a process is capable of restricting another process, such as possibly unruly code, in the actions it can perform to resources .
Other advantages will become apparent from the following detailed description when taken in conjunction with the drawings, in which:
BRIEF DESCRIPTION OF THE DRAWINGS
FIGURE 1 is a block diagram representing a computer system into which the present invention may be incorporated; FIG. 2 is a block diagram generally representing the creation of a restricted token from an existing token in accordance with one aspect of the present invention; FIG. 3 is a block diagram generally representing the various components for determining whether a process may access a resource;
FIGS. 4 - 5 comprise a flow diagram representing the general steps taken to create a restricted token from an existing token in accordance with one aspect of the present invention;
FIG. 6 is a block diagram generally representing a process having a restricted token associated therewith attempting to access a resource in accordance with one aspect of the present invention;
FIG. 7 is a block diagram generally representing the logic for determining access to an object of a process having a restricted token associated therewith in accordance with an aspect of the present invention;
FIG. 8 is a flow diagram representing the general steps taken when determining whether to grant a process access to a resource in accordance with an aspect of the present invention; FIG. 9 is a representation of a job object having multiple processes therein with common restrictions;
FIG. 10 is a representation showing an implementation of restricted tokens over a network in accordance with another aspect of the present invention; and
FIGS. 11 - 12 comprise a flow diagram representing the general steps taken when using restricted tokens over a network.
DETAILED DESCRIPTION
Exemplary Operating Environment
Figure 1 and the following discussion are intended to provide a brief general description of a suitable computing environment in which the invention may be implemented. Although not required, the invention will be described in the general context of computer- executable instructions, such as program modules, being executed by a personal computer. Generally, program modules include routines, programs, objects, components, data structures and the like that perform particular tasks or implement particular abstract data types. Moreover, those skilled in the art will appreciate that the invention may be practiced with other computer system configurations, including hand-held devices, multiprocessor systems, microprocessor-based or programmable consumer electronics, network PCs, minicomputers, mainframe computers and the like. The invention may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote memory storage devices. With reference to FIG. 1, an exemplary system for implementing the invention includes a general purpose computing device in the form of a conventional personal computer 20 or the like, including a processing unit 21, a system memory 22, and a system bus 23 that couples various system components including the system memory to the processing unit 21. The system bus 23 may be any of several types of bus structures including a memory bus or memory controller, a peripheral bus, and a local bus using any of a variety of bus architectures. The system memory includes read-only memory (ROM) 24 and random access memory (RAM) 25. A basic input/output system 26 (BIOS) , containing the basic routines that help to transfer information between elements within the personal computer 20, such as during start-up, is stored in ROM 24. The personal computer 20 may further include a hard disk drive 27 for reading from and writing to a hard disk, not shown, a magnetic disk drive 28 for reading from or writing to a removable magnetic disk 29, and an optical disk drive 30 for reading from or writing to a removable optical disk 31 such as a CD-ROM or other optical media. The hard disk drive 27, magnetic disk drive 28, and optical disk drive 30 are connected to the system bus 23 by a hard disk drive interface 32, a magnetic disk drive interface 33, and an optical drive interface 34, respectively. The drives and their associated computer-readable media provide non-volatile storage of computer readable instructions, data structures, program modules and other data for the personal computer 20. Although the exemplary environment described herein employs a hard disk, a removable magnetic disk 29 and a removable optical disk 31, it should be appreciated by those skilled in the art that other types of computer readable media which can store data that is accessible by a computer, such as magnetic cassettes, flash memory cards, digital video disks, Bernoulli cartridges, random access memories (RAMs) , read-only memories (ROMs) and the like may also be used in the exemplary operating environment.
A number of program modules may be stored on the hard disk, magnetic disk 29, optical disk 31, ROM 24 or RAM
25, including an operating system 35 (preferably Windows NT) , one or more application programs 36, other program modules 37 and program data 38. A user may enter commands and information into the personal computer 20 through input devices such as a keyboard 40 and pointing device 42. Other input devices (not shown) may include a microphone, joystick, game pad, satellite dish, scanner or the like. These and other input devices are often connected to the processing unit 21 through a serial port interface 46 that is coupled to the system bus, but may be connected by other interfaces, such as a parallel port, game port or universal serial bus (USB) . A monitor 47 or other type of display device is also connected to the system bus 23 via an interface, such as a video adapter 48. In addition to the monitor 47, personal computers typically include other peripheral output devices (not shown), such as speakers and printers.
The personal computer 20 may operate in a networked environment using logical connections to one or more remote computers, such as a remote computer 49. The remote computer 49 may be another personal computer, a server, a router, a network PC, a peer device or other common network node, and typically includes many or all of the elements described above relative to the personal computer 20, although only a memory storage device 50 has been illustrated in FIG. 1. The logical connections depicted in FIG. 1 include a local area network (LAN) 51 and a wide area network (WAN) 52. Such networking environments are commonplace in offices, enterprise-wide computer networks, Intranets and the Internet.
When used in a LAN networking environment, the personal computer 20 is connected to the local network 51 through a network interface or adapter 53. When used in a WAN networking environment, the personal computer 20 typically includes a modem 54 or other means for establishing communications over the wide area network 52, such as the Internet. The modem 54, which may be internal or external, is connected to the system bus 23 via the serial port interface 46. In a networked environment, program modules depicted relative to the personal computer 20, or portions thereof, may be stored in the remote memory storage device. It will be appreciated that the network connections shown are exemplary and other means of establishing a communications link between the computers may be used.
The General Securi ty Model The preferred security model of the present invention is described herein with reference to the Windows NT security model. Notwithstanding, there is no intention to limit the present invention to the Windows NT operating system, but on the contrary, the present invention is intended to operate with and provide benefits with any mechanism that performs security checks at the operating system level. In addition, the present invention may also be used with software-fault isolation on a per-thread basis, or with a virtual machine where restrictions are determined from the stack of classes currently executing. Moreover, the present invention does not necessarily depend on kernel-mode operation, as with software-fault isolation or a virtual machine it may be implemented in user-mode. In general, in the Windows NT operating system, a user performs tasks by accessing the system's resources via processes (and their threads) . For purposes of simplicity herein, a process and its threads will be considered conceptually equivalent, and will thus hereinafter simply be referred to as a process. Also, the system's resources, including files, shared memory and physical devices, which in Windows NT are represented by objects, will be ordinarily referred to as either resources or objects herein. When a user logs on to the Windows NT operating system and is authenticated, a security context is set up for that user, which includes building an access token 60. As shown in the left portion of FIG. 2, a conventional user-based access token 60 includes a UserAndGroups field 62 including a security identifier (Security ID, or SID) 64 based on the user's credentials and one or more group IDs 66 identifying groups (e.g., within an organization) to which that user belongs. The token 60 also includes a privileges field 68 listing any privileges assigned to the user. For example, one such privilege may give an administrative-level user the ability to set the system clock through a particular application programming interface (API). Note that privileges over-ride access control checks, described below, that are otherwise performed before granting access to an object.
As will be described in more detail below and as generally represented in FIG. 3, a process 70 desiring access to an object 72 specifies the type of access it desires (e.g., obtain read/write access to a file object) and at the kernel level provides its associated token 60 to an object manager 74. The object 72 has a kernel level security descriptor 76 associated therewith, and the object manager 74 provides the security descriptor 76 and the token 60 to a security mechanism 78. The contents of the security descriptor 76 are typically determined by the owner (e.g., creator) of the object, and generally comprise a (discretionary) access control list (ACL) 80 of access control entries, and for each entry, one or more access rights (allowed or denied actions) corresponding to that entry. Each entry comprises a type (deny or allow) indicator, flags, a security identifier (SID) and access rights in the form of a bitmask wherein each bit corresponds to a permission (e.g., one bit for read access, one for write and so on) . The security mechanism 78 compares the security IDs in the token 60 along with the type of action or actions requested by the process 70 against the entries in the ACL 80. If a match is found with an allowed user or group, and the type of access desired is allowable for the user or group, a handle to the object 72 is returned to the process 70, otherwise access is denied. By way of example, a user with a token identifying the user as a member of the Accounting" group may wish to access a particular file object with read and write access. If the file object has the ""Accounting" group identifier of type allow in an entry of its ACL 80, and the group has rights enabling read and write access, a handle granting read and write access is returned, otherwise access is denied. Note that for efficiency reasons, the security check is performed only when the process 70 first attempts to access the object 72 (create or open), and thus the handle to the object stores the type of access information so as to limit the actions that can be performed therethrough.
