Analysis of software systems has proven to be extremely useful to development requirements and to the design of systems. As such, it can be particularly advantageous to incorporate security engineering and analysis into the software development life cycle from the beginning stage of design. Conventionally, the application life cycle lacks security engineering and analysis thereby prompting retroactive measures to address identified issues.
Today, when developing an application, it is oftentimes difficult to predict how the application will react under real-world conditions. In other words, it is difficult to predict security vulnerabilities of an application prior to and during development and/or before completion. Frequently, upon completion, a developer will have to modify the application in order to adhere to real-world conditions and threats of attacks. This modification can consume many hours of programming time and delay application deployment—each of which is very expensive.
Traditionally, designing for application security is oftentimes random and does not produce effective results. As a result, applications and data associated therewith are left vulnerable to threats and uninvited attacks. In most cases, the typical software practitioner lacks the expertise to effectively predict vulnerabilities and associated attacks.
While many threats and attacks can be estimated with some crude level of certainty, others cannot. For those security criterions that can be estimated prior to development, this estimate most often requires a great amount of research and guesswork in order to most accurately determine the criterion. The conventional guesswork approach of security analysis is not based upon any founded benchmark. As well, these conventional approaches are not effective or systematic in any way.
In accordance with traditional application life cycle development, it is currently not possible to proactively (and accurately) address security issues from the beginning to the end of the life cycle. To the contrary, developers often find themselves addressing security and performance issues after the fact—after development is complete. This retroactive modeling approach is extremely costly and time consuming to the application life cycle.
The following presents a simplified summary of the innovation in order to provide a basic understanding of some aspects of the innovation. This summary is not an extensive overview of the innovation. It is not intended to identify key/critical elements of the innovation or to delineate the scope of the innovation. Its sole purpose is to present some concepts of the innovation in a simplified form as a prelude to the more detailed description that is presented later.
The innovation disclosed and claimed herein, in one aspect thereof, comprises a threats and countermeasures schema that can leverage expertise to organize principles, patterns and practices and make vulnerabilities actionable. In other aspects, the threats and countermeasures schema can leverage expertise into a variety of application life cycle engineering activities. More particularly, the novel threats and countermeasures schema can converge knowledge into an engineering activity by identifying categories, vulnerabilities, attacks and countermeasures associated with an application type.
Effectively, the novel threats and countermeasures schema can create a common framework that converges knowledge and expertise with respect to a particular application engineering activity (e.g., threat modeling). For example, the framework can include lists of threats that can be acted upon. Similarly, the framework can include a list of attacks that can be acted upon. Still further, the framework can include a list of countermeasures based upon the attacks. In disparate aspects, the schema can be organized against known application vulnerability categories and therefore can be actionable from a developer's standpoint, from a code analysis standpoint and from an architect's standpoint.
In still another aspect, a context precision mechanism can be employed to automatically and/or dynamically determine a context of an application environment. In accordance therewith, threats and countermeasures schema can be established based at least in part upon the context. Essentially, the context precision concept can be described as a novel tool that can clarify guidance and product design by automatically defining a set of categories that facilitates highly relevant, highly specific guidance and actions.
In disparate particular aspects, dimensions of the context precision mechanism can be directed to application types, scenarios, project types, life cycles, etc. Accordingly, the context precision component can evaluate an application environment to determine the application type, for example, is it a web application, web service, a component, a framework, operating system, etc? Using these dimensions, very specific guidance can be generated and embedded within the novel threats and countermeasures schema.
Yet another aspect of the innovation employs machine learning and/or reasoning (MLR) techniques that infer an action that a user desires to be automatically performed. More particularly, an MLR component can be provided that employs a probabilistic and/or statistical-based analysis to prognose or infer an action that a user desires to be automatically performed.
To the accomplishment of the foregoing and related ends, certain illustrative aspects of the innovation are described herein in connection with the following description and the annexed drawings. These aspects are indicative, however, of but a few of the various ways in which the principles of the innovation can be employed and the subject innovation is intended to include all such aspects and their equivalents. Other advantages and novel features of the innovation will become apparent from the following detailed description of the innovation when considered in conjunction with the drawings.
The innovation is now described with reference to the drawings, wherein like reference numerals are used to refer to like elements throughout. In the following description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the subject innovation. It may be evident, however, that the innovation can be practiced without these specific details. In other instances, well-known structures and devices are shown in block diagram form in order to facilitate describing the innovation.
As used in this application, the terms “component” and “system” are intended to refer to a computer-related entity, either hardware, a combination of hardware and software, software, or software in execution. For example, a component can be, but is not limited to being, a process running on a processor, a processor, an object, an executable, a thread of execution, a program, and/or a computer. By way of illustration, both an application running on a server and the server can be a component. One or more components can reside within a process and/or thread of execution, and a component can be localized on one computer and/or distributed between two or more computers.
As used herein, the term to “infer” or “inference” refer generally to the process of reasoning about or inferring states of the system, environment, and/or user from a set of observations as captured via events and/or data. Inference can be employed to identify a specific context or action, or can generate a probability distribution over states, for example. The inference can be probabilistic—that is, the computation of a probability distribution over states of interest based on a consideration of data and events. Inference can also refer to techniques employed for composing higher-level events from a set of events and/or data. Such inference results in the construction of new events or actions from a set of observed events and/or stored event data, whether or not the events are correlated in close temporal proximity, and whether the events and data come from one or several event and data sources.
