ACCESSING SECURE SYSTEM RESOURCES BY LOW PRIVILEGE PROCESSES
Described are examples for enabling low privileged application to access secure system resources. A request from an application executing at a second privilege level can be received by a broker service executing at a first privilege level, where the request corresponds to accessing secure system res...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Described are examples for enabling low privileged application to access secure system resources. A request from an application executing at a second privilege level can be received by a broker service executing at a first privilege level, where the request corresponds to accessing secure system resources. It can then be determined whether the application has a defined capability for accessing the secure system resources, whether the application has a protected status, and/or whether a user account associated with executing the application is part of a certain group of user accounts. Based on these determinations, access to the secure system resources can be provided to the application by the broker service. |
---|