The security descriptor 76 also includes a system ACL, or SACL 81, which comprises entries of type audit corresponding to client actions that are to be audited. Flags in each entry indicate whether the audit is monitoring successful or failed operations, and a bitmask in the entry indicates the type of operations that are to be audited. A security ID in the entry indicates the user or group being audited. For example, consider a situation wherein a particular group is being audited so as to determine whenever a member of that group that does not have write access to a file object attempts to write to that file. The SACL 81 for that file object includes an audit entry having the group security identifier therein along with an appropriately set fail flag and write access bit. Whenever a client belonging to that particular group attempts to write to the file object and fails, the operation is logged. Note that the ACL 80 may contain one or more identifiers that are marked for denying users of groups access (as to all rights or selected rights) rather than granting access thereto. For example, one entry listed in the ACL 80 may otherwise allow members of wGroup3" access to the object 72, but another entry in the ACL 80 may specifically deny *Group24" all access. If the token 60 includes the '"Group24" security ID, access will be denied regardless of the presence of the *Group3" security ID. Of course to function properly, the security check is arranged so as to not allow access via the 'Groups" entry before checking the 'DENY ALL" status of the Group24 entry, such as by placing all DENY entries at the front of the ACL 80. As can be appreciated, this arrangement provides for improved efficiency, as one or more isolated members of a group may be separately excluded in the ACL 80 rather than having to individually list each of the remaining members of a group to allow their access.
Note that instead of specifying a type of access, a caller may request a MAXIMUM_ALLOWED access, whereby an algorithm determines the maximum type of access allowed, based on the normal UserAndGroups list versus each of the entries in the ACL 80. More particularly, the algorithm walks down the list of identifiers accumulating the rights for a given user (i.e., OR-ing the various bitmasks) . Once the rights are accumulated, the user is given the accumulated rights. However, if during the walkthrough a deny entry is found that matches a user or group identifier and the requested rights, access is denied.
Restricted Tokens
In accordance with one aspect of the present invention, a restricted token is created from an existing access token (either restricted or unrestricted) as described below. As also described below, if the restricted token includes any restricted security IDs, the token is subject to an additional access check wherein the restricted security IDs are compared against the entries in the object's ACL.
The primary use of a restricted token is for a process to create a new process with a restricted version of its own token. The restricted process is then limited in the actions it may perform on resources. For example, a file object resource may have in its ACL a single restricted SID identifying the Microsoft Word application program, such that only restricted processes having the same Microsoft Word restricted SID in its associated restricted token may access the file object. Note that the original user still needs to have access to the object, so the ACL also needs to contain an access control entry granting the user access, as well as the Microsoft Word program. Then, for example, untrusted code such as downloaded via a browser could be run in a restricted process that did not have the Microsoft Word restricted Security ID in its restricted token, preventing that (possibly unruly) code's access to the file object. For security reasons, creating a process with a different token normally requires a privilege known as the SeAssignPrimaryToken privilege. However, to allow processes to be associated with restricted tokens, process management allows one process with sufficient access to another process to modify its primary token to a restricted token, if the restricted token is derived from the primary token. By comparing the ParentTokenld of the new process's token with the Tokenld of the existing process' token, the operating system 35 may ensure that the process is only creating a restricted version of itself.
A restricted token 84 has less access than (i.e., has a subset of the rights and privileges of) its parent token, and may, for example, prevent access to an object based on the type of process (as well as the user or group) that is attempting to access the object, instead of simply allowing or denying access solely based on the user or group information. A restricted token may also not allow access via one or more user or group security IDs specially marked as *USE_FOR_DENY_ONLY," even though the parent token allows access via those SIDs, and/or may have privileges removed that are present in the parent token. Thus, one way in which to reduce access is to change an attribute of one or more user and/or group security identifiers in a restricted token so as to be unable to allow access, rather than grant access therewith. Security IDs marked USE_FOR_DENY_ONLY are effectively ignored for purposes of granting access, however, an ACL that has a WDENY" entry for that security ID will still cause access to be denied. By way of example, if the Group2 security ID in the restricted token 84 (FIG. 3) is marked USE_FOR_DENY_ONLY, when the user' s process attempts to access an object 72 having the ACL 80 that lists Group2 as allowed, that entry is effectively ignored and the process will have to gain access by some other security ID. However, if the ACL 80 includes an entry listing Group2 as DENY with respect to the requested type of action, then once tested, no access will be granted regardless of other security IDs.
Note that access to objects cannot be safely reduced by simply removing a security ID from a user' s token, since that security ID may be marked as NDENY" in the ACL of some objects, whereby removing that identifier would grant rather than deny access to those objects. Thus, the present invention allows a SID' s attributes to be modified to USE_FOR_DENY_ONLY in a restricted token. Moreover, no mechanism is provided to turn off this USE_FOR_DENY_ONLY security check.
Another way to reduce access in a restricted token is to remove one or more privileges relative to the parent token. For example, a user having a normal token with administrative privileges may set up a system such that unless that user specifically informs the system otherwise, the user's processes will run with a restricted token having no privileges. As can be appreciated, this prevents inadvertent errors that may occur when the user is not intentionally acting in an administrative capacity. Similarly, programs may be developed to run in different modes depending on a user's privileges, whereby an administrative-level user has to run the program with administrative privileges to perform some operations, but operate with reduced privileges to perform more basic operations. Again, this helps to prevent serious errors that might otherwise occur when such a user is simply attempting to perform normal operations but is running with elevated privileges. Yet another way to reduce a token's access is to add restricted security IDs thereto. Restricted security IDs are numbers representing processes, resource operations and the like, made unique such as by adding a prefix to GUIDs or numbers generated via a cryptographic hash or the like, and may include information to distinguish these Security IDs from other Security IDs. Although not necessary to the invention, for convenience, various application programming interfaces (APIs) are provided to interface applications and users with Security IDs, such as to accomplish a GUID to Security ID conversion, represent the Security IDs in human readable form, and so on.
In addition to restricting access to a resource based on the application (process) requesting access, specific Security IDs may be developed based on likely restricted uses of a resource. By way of example, a Security ID such as wUSE_WINDOWS" would be placed in the default ACLs of windowstations and the desktop to allow access thereto only by a process having a corresponding SID in its restricted token. Similarly, the default ACL of a printer object may include a VUSE_PRINTING" SID in its default ACL, so that a process could create a restricted process with only this Security ID listed in its restricted token, whereby the restricted process would be able to access the printer but no other resource. As can be appreciated, numerous other Security IDs for accessing other resources may be implemented. As shown in FIG. 3, restricted security IDs are placed in a special field 82 of a restricted token 84, such as for identifying a process that is requesting an action. As described in more detail below, by requiring that both at least one user (or group) security ID and at least one restricted security ID be granted access to an object, an object may selectively grant access based on a requesting process (as well as a user or group) . For example, an object such as a file object may allow Microsoft Word, Microsoft Excel or Windows Explorer processes to access it, but deny access to any other process. Moreover, each of the allowed processes may be granted different access rights.
The design provides for significant flexibility and granularity within the context of a user to control what different processes are allowed to do. One expected usage model for these features includes a distinction between trusted applications and untrusted applications. Note that the term * application" is used in a generic sense to describe any piece of code that may be executed in 'user mode" under a given security context. For example, an application such as Microsoft Word may run as a process from an ActiveX control, which may be loaded into an existing process and executed. Applications which launch other applications, such as Microsoft's Internet Explorer, may introduce a 'trust model" using this infrastructure.
By way of example, an application such as Internet Explorer can use restricted tokens to execute untrusted executable code under different processes, and control what those processes can do within the user' s overall access rights and privileges. To this end, the Internet Explorer application creates a restricted token from its own token, and determines which restricted security IDs will be placed in the restricted token. Then, the untrusted executable code is restricted to accessing only those objects that the restricted context may access.
