Encapsulating commands within a control wrapper for split entry or approval

作者: Sorin N. Cismas , Manu Kurian

DOI:

关键词:

摘要: Methods, systems, and computer-readable media for reviewing inputted commands preventing the execution of accidentally or maliciously entered adverse are disclosed. These may be operating system commands, resource device application so on. Some aspects disclosure provide ways to split entry and/or approval prior their execution. In some aspects, command undone reversed if is not successfully validated. Commands encapsulated in a control wrapper identify subject co-entry process, criteria regarding user(s) entering used determine whether post-execution validation required. Indications denial transmitted other computing devices reduce eliminate malicious accidental activity.

参考文章(15)
Shafiullah Syed, Jeya Anantha Prabu P, Michael Oliver, R. Scott Chate, S. Venkataraman, Multi-tenant agile database connector ,(2012)
Moritz Becker, State-updating authorization ,(2009)
Niels Peter Skov Andersen, Mark E. Pecen, Michael D. Kotzin, Method and apparatus for authentication using remote multiple access sim technology ,(2002)
Sujoy Basu, Rajendra Kumar, Vanish Talwar, Grid computing control system ,(2003)
Mario Dal Canto, Matthew J. Curtis, Duane Northcutt, Gerard E. Dube, System and method for provisioning universal stateless digital and computing services ,(2003)
Guy Iain Tarrant Sidford, Simon Keith Lambourn, Andrew David Missen, William Bruce Morgan, Marian Morgan, Determination of access rights to information technology resources ,(2005)