Patents by Inventor Lawrence Koved

Lawrence Koved has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20030084325
    Abstract: A method and apparatus for type independent permission based access control are provided. The method and apparatus utilize object inheritance to provide a mechanism by which a large group of permissions may be assigned to a codesource without having to explicitly assign each individual permission to the codesource. A base permission, or superclass permission, is defined along with inherited, or subclass, permissions that fall below the base permission in a hierarchy of permissions. Having defined the permissions in such a hierarchy, a developer may assign a base permission to an installed class and thereby assign all of the inherited permissions of the base permission to the installed class. In this way, security providers need not know all the permission types defined in an application. In addition, security providers can seamlessly integrate with many applications without changing their access control and policy store semantics.
    Type: Application
    Filed: November 1, 2001
    Publication date: May 1, 2003
    Applicant: International Business Machines Corporation
    Inventors: Lawrence Koved, Anthony Joseph Nadalin, Nataraj Nagaratnam, Marco Pistoia, Bruce Arland Rich
  • Publication number: 20030084324
    Abstract: A method and apparatus for type independent permission based access control are provided. The method and apparatus utilize object inheritance to provide a mechanism by which a large group of permissions may be assigned to a codesource without having to explicitly assign each individual permission to the codesource. A base permission, or superclass permission, is defined along with inherited, or subclass, permissions that fall below the base permission in a hierarchy of permissions. Having defined the permissions in such a hierarchy, a developer may assign a base permission to an installed class and thereby assign all of the inherited permissions of the base permission to the installed class. In this way, security providers need not know all the permission types defined in an application. In addition, security providers can seamlessly integrate with many applications without changing their access control and policy store semantics.
    Type: Application
    Filed: November 1, 2001
    Publication date: May 1, 2003
    Applicant: International Business Machines Corporation
    Inventors: Lawrence Koved, Anthony Joseph Nadalin, Nataraj Nagaratnam, Marco Pistoia, Bruce Arland Rich
  • Publication number: 20020184486
    Abstract: This invention provides methods and apparatus for determining a set of authorization usage for collection of code. By using a program graph, the present invention identifies the code within in bounded paths in the program graph that use authorization. The level of precision is able to identify authorization usage to the level of basic blocks, methods, classes or other collections of code. By using the analysis technique described in this invention, we can determine the authorizations needed by collections code, including Java applets, servlets, and Enterprise JavaBeans. By using the present invention, it is possible, prior to loading the mobile code, to prompt the administrator or end-user to authorize or deny the code access to restricted the resources, or determine whether authorization testing will be required.
    Type: Application
    Filed: May 11, 2001
    Publication date: December 5, 2002
    Applicant: International Business Machines Corporation
    Inventors: Aaron Kershenbaum, Lawrence Koved, Marco Pistoia
  • Publication number: 20020161996
    Abstract: A digital rights management (DRM) system and methodology for a Java client implementing a Java Runtime Environment (JRE). The JRE comprises a Java Virtual Machine (JVM) and Java runtime libraries components and is capable of executing a player application for presenting content that can be presented through a Java program (e.g., a Java application, applet, servlet, bean, etc.) and downloaded from a content server to the client. The DRM system includes an acquisition component for receiving downloaded protected contents; and a dynamic rights management layer located between the JRE and player application for receiving requests to view or play downloaded protected contents from the player, and, in response to each request, determining the rights associated with protected content and enabling viewing or playing of the protected contents via the player application if permitted according to the rights.
    Type: Application
    Filed: February 23, 2001
    Publication date: October 31, 2002
    Inventors: Lawrence Koved, Magda M. Mourad, Jonathan P. Munson, Giovanni Pacifici, Marco Pistoia, Alaa S. Youssef
  • Patent number: 5915085
    Abstract: A method and system for creating flexible security control mechanisms and virtualization of nominally shared system resources. The goal is to minimize the potential for interference between concurrently executing applications in a multithreaded environment. Executable content is associated with security policies appropriate to the content, and policies are associated with the content loader; security policies are dynamically computed so that content from multiple sources can be combined to create new, yet secure, function; digitally signed executable content can bypass some security restrictions; and, nominally shared resources are managed via policies associated with the content loading mechanism.
    Type: Grant
    Filed: February 28, 1997
    Date of Patent: June 22, 1999
    Assignee: International Business Machines Corporation
    Inventor: Lawrence Koved