Moreover, entries corresponding to restricted SIDs and other restrictions may be placed in a field of the SACL 81 for auditing purposes. For example, the SACL of a resource may be set up to audit each time that Internet Explorer program attempts read or write access of that resource, and/or the use of SIDs marked USE_FOR_DENY_ONLY may be audited. For purposes of simplicity, auditing will not be described in detail hereinafter, however it can be readily appreciated that the concepts described with respect to access control via restricted SIDs are applicable to auditing operations. To create a restricted token from an existing token, an application programming interface (API) is provided, named NtFilterToken, as set forth below:
NTSTATUS
NtFilterToken (
IN HANDLE ExistingTokenHandle,
IN ULONG Flags,
IN PTOKEN GROUPS SidsToDisable OPTIONAL,
IN pTOKEN" PRIVILEGES PrivilegesToDelete OPTIONAL,
IN PTOKEN' GROUPS RestrictingSids OPTIONAL,
OUT PHANDLE NewTokenHandle
);
The NtFilterToken API is wrapped under a Win32 API named CreateRestrictedToken, further set forth below:
WINADVAPI BOOL
APIENTRY CreateRestrictedToken (
IN HANDLE ExistingTokenHandle,
IN DWORD Flags,
IN DWORD DisableSidCount,
IN PSID_AND_ATTRIBUTES SidsToDisable OPTIONAL,
IN DWORD DeletePrivilegeCount,
IN PLUID_AND_ATTRIBUTES PrivilegesToDelete
OPTIONAL,
IN DWORD RestrictedSidCount,
IN PSID_AND_ATTRIBUTES SidsToRestrict
OPTIONAL,
OUT PHANDLE NewTokenHandle
) ;
As represented in FIGS. 2 and 4 - 5, these APIs 86 work in conjunction to take an existing token 60, either restricted or unrestricted, and create a modified
(restricted) token 84 therefrom. The structure of a restricted token, which contains the identification information about an instance of a logged-on user, includes three new fields, ParentTokenld, RestrictedSidCount and RestrictedSids (shown in boldface below) : Typedef struct _TOKEN {
TOKEN_SOURCE TokenSource; // Ro: 16-Bytes
LUID Tokenld; // Ro: 8-Bytes
LUID Authenticationld; // Ro: 8-Bytes
LUID ParentTokenld; // Ro: 8-Bytes
LARGE INTEGER ExpirationTime; // Ro: 8-Bytes
LUID Modifiedld; // Wr: 8-Bytes
ULONG UserAndGroupCount ; // Ro: 4-Bytes
UIΛNG RestrictedSidCount; // Ro: 4-Bytes
ULONG PrivilegeCount; // Ro: 4-Bytes
ULONG VariableLength; // Ro: 4-Bytes
ULONG DynamicCharged; // Ro: 4-Bytes
ULONG DynamicAvailable; // Wr: 4-Bytes (Mod)
ULONG DefaultOwnerIndex; // Wr: 4-Bytes (Mod)
PSID AND ATTRIBUTES UserAndGroups; // Wr: 4-Bytes (Mod)
PSID AND_ATTRIBUTES RestrictedSids; // Ro: 4-Bytes
PSID PrimaryGroup; // Wr: 4-Bytes (Mod)
PLUID_AND_ATTRIBUTES Privileges; // Wr: 4-Bytes (Mod)
PULONG DynamicPart; // Wr: 4-Bytes (Mod)
PACL DefaultDacl; // Wr: 4-Bytes (Mod)
TOKEN_TYPE TokenType; // Ro: 1-Byte
SECURITY_IMPERSONATION_LEVEL
ImpersonationLevel; // Ro: 1-Byte
UCHAR TokenFlags; // Ro: 4-Bytes
BOOLEAN TokenlnUse; // Wr: 1-Byte
PSECURITY TOKEN_PROXY_DATA ProxyData; // Ro: 4-Bytes
PSECURITY TOKEN AUDIT DATA AuditData; // Ro: 4-Bytes
ULONG VariablePart; // Wr: 4-Bytes (Mod)
} TOKEN, * PTOKEN;
Note that when a normal (non-restricted) token is now created, via a CreateToken API, the RestrictedSids field is empty, as is the ParentTokenld field.
To create a restricted token 84, a process calls the CreateRestrictedToken API with appropriate flag settings and/or information in the input fields, which in turn invokes the NtFilterToken API. As represented beginning at step 400 of FIG. 4, the NtFilterToken API checks to see if a flag named DISABLE_MAX_SIDS is set, which indicates that all Security IDs for groups in the new, restricted token 84 should be marked as USE_FOR_DENY_ONLY. The flag provides a convenient way to restrict the (possibly many) groups in a token without needing to individually identify each of the groups. If the flag is set, step 400 branches to step 402 which sets a bit indicating USE_FOR_DENY_ONLY on each of the group security IDs in the new token 84.
If the DISABLE_MAX_SIDS flag is not set, then step 400 branches to step 404 to test if any security IDs are individually listed in a SidsToDisable Field of the NtFilterToken API. As shown at step 404 of FIG. 4, when the optional SidsToDisable input field is present, at step 406, any Security IDs listed therein that are also present in the UserAndGroups field 62 of the parent token 60 are individually marked as USE_FOR_DENY_ONLY in the UserAndGroups field 88 of the new restricted token 84. As described above, such Security IDs can only be used to deny access and cannot be used to grant access, and moreover, cannot later be removed or enabled. Thus, in the example shown in FIG. 2, the Group2 security ID is marked as USE_FOR_DENY_ONLY in the restricted token 84 by having specified the Group2 security ID in the
SidsToDisable input field of the NtFilterToken API 86. The filter process then continues to step 410 of FIG. 4, wherein a flag named DISABLE_MAX_PRIVILEGES is tested. This flag may be similarly set as a convenient shortcut to indicate that all privileges in the new, restricted token 84 should be removed. If set, step 410 branches to step 412 which deletes all privileges from the new token 84.
If the flag is not set, step 410 branches to step 414 wherein the optional PrivilegesToDelete field is examined. If present when the NtFilterToken API 86 is called, then at step 416, any privileges listed in this input field that are also present in the privileges field 68 of the existing token 60 are individually removed from the privileges field 90 of the new token 84. In the example shown in FIG. 2, the privileges shown as 'Privilege2 " to 'Privilege™" have been removed from the privileges field 90 of the new token 84 by having specified those privileges in the PrivilegesToDelete input field of the NtFilterToken API 86. In keeping with one aspect of the present invention, as described above, this provides the ability to reduce the privileges available in a token. The process continues to step 420 of FIG. 5.
When creating a restricted token 84, if SIDs are present in the RestrictingSids input field at step 420, then a determination is made as to whether the parent token is a normal token or is itself a restricted token having restricted SIDs. An API, IsTokenRestricted is called at step 422, and resolves this question by querying (via the NtQuerylnformationToken API) the RestrictingSids field of the parent token to see if it is not NULL, whereby if not NULL, the parent token is a restricted token and the API returns a TRUE. If the test is not satisfied, the parent token is a normal token and the API returns a FALSE. Note that for purposes of the subsequent steps 426 or 428, a parent token that is restricted but does not have restricted SIDs (i.e., by having privileges removed and/or USE_FOR_DENY_ONLY SIDs) may be treated as being not restricted.
At step 424, if the parent token is restricted, step 424 branches to step 426 wherein any security IDs that are in both the parent token's restricted Security ID field and the API's restricted Security ID input list are put into the restricted Security ID field 92 of the new token 84. Requiring restricted security IDs to be common to both lists prevents a restricted execution context from adding more security IDs to the restricted Security ID field 92, an event which would effectively increase rather than decrease access. Similarly, if none are common at step 426, any token created still has to be restricted without increasing the access thereof, such as by leaving at least one restricted SID from the original token in the new token. Otherwise, an empty restricted SIDs field in the new token might indicate that the token is not restricted, an event which would effectively increase rather than decrease access. Alternatively, if at step 424 the parent token is determined to be a normal token, then at step 428 the RestrictingSids field 92 of the new token 84 is set to those listed in the input field. Note that although this adds security IDs, access is actually decreased since a token having restricted SIDs is subject to a secondary access test, as described in more detail below.
Lastly, step 430 is also executed, whereby the ParentTokenld 93 in the new token 84 is set to the Tokenld of the existing (parent) token. This provides the operating system with the option of later allowing a process to use a restricted version of its token in places that would not normally be allowed except to the parent token.
Turning an explanation of the operation of the invention with particular reference to FIGS. 6 - 8, as represented in FIG. 6, a restricted process 94 has been created and is attempting to open a file object 70 with read/write access. In the security descriptor of the object 72, the ACL 80 has a number of security IDs listed therein along with the type of access allowed for each ID, wherein "RO" indicates that read only access is allowed, "WR" indicates read/write access and "SYNC" indicates that synchronization access is allowed. Note that 'XJones" is specifically denied access to the object 72, even if 'XJones" would otherwise be allowed access through membership in an allowed group. Moreover, the process 94 having this token 84 associated therewith will not be allowed to access any object via the 'Basketball" security ID in the token84, because this entry is marked 'DENY" (i.e., USE_FOR_DENY_ONLY) .
For purposes of security, restricted security contexts are primarily implemented in the Windows NT kernel. To attempt to access the object 72, the process 94 provides the object manager 74 with information identifying the object to which access is desired along with the type of access desired, (FIG. 8, step 800) . In response, as represented at step 802, the object manager 74 works in conjunction with the security mechanism 78 to compare the user and group security IDs listed in the token 84 (associated with the process 94) against the entries in the ACL 80, to determine if the desired access should be granted or denied.
As generally represented at step 804, if access is not allowed for the listed user or groups, the security check denies access at step 814. However, if the result of the user and group portion of the access check indicates allowable access at step 804, the security process branches to step 806 to determine if the restricted token 84 has any restricted security IDs. If not, there are no additional restrictions, whereby the access check is complete and access is granted at step 812 (a handle to the object is returned) based solely on user and group access. In this manner, a normal token is essentially checked as before. However, if the token includes restricted security IDs as determined by step 806, then a secondary access check is performed at step 808 by comparing the restricted security IDs against the entries in the ACL 80. If this secondary access test allows access at step 810, access to the object is granted at step 812. If not, access is denied at step 814.
As logically represented in FIG. 7, a two-part test is thus performed whenever restricted Security IDs are present in the token 84. Considering the security IDs in the token 84 and the desired access bits 96 against the security descriptor of the object 72, both the normal access test and (bitwise AND) the restricted security IDs access test must grant access in order for the process to be granted access to the object. Although not necessary to the invention, as described above, the normal access test proceeds first, and if access is denied, no further testing is necessary. Note that access may be denied either because no security ID in the token matched an identifier in the ACL, or because an ACL entry specifically denied access to the token based on a security identifier therein. Alternatively, a token may be arranged to have multiple sets of restricted SIDS, with a more complex Boolean expression covering the evaluation of those SIDS, e.g., grant access if set A OR (set B AND set C) allow access.
Thus, in the example shown in FIG. 6, no access to the object 72 will be granted to the process 94 because the only Restricted SID in the token 84 (field 92) identifies 'Internet Explorer," while there is no counterpart restricted SID in the object's ACL 80. Although the user had the right to access the object via a process running with a normal token, the process 94 was restricted so as to only be able to access objects having an 'Internet Explorer" SID (non-DENY) in their ACLs .
Note that instead of specifying a type of access, the caller may have specified MAXIMUM_ALLOWED access, whereby as described above, an algorithm walks through the ACL 80 determining the maximum access. With restricted tokens, if any type of user or group access at all is granted, the type or types of access rights allowable following the user and groups run is specified as the desired access for the second run, which checks the RestrictedSids list. In this way, a restricted token is certain to be granted less than or equal to access than the normal token.
Lastly, it should be noted that the security model of the present invention may be used in conjunction with other security models. For example, capability-based security models residing on top of an operating system may be used above the operating system-level security model of the present invention.
Jobs
A Job is a kernel object having a set of processes organized therein, wherein each job may have a different type of restriction associated therewith. In keeping with the present invention, restricted tokens may be integrated with Windows NT Job Objects to allow management of multiple processes running under the same restrictions. A Job object restriction is set forth below:
Typedef struct _JOBOBJECT_SECURITY_LIMIT_INFORMATION {
ULONG SecurityLimitFlags ;
HANDLE JobToken ;
PTOKEN_GROUPS SidsToDisable ;
PTOKEN_PRIVILEGES PrivilegesToDelete ;
PTOKEN_GROUPS RestrictedSids ; } JOBOBJECT_SECURITY_LIMIT_INFORMATION, *PJOBOBJECT SECURITY LIMIT INFORMATION ;
wherein the relevant SecurityLimitFlags may be :
#define JOB_OBJECT_SECURITY_FILTER_TOKENS 0x00000008 These various pieces of information can be set on a Job object using an NtSetlnformationJobObject API, while a process is assigned to a job using the NtAssignProcessToJobObject API. The security limit set on the job takes effect when a process is assigned. To restrict a job, the JOB_OBJECT_SECURITY_FILTER_TOKENS limit flag is set, whereby the primary token of the process being assigned to the job is filtered using the SidsToDisable, PrivilegesToDelete and RestrictedSids information provided in the security limit information, in a similar manner to how tokens associated with processes are filtered as described above.
As shown in FIG. 9, a job 110 has a number of processes (e.g., processes 112 - 114) assigned thereto via the job NtAssignProcessToJobObject API. Each process 112 - 114 has a respective token 116a - 116c associated therewith that is the same with respect to its restrictions, shown as 'Restrictions R." For example, the Job object 110 restricts the processes 112 - 114 therein to only perform certain operations, because the tokens 116a -116c under which they are running have certain Security IDs (e.g., Administrator SID) disabled, certain privileges removed and/or a set of restricted Security IDs added. Note that the tokens may be the same with respect to their other access rights as well, in which event all of the tokens are essentially identical, but this is not required. If a process (e.g., the process 114) produces another process 118, that process 118 also runs in the job 110 with the same restrictions R, as the job object 110 ensures that the same restrictions R are associated with the new process 118 via its token 116d. RESTRICTED TOKENS OVER A NETWORK
In accordance with another aspect of the present invention, restricted tokens may be used over a network connection, as described herein with particular reference to FIGS. 10 - 12. To this end, some authentication protocols allow a client to specify special restrictions when authenticating. For example, the Kerberos protocol allows for specifying restrictions by adding a field to an authentication ticket that restricts the authority granted by the ticket. As described below, this facility can be used by the client and server operating systems to enforce restrictions over a network connection.
As shown in FIG. 10, when a client 130 desires a connection to a server 132, authentication is required. According to the Kerberos protocol, authentication of the connection to the server 132 is accomplished via a ticket 134. The ticket is initially received by the client 130 from a ticket-issuing facility on the network known as a Key Distribution Center (KDC) 136. The ticket 134 is re- useable for a period of time, whereby even if the session is terminated, the client 130 does not have to repeat the authentication process while the ticket 134 is still valid.
Thus, as shown in the flow diagrams of FIGS. 11 - 12, when a process (e.g., the restricted process 138 having a restricted token 139 associated therewith) attempts to create an authenticated connection to another process 140 on another machine 132, at step 1100 the process 138 calls into the authentication code inside its operating system 142 requesting the connection. For Kerberos, at step 1102, the operating system code 142 first looks for an existing authentication ticket to the server 132. If there is no existing ticket, step 1102 will branch to step 1104 wherein the code will call the KDC 136 to request a ticket 144 for the service. In the request to the KDC 136, the client 130 may provide restrictions to be placed inside the ticket 144. Normally, however, none are included. Once returned to the client 130, the ticket 144 enables the authentication (e.g., client request, server challenge, client response) to take place between the client and server.
Step 1110 takes place either when the client process is authenticated (if the process that initiated the original connection was the restricted process 138), or later, when the client operating system receives a request from the restricted process 138 to authenticate to a server 132. In step 1110, the restricted process 138 requests the authenticated connection to the remote server process 140 (unless it has already done so) . In response, at step 1112, the client operating system 142 will look for an existing ticket to the server 132 having appropriate restrictions present in its restrictions field 146 therein. If the appropriate restrictions are not present, (e.g., as shown as NULL in FIG. 10), at step 1114 the operating system 142 will include the restrictions placed on the restricted client process 138, and at step 1116 will use the ticket-granting ticket 144 of the client 130 to request a new ticket 148ι from the KDC 136. The KDC 136 will include these restrictions in a restrictions field 150ι of the ticket 148ι it returns. For example, the restrictions may comprise a list of restricted security IDs, a list of security IDs to mark as deny only, and/or a list of privileges to delete. The client process 138 then sends a copy 1482 of that ticket to the server process 140, as represented by step 1200 of FIG. 12. When the server operating system 152 constructs a token 154 from that ticket 1482, it will recognize the restrictions 1502, (step 1202) , and at step 1204 apply them to the (restricted) token it creates, i.e., a restricted token 154. If there are no restrictions, a normal token will be created via step 1206. In any event, the copy of the client's access token 154 on the server 132 has the same restrictions as the counterpart token 139 of the process 138 on the client machine 130. Note that privileges are removed in order to restrict a token, however once removed they are not known when a restricted token is sent to a remote location, and thus cannot be later recreated at that remote location. However, it is alternatively feasible to disable privileges with a bit, whereby the privilege information remains with a restricted token and may be later recreated. Note that while a restricted process 138 is capable of directly requesting a ticket from the KDC 136 without going through the authenticating code (and its libraries) , the process 138 cannot obtain a ticket without obtaining a password from the user. This is because the process 138 does not have access to the client's password or ticket-granting ticket 144. This effectively limits the abilities of a restricted process 138 to those enforced by the authentication code in the operating system 142. In addition, the present invention may be utilized in a Distributed Computing Environment (DCE) implementation of Kerberos. When a server acting on behalf of a client connects to a second server, both the original server's and the client's identity is sent. The second server can then make access control decisions based on both sets of identities. If there are more than two servers, then the identity of the other intervening servers is also sent. Lastly, as can be readily appreciated, the present invention may be implemented with any other authentication protocol that enables additional information (i.e., restriction information) to be passed between a client and server along with the authentication credentials .
As can be seen from the foregoing detailed description, there is provided an improved security model that enables a process to launch another process in a restricted context that is a subset of its own rights and privileges. To this end, restricted tokens are created from a parent token which include security IDs that deny access rather than grant access relative to the parent token, remove privileges relative to the parent token and/or add restricted security IDs relative to the parent token. If restricted security IDs are added, a kernel mode security mechanism requires that both the user/group-based access check and the restricted security ID access check against a resource's access control list result in allowable access for the desired action, before access is granted to the resource.
While the invention is susceptible to various modifications and alternative constructions, certain illustrated embodiments thereof are shown in the drawings and have been described above in detail. It should be understood, however, that there is no intention to limit the invention to the specific forms disclosed, but on the contrary, the intention is to cover all modifications, alternative constructions, and equivalents falling within the spirit and scope of the invention.

Claims

WHAT IS CLAIMED IS:
1. In a computer system including a first process having access to a resource, a method of granting or denying access of a second process to the resource, comprising the steps of, creating a restricted access token from a parent token associated with a first process, the restricted access token having privilege and security identifier access rights therein that are a subset of privilege and security identifier access rights in the parent token, associating the restricted access token with the second process, requesting that the second process be given access to the resource, providing a security descriptor associated with the resource to a security mechanism, providing the restricted token to the security mechanism, performing an access evaluation at the security mechanism by comparing information in the restricted token with information in the security descriptor, and determining whether to grant or deny access based on the result of the access evaluation.
2. The method of claim 1 wherein the step of creating a restricted access token from a parent token includes the step of removing at least one privilege from the restricted token relative to the parent token.
3. The method of claim 1 wherein the step of creating a restricted access token from a parent token includes the step of changing attribute information of a security identifier in the restricted token to deny access via that security identifier, relative to attribute information of a corresponding security identifier in the parent token for granting access.
4. The method of claim 3 wherein the step of performing the access evaluation at the security mechanism includes the steps of, performing a first access check using user-based security identifier information in the restricted token and security identifier entries in the security descriptor, and if a correspondence is detected between a security identifier entry in the security descriptor and a user-based security identifier in the restricted token having attribute information that denies access, denying the process access to the resource.
5. The method of claim 1 wherein the step of creating a restricted access token from a parent token includes the step of adding a restricted security identifier to the restricted token.
6. The method of claim 5 wherein the step of performing the access evaluation at the security mechanism includes the steps of performing a first access check using user-based security identifier information in the restricted token and security identifier entries in the security descriptor, and if the first access check indicates that access is allowable, performing a second access check using restricted security identifier information in the restricted token and security identifier entries in the security descriptor, and granting access if the second access check indicates that access is allowable.
7. The method of claim 6 wherein if the step of performing the first access check indicates that access is not allowable, denying the second process access to the resource.
8. The method of claim 1 wherein the step of creating a restricted access token includes the steps of copying the identifiers and privileges from the parent token into the restricted token, removing at least one privilege from the restricted token, changing attribute information of at least one security identifier in the restricted token to deny access, and adding at least one restricted security identifier to the restricted token that identifies the second process.
9. The method of claim 1 wherein the step of performing the access evaluation includes the step of matching at least one security identifier in the restricted token with at least one security identifier in the security descriptor.
10. The method of claim 1 wherein the step of performing the access evaluation further includes matching a type of action desired by the second process against an allowed type of action identified in the security descriptor.
11. The method of claim 1 wherein the step of performing the access evaluation includes the step of evaluating privileges in the restricted access token.
12. The method of claim 1 further comprising the step of auditing the result of the access evaluation.
13. The method of claim 1 wherein the step of creating a restricted access token from a parent token includes the step of adding a plurality of sets of restricted security identifiers to the restricted token, and wherein the step of performing the access evaluation at the security mechanism includes the steps of performing access checks on the sets of restricted security identifiers to obtain a plurality of results, and combining the results via a Boolean expression to determine whether to grant or deny access.
14. In a computer system, a method of granting a process access to a resource, comprising the steps of, creating an access token and associating the token with the process requesting the access, the access token including user and group security identifiers and at least one restricted identifier corresponding to a process or resource, assigning an access control list to a resource, the access control list containing entries of identifiers having access to the resource, performing a first comparison of the user and group identifiers in the token with the entries in the access control list, and if the first comparison indicates that access is allowable, performing a second comparison of the at least one restricted identifier with the entries in the access control list, and granting access if the second comparison indicates that access is allowable.
15. The method of claim 14 wherein the access control list includes at least one allowable type of action with each entry, further comprising the step of indicating a desired type of action to the security mechanism, and wherein the steps of performing the first and second comparisons each include the step of comparing the desired type of action with the allowable type of action.
16. The method of claim 14 further comprising the step of denying access before performing the second comparison if the first comparison indicates that access is not allowable.
17. In a computer system, a system for providing access control, comprising, a process, a token associated with the process, the token including a list comprising at least one restricted security identifier therein identifying the process, a resource, an access list associated with the resource comprising security identifier entries therein, and a security mechanism for performing an access evaluation by comparing the at least one identifier in the token list with the identifiers in the access list for granting or denying the process access to the resource based on a result of the access evaluation.
18. The system of claim 17 wherein the token further includes security identifiers therein identifying user and group information, and wherein the security mechanism performs the access evaluation including a first access check comparing user and group identifiers against identifiers in the access list and a second access check comparing the at least one restricted security identifier in the token list with the identifiers in the access list for granting or denying the process access to the resource based on a result of the first and second access checks .
19. The system of claim 18 wherein the security mechanism grants access when both the first access check determines that a security identifier representing a user or group in the token corresponds to a security identifier in the access control list, and the second access check determines that a security identifier representing at least one process in the token corresponds to a security identifier in the access control list, and wherein otherwise the security mechanism denies access.
20. The system of claim 17 wherein the token further includes user and group security identifiers therein identifying user and group information, and wherein the user and group security identifiers each include attribute information indicating whether that security identifier will be used for granting or denying access.
21. The method of claim 20 wherein the security mechanism denies access when the first access check determines that a user or group security identifier having an attribute indicating that the security identifier is used for denying access corresponds to a security identifier in the access control list.
22. The system of claim 17 wherein the security mechanism further evaluates privileges in the restricted access token.
23. A computer-readable medium having stored thereon a data structure associated with a process, comprising: a first data field including data representing user and group identifiers; a second data field including data representing at least one other identifier; wherein the process is granted access to a resource if at least one identifier in the first data field and at least one identifier in the second data field each allowably match an entry in a list of identifier entries associated with the resource.
24. In a computer system, a method of determining access to system resources for a plurality of processes organized into a job, comprising the steps of, creating a restricted access token from a parent token, the restricted access token having privilege and security identifier access rights therein that are a subset of privilege and security identifier access rights in the parent token, associating the restricted access token with the processes in the job, and for each process in the job, requesting access to a system resource, providing a security descriptor associated with that resource to a security mechanism, providing the restricted token to the security mechanism, performing an access evaluation at the security mechanism by comparing information in the restricted token with information in the security descriptor, and determining whether to grant or deny access for each process based on the result of the access evaluation.
25. The method of claim 24 further comprising the steps of producing another process in the job and associating the restricted token with that process.
26. In a computer network including a client machine and a server machine, a method of determining access to a server resource of a server process run for a client on the server machine, comprising the steps of, passing authentication information and restriction information from the client to the server, authenticating the client at the server based on the authentication information passed thereto, creating a restricted token on the server based on the restriction information passed thereto, associating the restricted token with the server process, requesting to access the server resource by the server process, and comparing the restricted token and a security descriptor of the resource to determine whether to grant or deny the process access to the resource.
27. The method of claim 26 wherein the step of passing the authentication information and the restriction information from the client to the server includes the steps of, providing restriction data associated with a client process in a ticket request, passing the ticket request to a ticket issuing facility of the network for an authentication ticket, and in response to the request, receiving an authentication ticket at the client, the ticket including the restriction information therein.
28. The method of claim 27 wherein the ticket issuing facility is a key distribution center in accordance with the Kerberos authentication protocol.
PCT/US1999/013057 1998-06-12 1999-06-09 Security model using restricted tokens WO1999064948A1 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
JP2000553885A JP4809530B2 (en) 1998-06-12 1999-06-09 Security model using restricted tokens
EP99927413A EP1084464B1 (en) 1998-06-12 1999-06-09 Security model using restricted tokens
AT99927413T ATE518179T1 (en) 1998-06-12 1999-06-09 LIMITED TOKEN SECURITY MODEL

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US09/096,926 US6279111B1 (en) 1998-06-12 1998-06-12 Security model using restricted tokens
US09/096,926 1998-06-12

Publications (1)

Publication Number Publication Date
WO1999064948A1 true WO1999064948A1 (en) 1999-12-16

Family

ID=22259765

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US1999/013057 WO1999064948A1 (en) 1998-06-12 1999-06-09 Security model using restricted tokens

Country Status (5)

Country Link
US (1) US6279111B1 (en)
EP (1) EP1084464B1 (en)
JP (1) JP4809530B2 (en)
AT (1) ATE518179T1 (en)
WO (1) WO1999064948A1 (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2820847A1 (en) * 2001-02-12 2002-08-16 Gemplus Card Int Controlling access to objects or applications on a chip card using a system of access indicators that can be used to explicitly declare both positive and negative access rights
EP1389752A2 (en) 2002-08-15 2004-02-18 Activcard Ireland Limited System and method for privilege delegation and control
WO2007021949A2 (en) 2005-08-11 2007-02-22 Microsoft Corporation Dual layered access control list
EP2096569A1 (en) * 2008-02-29 2009-09-02 Research in Motion Limited System and method for shared resource owner based access control
WO2010065283A1 (en) * 2008-12-05 2010-06-10 Rayheon Company Secure document management
US8341715B2 (en) 2008-02-29 2012-12-25 Research In Motion Limited System and method for shared resource owner based access control
US8826419B2 (en) 2011-09-02 2014-09-02 Avecto Limited Computer device with anti-tamper resource security
US10068102B2 (en) 2010-06-28 2018-09-04 International Business Machines Corporation Dynamic, temporary data access token
WO2019069305A1 (en) * 2017-10-03 2019-04-11 Varonis Systems Inc. Systems and methods for preventing excess user authentication token utilization conditions in an enterprise computer environment
US11847246B1 (en) * 2017-09-14 2023-12-19 United Services Automobile Association (Usaa) Token based communications for machine learning systems

Families Citing this family (175)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6678731B1 (en) * 1999-07-08 2004-01-13 Microsoft Corporation Controlling access to a network server using an authentication ticket
US6584505B1 (en) * 1999-07-08 2003-06-24 Microsoft Corporation Authenticating access to a network server without communicating login information through the network server
US7065784B2 (en) * 1999-07-26 2006-06-20 Microsoft Corporation Systems and methods for integrating access control with a namespace
US7596563B1 (en) * 1999-10-28 2009-09-29 Hewlett-Packard Development Company, L.P. Computerized file system and method
US6609115B1 (en) * 1999-12-30 2003-08-19 Ge Medical Systems Method and apparatus for limited online access to restricted documentation
US7398532B1 (en) * 2000-03-02 2008-07-08 Hewlett-Packard Development Company, L.P. System and method for establishing a secure execution environment for a software process
FI20002255A (en) * 2000-10-13 2002-04-14 Nokia Corp A method for controlling and controlling locks
US6938164B1 (en) * 2000-11-22 2005-08-30 Microsoft Corporation Method and system for allowing code to be securely initialized in a computer
US6631453B1 (en) * 2001-02-14 2003-10-07 Zecurity Secure data storage device
US7134138B2 (en) * 2001-02-15 2006-11-07 Emc Corporation Methods and apparatus for providing security for a data storage system
US7302634B2 (en) 2001-03-14 2007-11-27 Microsoft Corporation Schema-based services for identity-based data access
US7024662B2 (en) 2001-03-14 2006-04-04 Microsoft Corporation Executing dynamically assigned functions while providing services
US7322040B1 (en) * 2001-03-27 2008-01-22 Microsoft Corporation Authentication architecture
US7237257B1 (en) * 2001-04-11 2007-06-26 Aol Llc Leveraging a persistent connection to access a secured service
US7107610B2 (en) * 2001-05-11 2006-09-12 Intel Corporation Resource authorization
US20020169967A1 (en) * 2001-05-14 2002-11-14 Sangeeta Varma Method and apparatus for multiple token access to thin client architecture session
US7117488B1 (en) 2001-10-31 2006-10-03 The Regents Of The University Of California Safe computer code formats and methods for generating safe computer code
EP1322083A1 (en) * 2001-12-21 2003-06-25 Siemens Aktiengesellschaft Method and Device for Controlling Communications in a Telecomms Network
WO2003069491A1 (en) * 2002-02-15 2003-08-21 Science Park Corporation Authentication method using input feature of input unit of computer, its program, and program recorded medium
US20030182479A1 (en) * 2002-03-22 2003-09-25 Dieter Massa Implementing clustering in raid controllers
US7418500B1 (en) * 2002-03-25 2008-08-26 Network Appliance, Inc. Mechanism for controlled sharing of files in a clustered application environment
KR100450402B1 (en) * 2002-04-17 2004-09-30 한국전자통신연구원 Access control method by a token with security attributes in computer system
US7082455B2 (en) * 2002-04-23 2006-07-25 International Business Machines Corporation Method and apparatus of parameter passing of structured data for stored procedures in a content management system
US6947948B2 (en) * 2002-04-23 2005-09-20 International Business Machines Corporation Version-enabled, multi-typed, multi-targeting referential integrity relational database system and methodology
US7035854B2 (en) * 2002-04-23 2006-04-25 International Business Machines Corporation Content management system and methodology employing non-transferable access tokens to control data access
US6950815B2 (en) * 2002-04-23 2005-09-27 International Business Machines Corporation Content management system and methodology featuring query conversion capability for efficient searching
US6938050B2 (en) 2002-04-23 2005-08-30 International Business Machines Corporation Content management system and methodology employing a tree-based table hierarchy which accomodates opening a dynamically variable number of cursors therefor
US6944627B2 (en) * 2002-04-23 2005-09-13 International Business Machines Corporation Content management system and methodology employing a tree-based table hierarchy featuring arbitrary information retrieval from different locations in the hierarchy
US6999966B2 (en) * 2002-04-23 2006-02-14 International Business Machines Corporation Content management system and methodology for implementing a complex object using nested/recursive structures
US20030236975A1 (en) * 2002-06-20 2003-12-25 International Business Machines Corporation System and method for improved electronic security credentials
US20040003287A1 (en) * 2002-06-28 2004-01-01 Zissimopoulos Vasileios Bill Method for authenticating kerberos users from common web browsers
US9886309B2 (en) 2002-06-28 2018-02-06 Microsoft Technology Licensing, Llc Identity-based distributed computing for device resources
US20110119353A1 (en) * 2002-08-06 2011-05-19 Tsao Sheng Tai Ted Method and Apparatus for information exchange over a web based environment
US7010565B2 (en) * 2002-09-30 2006-03-07 Sampson Scott E Communication management using a token action log
US6804687B2 (en) * 2002-09-30 2004-10-12 Scott E. Sampson File system management with user-definable functional attributes stored in a token action log
US7526798B2 (en) * 2002-10-31 2009-04-28 International Business Machines Corporation System and method for credential delegation using identity assertion
US7353282B2 (en) * 2002-11-25 2008-04-01 Microsoft Corporation Methods and systems for sharing a network resource with a user without current access
US7089429B2 (en) 2002-11-25 2006-08-08 Nokia Corporation Creation of local usage rights voucher
US7024689B2 (en) * 2002-12-13 2006-04-04 Intuit, Inc. Granting access rights to unattended software
US7392246B2 (en) * 2003-02-14 2008-06-24 International Business Machines Corporation Method for implementing access control for queries to a content management system
US7370212B2 (en) 2003-02-25 2008-05-06 Microsoft Corporation Issuing a publisher use license off-line in a digital rights management (DRM) system
US7490127B2 (en) * 2003-06-13 2009-02-10 Microsoft Corporation Concurrent recipient resolution and certificate acquisition
US20040260946A1 (en) * 2003-06-20 2004-12-23 Cahill Conor P. User not present
US7653936B2 (en) * 2003-06-25 2010-01-26 Microsoft Corporation Distributed expression-based access control
US7350237B2 (en) * 2003-08-18 2008-03-25 Sap Ag Managing access control information
US7814551B2 (en) * 2003-09-09 2010-10-12 Microsoft Corporation System and method for manifest generation
US7702693B1 (en) * 2003-10-30 2010-04-20 Cisco Technology, Inc. Role-based access control enforced by filesystem of an operating system
US7467386B2 (en) 2004-01-16 2008-12-16 International Business Machines Corporation Parameter passing of data structures where API and corresponding stored procedure are different versions/releases
US7640573B2 (en) 2004-02-16 2009-12-29 Microsoft Corporation Generic security claim processing model
US7716728B2 (en) * 2004-02-16 2010-05-11 Microsoft Corproation Security scopes and profiles
US7873831B2 (en) * 2004-02-26 2011-01-18 Microsoft Corporation Digests to identify elements in a signature process
US9020854B2 (en) 2004-03-08 2015-04-28 Proxense, Llc Linked account system using personal digital key (PDK-LAS)
EP1589419A1 (en) * 2004-04-19 2005-10-26 Sun Microsystems, Inc. System and method for controlling the use of a method in an object-oriented computer environment
US20060242406A1 (en) 2005-04-22 2006-10-26 Microsoft Corporation Protected computing environment
US8347078B2 (en) 2004-10-18 2013-01-01 Microsoft Corporation Device certificate individualization
US8176564B2 (en) 2004-11-15 2012-05-08 Microsoft Corporation Special PC mode entered upon detection of undesired state
US8336085B2 (en) 2004-11-15 2012-12-18 Microsoft Corporation Tuning product policy using observed evidence of customer behavior
WO2006054128A1 (en) 2004-11-22 2006-05-26 Nokia Corporation Method and device for verifying the integrity of platform software of an electronic device
US20060117004A1 (en) * 2004-11-30 2006-06-01 Hunt Charles L System and method for contextually understanding and analyzing system use and misuse
US7882317B2 (en) * 2004-12-06 2011-02-01 Microsoft Corporation Process isolation using protection domains
US8020141B2 (en) * 2004-12-06 2011-09-13 Microsoft Corporation Operating-system process construction
CA2591751A1 (en) 2004-12-20 2006-06-29 Proxense, Llc Biometric personal data key (pdk) authentication
FR2880487B1 (en) * 2004-12-31 2007-06-01 Cit Alcatel ACCESS CONTROL METHOD
US20060156008A1 (en) * 2005-01-12 2006-07-13 Microsoft Corporation Last line of defense ensuring and enforcing sufficiently valid/current code
US8438645B2 (en) 2005-04-27 2013-05-07 Microsoft Corporation Secure clock with grace periods
US7571311B2 (en) * 2005-04-01 2009-08-04 Microsoft Corporation Scheme for sub-realms within an authentication protocol
US8725646B2 (en) 2005-04-15 2014-05-13 Microsoft Corporation Output protection levels
US9363481B2 (en) 2005-04-22 2016-06-07 Microsoft Technology Licensing, Llc Protected media pipeline
US9436804B2 (en) * 2005-04-22 2016-09-06 Microsoft Technology Licensing, Llc Establishing a unique session key using a hardware functionality scan
US20060259980A1 (en) * 2005-05-16 2006-11-16 Microsoft Corporation Method and system for limiting rights of services
US20060265758A1 (en) 2005-05-20 2006-11-23 Microsoft Corporation Extensible media rights
US8078740B2 (en) 2005-06-03 2011-12-13 Microsoft Corporation Running internet applications with low rights
US8353046B2 (en) 2005-06-08 2013-01-08 Microsoft Corporation System and method for delivery of a modular operating system
US20060282900A1 (en) * 2005-06-10 2006-12-14 Microsoft Corporation Managing access with resource control lists and resource replication
US8849968B2 (en) * 2005-06-20 2014-09-30 Microsoft Corporation Secure and stable hosting of third-party extensions to web services
US7636851B2 (en) * 2005-06-30 2009-12-22 Microsoft Corporation Providing user on computer operating system with full privileges token and limited privileges token
US7580933B2 (en) * 2005-07-28 2009-08-25 Microsoft Corporation Resource handling for taking permissions
US7895651B2 (en) 2005-07-29 2011-02-22 Bit 9, Inc. Content tracking in a network security system
US8984636B2 (en) 2005-07-29 2015-03-17 Bit9, Inc. Content extractor and analysis system
US8272058B2 (en) 2005-07-29 2012-09-18 Bit 9, Inc. Centralized timed analysis in a network security system
US7814065B2 (en) * 2005-08-16 2010-10-12 Oracle International Corporation Affinity-based recovery/failover in a cluster environment
JP4455462B2 (en) * 2005-09-12 2010-04-21 キヤノン株式会社 Data distribution apparatus, data distribution method, and program for realizing the same
US20070199072A1 (en) * 2005-10-14 2007-08-23 Softwareonline, Llc Control of application access to system resources
US20070199057A1 (en) * 2005-10-14 2007-08-23 Softwareonline, Llc Control of application access to system resources
US8074231B2 (en) 2005-10-26 2011-12-06 Microsoft Corporation Configuration of isolated extensions and device drivers
US7979865B2 (en) * 2005-11-03 2011-07-12 Microsoft Corporation Identifying separate threads executing within a single process
US7693838B2 (en) * 2005-11-12 2010-04-06 Intel Corporation Method and apparatus for securely accessing data
US8989390B2 (en) * 2005-12-12 2015-03-24 Qualcomm Incorporated Certify and split system and method for replacing cryptographic keys
US11206664B2 (en) 2006-01-06 2021-12-21 Proxense, Llc Wireless network synchronization of cells and client devices on a network
US8219129B2 (en) 2006-01-06 2012-07-10 Proxense, Llc Dynamic real-time tiered client access
US7925801B2 (en) * 2006-01-17 2011-04-12 International Business Machines Corporation Method and system for protection and security of IO devices using credentials
US8291377B2 (en) * 2006-01-25 2012-10-16 Microsoft Corporation External configuration of processing content for script
US20090210942A1 (en) * 2006-02-21 2009-08-20 Gil Abel Device, system and method of accessing a security token
US7904718B2 (en) 2006-05-05 2011-03-08 Proxense, Llc Personal digital key differentiation for secure transactions
US8180741B2 (en) * 2006-06-06 2012-05-15 Red Hat, Inc. Methods and systems for providing data objects on a token
US8185737B2 (en) 2006-06-23 2012-05-22 Microsoft Corporation Communication across domains
US8032898B2 (en) * 2006-06-30 2011-10-04 Microsoft Corporation Kernel interface with categorized kernel objects
WO2008063185A1 (en) * 2006-10-14 2008-05-29 Xeriton Corporation Control of application access to system resources
US9269221B2 (en) 2006-11-13 2016-02-23 John J. Gobbi Configuration of interfaces for a location detection system and application
US8640215B2 (en) * 2007-03-23 2014-01-28 Microsoft Corporation Secure isolation of application pools
US8789063B2 (en) * 2007-03-30 2014-07-22 Microsoft Corporation Master and subordinate operating system kernels for heterogeneous multiprocessor systems
US20080244507A1 (en) * 2007-03-30 2008-10-02 Microsoft Corporation Homogeneous Programming For Heterogeneous Multiprocessor Systems
US20080307486A1 (en) * 2007-06-11 2008-12-11 Microsoft Corporation Entity based access management
US10019570B2 (en) * 2007-06-14 2018-07-10 Microsoft Technology Licensing, Llc Protection and communication abstractions for web browsers
US7984512B2 (en) 2007-06-14 2011-07-19 Microsoft Corporation Integrating security by obscurity with access control lists
US8468579B2 (en) 2007-06-15 2013-06-18 Microsoft Corporation Transformation of sequential access control lists utilizing certificates
US8613044B2 (en) * 2007-06-22 2013-12-17 4Dk Technologies, Inc. Delegating or transferring of access to resources between multiple devices
US8332922B2 (en) * 2007-08-31 2012-12-11 Microsoft Corporation Transferable restricted security tokens
US9807096B2 (en) 2014-12-18 2017-10-31 Live Nation Entertainment, Inc. Controlled token distribution to protect against malicious data and resource access
US8659427B2 (en) 2007-11-09 2014-02-25 Proxense, Llc Proximity-sensor supporting multiple application services
US8171528B1 (en) 2007-12-06 2012-05-01 Proxense, Llc Hybrid device having a personal digital key and receiver-decoder circuit and methods of use
US9251332B2 (en) 2007-12-19 2016-02-02 Proxense, Llc Security system and method for controlling access to computing resources
US8508336B2 (en) 2008-02-14 2013-08-13 Proxense, Llc Proximity-based healthcare management system with automatic access to private information
US7958105B2 (en) * 2008-03-07 2011-06-07 International Business Machines Corporation System and method for filtering database results using dynamic composite queries
US11120449B2 (en) 2008-04-08 2021-09-14 Proxense, Llc Automated service-based order processing
US9501635B2 (en) 2008-06-25 2016-11-22 Microsoft Technology Licensing, Llc Isolation of services or processes using credential managed accounts
US8397290B2 (en) * 2008-06-27 2013-03-12 Microsoft Corporation Granting least privilege access for computing processes
US8140853B2 (en) * 2008-07-01 2012-03-20 International Business Machines Corporation Mutually excluded security managers
US20100037288A1 (en) * 2008-08-06 2010-02-11 International Business Machines Corporation Inherited Access Authorization to a Social Network
US9614855B2 (en) * 2009-11-05 2017-04-04 Micro Focus Software Inc. System and method for implementing a secure web application entitlement service
US8095557B2 (en) * 2009-04-30 2012-01-10 Oracle International Corporation Type system for access control lists
US8826269B2 (en) * 2009-06-15 2014-09-02 Microsoft Corporation Annotating virtual application processes
US10242182B2 (en) 2009-10-23 2019-03-26 Secure Vector, Llc Computer security system and method
US8775802B1 (en) 2009-10-23 2014-07-08 Secure Vector Computer security system and method
US9454652B2 (en) 2009-10-23 2016-09-27 Secure Vector, Llc Computer security system and method
US8429429B1 (en) * 2009-10-23 2013-04-23 Secure Vector, Inc. Computer security system and method
US8799985B2 (en) * 2009-12-09 2014-08-05 Microsoft Corporation Automated security classification and propagation of virtualized and physical virtual machines
US8726334B2 (en) * 2009-12-09 2014-05-13 Microsoft Corporation Model based systems management in virtualized and non-virtualized environments
US9418205B2 (en) 2010-03-15 2016-08-16 Proxense, Llc Proximity-based system for automatic application or data access and item tracking
JP5702953B2 (en) * 2010-06-09 2015-04-15 キヤノン株式会社 Information processing apparatus and application execution method and program
US8918856B2 (en) 2010-06-24 2014-12-23 Microsoft Corporation Trusted intermediary for network layer claims-enabled access control
US9322974B1 (en) 2010-07-15 2016-04-26 Proxense, Llc. Proximity-based system for object tracking
US8857716B1 (en) 2011-02-21 2014-10-14 Proxense, Llc Implementation of a proximity-based system for object tracking and automatic application initialization
US9118686B2 (en) 2011-09-06 2015-08-25 Microsoft Technology Licensing, Llc Per process networking capabilities
US8990561B2 (en) 2011-09-09 2015-03-24 Microsoft Technology Licensing, Llc Pervasive package identifiers
US9773102B2 (en) 2011-09-09 2017-09-26 Microsoft Technology Licensing, Llc Selective file access for applications
US9800688B2 (en) 2011-09-12 2017-10-24 Microsoft Technology Licensing, Llc Platform-enabled proximity service
US8689310B2 (en) * 2011-12-29 2014-04-01 Ebay Inc. Applications login using a mechanism relating sub-tokens to the quality of a master token
US8826390B1 (en) 2012-05-09 2014-09-02 Google Inc. Sharing and access control
US9213571B2 (en) * 2012-06-06 2015-12-15 2236008 Ontario Inc. System and method for changing abilities of a process
US10891599B2 (en) * 2012-09-12 2021-01-12 Microsoft Technology Licensing, Llc Use of state objects in near field communication (NFC) transactions
US10356204B2 (en) 2012-12-13 2019-07-16 Microsoft Technology Licensing, Llc Application based hardware identifiers
WO2014143029A1 (en) * 2013-03-15 2014-09-18 Mcafee, Inc. Generic privilege escalation prevention
US9405898B2 (en) 2013-05-10 2016-08-02 Proxense, Llc Secure element as a digital pocket
US9858247B2 (en) 2013-05-20 2018-01-02 Microsoft Technology Licensing, Llc Runtime resolution of content references
US9397990B1 (en) * 2013-11-08 2016-07-19 Google Inc. Methods and systems of generating and using authentication credentials for decentralized authorization in the cloud
US9531719B1 (en) * 2014-04-29 2016-12-27 Amazon Technologies, Inc. Permissions for hybrid distributed network resources
US11100242B2 (en) * 2014-05-30 2021-08-24 Apple Inc. Restricted resource classes of an operating system
US9396343B2 (en) * 2014-10-20 2016-07-19 International Business Machines Corporation Policy access control lists attached to resources
RU2584507C1 (en) * 2014-12-19 2016-05-20 Закрытое акционерное общество "Лаборатория Касперского" Method of providing safe execution of script file
US9350556B1 (en) 2015-04-20 2016-05-24 Google Inc. Security model for identification and authentication in encrypted communications using delegate certificate chain bound to third party key
US11350254B1 (en) 2015-05-05 2022-05-31 F5, Inc. Methods for enforcing compliance policies and devices thereof
US10044718B2 (en) 2015-05-27 2018-08-07 Google Llc Authorization in a distributed system using access control lists and groups
US10104084B2 (en) * 2015-07-30 2018-10-16 Cisco Technology, Inc. Token scope reduction
US9762563B2 (en) 2015-10-14 2017-09-12 FullArmor Corporation Resource access system and method
US9450944B1 (en) 2015-10-14 2016-09-20 FullArmor Corporation System and method for pass-through authentication
US9509684B1 (en) * 2015-10-14 2016-11-29 FullArmor Corporation System and method for resource access with identity impersonation
US11757946B1 (en) 2015-12-22 2023-09-12 F5, Inc. Methods for analyzing network traffic and enforcing network policies and devices thereof
US20170187700A1 (en) * 2015-12-28 2017-06-29 Paypal, Inc. Pregenerated two-factor authentication tokens
US10171457B2 (en) * 2015-12-29 2019-01-01 International Business Machines Corporation Service provider initiated additional authentication in a federated system
US11178150B1 (en) 2016-01-20 2021-11-16 F5 Networks, Inc. Methods for enforcing access control list based on managed application and devices thereof
WO2017131892A1 (en) 2016-01-29 2017-08-03 Google Inc. Device access revocation
CN108092945B (en) * 2016-11-22 2022-02-22 中兴通讯股份有限公司 Method and device for determining access authority and terminal
US10846417B2 (en) * 2017-03-17 2020-11-24 Oracle International Corporation Identifying permitted illegal access operations in a module system
US10812266B1 (en) * 2017-03-17 2020-10-20 F5 Networks, Inc. Methods for managing security tokens based on security violations and devices thereof
US11343237B1 (en) 2017-05-12 2022-05-24 F5, Inc. Methods for managing a federated identity environment using security and access control data and devices thereof
US11122042B1 (en) 2017-05-12 2021-09-14 F5 Networks, Inc. Methods for dynamically managing user access control and devices thereof
US10897462B2 (en) * 2017-05-16 2021-01-19 Citrix Systems, Inc. Systems and methods for encoding additional authentication data into an active directory security identifier
US11328054B2 (en) * 2018-12-21 2022-05-10 Netiq Corporation Preventing access to single sign on credentials associated with executing applications
EP3699799A1 (en) * 2019-02-22 2020-08-26 Siemens Aktiengesellschaft Method for granting access to objects in a computerized system, computer program product, and field device
US11513815B1 (en) 2019-05-24 2022-11-29 Hiro Systems Pbc Defining data storage within smart contracts
US11657391B1 (en) 2019-05-24 2023-05-23 Hiro Systems Pbc System and method for invoking smart contracts
US10699269B1 (en) * 2019-05-24 2020-06-30 Blockstack Pbc System and method for smart contract publishing
US11336450B2 (en) 2019-09-06 2022-05-17 Jpmorgan Chase Bank, N.A. System and method for implementing market data rights enforcement
US11658983B2 (en) * 2020-02-07 2023-05-23 Microsoft Technology Licensing, Llc Authentication and authorization across microservices

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0697662A1 (en) * 1994-08-15 1996-02-21 International Business Machines Corporation Method and system for advanced role-based access control in distributed and centralized computer systems
US5649099A (en) * 1993-06-04 1997-07-15 Xerox Corporation Method for delegating access rights through executable access control program without delegating access rights not in a specification to any intermediary nor comprising server security
WO1997026734A1 (en) * 1996-01-16 1997-07-24 Raptor Systems, Inc. Transferring encrypted packets over a public network
EP0813133A2 (en) * 1996-06-11 1997-12-17 International Business Machines Corporation A uniform mechanism for using signed content

Family Cites Families (31)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4962449A (en) 1988-04-11 1990-10-09 Artie Schlesinger Computer security system having remote location recognition and remote location lock-out
JPH087709B2 (en) 1989-05-15 1996-01-29 インターナシヨナル・ビジネス・マシーンズ・コーポレーシヨン Access privilege control method and system
US5187790A (en) 1989-06-29 1993-02-16 Digital Equipment Corporation Server impersonation of client processes in an object based computer operating system
US5138712A (en) 1989-10-02 1992-08-11 Sun Microsystems, Inc. Apparatus and method for licensing software on a network of computers
US5204961A (en) 1990-06-25 1993-04-20 Digital Equipment Corporation Computer network operating with multilevel hierarchical security with selectable common trust realms and corresponding security protocols
US5577209A (en) 1991-07-11 1996-11-19 Itt Corporation Apparatus and method for providing multi-level security for communication among computers and terminals on a network
US5276901A (en) 1991-12-16 1994-01-04 International Business Machines Corporation System for controlling group access to objects using group access control folder and group identification as individual user
CA2093094C (en) 1992-04-06 2000-07-11 Addison M. Fischer Method and apparatus for creating, supporting, and using travelling programs
US5412717A (en) 1992-05-15 1995-05-02 Fischer; Addison M. Computer system security method and apparatus having program authorization information data structures
JP2519390B2 (en) 1992-09-11 1996-07-31 インターナショナル・ビジネス・マシーンズ・コーポレイション DATA COMMUNICATION METHOD AND DEVICE
AU3099295A (en) 1994-08-09 1996-03-07 Shiva Corporation Apparatus and method for restricting access to a local computer network
US5864683A (en) 1994-10-12 1999-01-26 Secure Computing Corporartion System for providing secure internetwork by connecting type enforcing secure computers to external network for limiting access to data based on user and process access rights
US5682478A (en) * 1995-01-19 1997-10-28 Microsoft Corporation Method and apparatus for supporting multiple, simultaneous services over multiple, simultaneous connections between a client and network server
US5675782A (en) 1995-06-06 1997-10-07 Microsoft Corporation Controlling access to objects on multiple operating systems
US5678041A (en) 1995-06-06 1997-10-14 At&T System and method for restricting user access rights on the internet based on rating information stored in a relational database
US5696898A (en) 1995-06-06 1997-12-09 Lucent Technologies Inc. System and method for database access control
US5761669A (en) 1995-06-06 1998-06-02 Microsoft Corporation Controlling access to objects on multiple operating systems
US5941947A (en) 1995-08-18 1999-08-24 Microsoft Corporation System and method for controlling access to data entities in a computer network
US5757916A (en) 1995-10-06 1998-05-26 International Series Research, Inc. Method and apparatus for authenticating the location of remote users of networked computing systems
US5638448A (en) 1995-10-24 1997-06-10 Nguyen; Minhtam C. Network with secure communications sessions
US5680461A (en) * 1995-10-26 1997-10-21 Sun Microsystems, Inc. Secure network protocol system and method
US5826029A (en) 1995-10-31 1998-10-20 International Business Machines Corporation Secured gateway interface
US5745676A (en) 1995-12-04 1998-04-28 International Business Machines Corporation Authority reduction and restoration method providing system integrity for subspace groups and single address spaces during program linkage
JPH09190236A (en) 1996-01-10 1997-07-22 Canon Inc Method, device and system for processing information
US5925109A (en) 1996-04-10 1999-07-20 National Instruments Corporation System for I/O management where I/O operations are determined to be direct or indirect based on hardware coupling manners and/or program privilege modes
US5845067A (en) * 1996-09-09 1998-12-01 Porter; Jack Edward Method and apparatus for document management utilizing a messaging system
US5983350A (en) 1996-09-18 1999-11-09 Secure Computing Corporation Secure firewall supporting different levels of authentication based on address or encryption status
US5949882A (en) 1996-12-13 1999-09-07 Compaq Computer Corporation Method and apparatus for allowing access to secured computer resources by utilzing a password and an external encryption algorithm
US6105132A (en) 1997-02-20 2000-08-15 Novell, Inc. Computer network graded authentication system and method
US5983270A (en) 1997-03-11 1999-11-09 Sequel Technology Corporation Method and apparatus for managing internetwork and intranetwork activity
US6081807A (en) 1997-06-13 2000-06-27 Compaq Computer Corporation Method and apparatus for interfacing with a stateless network file system server

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5649099A (en) * 1993-06-04 1997-07-15 Xerox Corporation Method for delegating access rights through executable access control program without delegating access rights not in a specification to any intermediary nor comprising server security
EP0697662A1 (en) * 1994-08-15 1996-02-21 International Business Machines Corporation Method and system for advanced role-based access control in distributed and centralized computer systems
WO1997026734A1 (en) * 1996-01-16 1997-07-24 Raptor Systems, Inc. Transferring encrypted packets over a public network
EP0813133A2 (en) * 1996-06-11 1997-12-17 International Business Machines Corporation A uniform mechanism for using signed content

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
NEUMAN B C ET AL: "KERBEROS: AN AUTHENTICATION SERVICE FOR COMPUTER NETWORKS", IEEE COMMUNICATIONS MAGAZINE, 1 September 1994 (1994-09-01), pages 33 - 38, XP002010524, ISSN: 0163-6804 *

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2820847A1 (en) * 2001-02-12 2002-08-16 Gemplus Card Int Controlling access to objects or applications on a chip card using a system of access indicators that can be used to explicitly declare both positive and negative access rights
EP1389752A2 (en) 2002-08-15 2004-02-18 Activcard Ireland Limited System and method for privilege delegation and control
EP1389752B1 (en) * 2002-08-15 2016-01-13 Assa Abloy AB System and method for privilege delegation and control
WO2007021949A2 (en) 2005-08-11 2007-02-22 Microsoft Corporation Dual layered access control list
EP1922625A2 (en) * 2005-08-11 2008-05-21 Microsoft Corporation Dual layered access control list
EP1922625A4 (en) * 2005-08-11 2012-01-25 Microsoft Corp Dual layered access control list
EP2096569A1 (en) * 2008-02-29 2009-09-02 Research in Motion Limited System and method for shared resource owner based access control
US8341715B2 (en) 2008-02-29 2012-12-25 Research In Motion Limited System and method for shared resource owner based access control
US8234693B2 (en) 2008-12-05 2012-07-31 Raytheon Company Secure document management
GB2477681A (en) * 2008-12-05 2011-08-10 Raytheon Co Secure document managment
WO2010065283A1 (en) * 2008-12-05 2010-06-10 Rayheon Company Secure document management
US10068102B2 (en) 2010-06-28 2018-09-04 International Business Machines Corporation Dynamic, temporary data access token
US8826419B2 (en) 2011-09-02 2014-09-02 Avecto Limited Computer device with anti-tamper resource security
US11847246B1 (en) * 2017-09-14 2023-12-19 United Services Automobile Association (Usaa) Token based communications for machine learning systems
WO2019069305A1 (en) * 2017-10-03 2019-04-11 Varonis Systems Inc. Systems and methods for preventing excess user authentication token utilization conditions in an enterprise computer environment
US11388004B2 (en) 2017-10-03 2022-07-12 Varonis Systems, Inc. Systems and methods for preventing excess user authentication token utilization conditions in an enterprise computer environment

Also Published As

Publication number Publication date
JP4809530B2 (en) 2011-11-09
EP1084464A1 (en) 2001-03-21
US6279111B1 (en) 2001-08-21
EP1084464B1 (en) 2011-07-27
ATE518179T1 (en) 2011-08-15
JP2002517854A (en) 2002-06-18

Similar Documents

Publication Publication Date Title
US6279111B1 (en) Security model using restricted tokens
US6308274B1 (en) Least privilege via restricted tokens
US6505300B2 (en) Method and system for secure running of untrusted content
Jaeger Operating system security
US6308273B1 (en) Method and system of security location discrimination
US7665143B2 (en) Creating secure process objects
US7350204B2 (en) Policies for secure software execution
US6389540B1 (en) Stack based access control using code and executor identifiers
Xu et al. Towards a VMM-based usage control framework for OS kernel integrity protection
McIlroy et al. Multilevel security in the UNIX tradition
US20090282457A1 (en) Common representation for different protection architectures (crpa)
US7203697B2 (en) Fine-grained authorization using mbeans
Fernandez et al. More Patterns for Operating System Access Control.
Swift et al. Improving the granularity of access control in Windows NT
Viega et al. The pros and cons of Unix and Windows security policies
Jaeger Security in Ordinary Operating Systems
Piessens Access control
Estor et al. Mandatory Access Control & SELinux
Indoria Trusted Operating System Appro

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): JP

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
ENP Entry into the national phase

Ref country code: JP

Ref document number: 2000 553885

Kind code of ref document: A

Format of ref document f/p: F

WWE Wipo information: entry into national phase

Ref document number: 1999927413

Country of ref document: EP

WWP Wipo information: published in national office

Ref document number: 1999927413

Country of ref document: EP