Referring initially to the figures,
Although the examples described herein are directed to employing the novel schema in connection with life cycle engineering activities, it is to be understood that the novel schema can make vulnerabilities actionable by organizing principles, patterns and practices into a novel schema format. Effectively, knowledge and expertise can be leveraged into the novel schema thereby enabling formulating and/or identifying actionable vulnerabilities.
As will be better understood upon a review of the figures that follow, the threats and countermeasures schema 104 can be of the form as follows:
Following are a list of questions that add perspective to each of a “threat category,” “attack,” “vulnerability,” and “countermeasure.” The questions are included to further explain the notion of “threat category,” “attack,” “vulnerability,” and “countermeasure.” A “threat category” addresses the question, “what is the negative effect/outcome?” Similarly, an “attack” addresses, “what is the list of attacks used to realize the threat?” A “vulnerability” addresses the question of “what are the weaknesses that allow the threats to occur or allow attacks?” Finally, a “countermeasure” addresses the question, “what are the principle-based approaches that can be used to either close the vulnerability or reduce the impact of negative consequences?”
By way of example, it will be understood that the novel threats and countermeasures schema component 104 can enable a user to incorporate and leverage security expertise into an application life cycle. The novel functionality and advantages thereof will be better understood upon a review of the figures that follow.
In one aspect, the threats and countermeasures schema 104 is a pattern-based schema that defines a set of security-related categories specifically related to the type of application that is being designed. Most often, the categories represent areas where security issues are most often made and/or overlooked. As will be understood upon a review of the figures that follow, the threats and countermeasures schema component 104 can be employed to leverage expertise not shared by the common user. In other words, the threats and countermeasures component 104 can incorporate categories, vulnerabilities, threats/attacks and countermeasures which have been identified by extremely experienced developers through research and testing. This information can be incorporated into the application life cycle engineering component 106.
In one particular aspect, the threats and countermeasures schema component 104 can identify a set of application layer vulnerabilities and threats/attacks and defines countermeasures (e.g., remedies) that are appropriate to address each threat/attack. To this end, the novel threats and countermeasures schema component 104 can facilitate categorization of issues (e.g., vulnerabilities/threats) in preparation for performing life cycle engineering tasks such as threat and/or security modeling.
The innovation described herein can facilitate analysis of the application life cycle and more particularly, application security, from the perspective of vulnerabilities, threats, attacks and countermeasures associated therewith. The following terms are used throughout the description, the definitions of which are provided herein to assist in understanding various aspects of the subject innovation.
An “asset” refers to a resource of value such as the data in a database or a file system, or a system resource. In another example, an asset might be an intangible resource or value such as a company's reputation.
A “threat” refers to an undesired event or a potential occurrence—malicious or otherwise—that may harm or compromise an asset.
A “vulnerability” refers to a weakness that makes an exploit (e.g., attack) possible. Vulnerabilities can include operational practices.
An “attack” (or “exploit”) refers to an action taken that utilizes one or more vulnerabilities to realize a threat.
A “countermeasure” refers to a safeguard that addresses a threat and mitigates risk. However, a countermeasure does not always directly address threats. Rather, a countermeasure addresses the factors that define threats. For example, a countermeasure can range from improving application design, or improving code, to improving an operational practice.
As described above, the threats and countermeasures schema component 104 of the subject innovation can identify a set of common application and code-level threats, and the recommended countermeasures to address each one. Although this description does not contain an exhaustive list of threats, attacks, vulnerabilities and/or countermeasures, it is to be understood that it does highlight many of the top items. With this information and knowledge of how an attacker works, a user can identify additional threats. In other words, the novel threats and countermeasures schema component 104 can enable a user to identify vulnerabilities and threats that are most likely to impact an application throughout the application life cycle.
While there are many variations of specific attacks and attack techniques, it can be particularly useful to view threats in terms of what the attacker is trying to achieve. In other words, focus can be shifted from the identification of every specific attack to focusing on the end results of possible attacks. Threats faced by the application can be categorized based on the goals and purposes of the attacks. A working knowledge of these categories of threats can help organize a security strategy so that preparation can be made with respect to responses to threats.
In one aspect particular categories of threat types can be employed. For example, STRIDE is an acronym that can be used to categorize different threat types. More particularly, STRIDE is an acronym for the following:
“Spoofing” refers to an act of attempting to gain access to a system by using a false identity. This can be accomplished using stolen user credentials or a false IP address. After the attacker successfully gains access as a legitimate user or host, elevation of privileges or abuse using authorization can begin.
“Tampering” is the unauthorized modification of data, for example as it flows over a network between two computers.
“Repudiation” is the ability of users (legitimate or otherwise) to deny that they performed specific actions or transactions. Without adequate auditing, repudiation attacks are often difficult to prove.
“Information disclosure” is the unwanted exposure of private data, for example, a user views the contents of a table or file he or she is not authorized to open, or monitors data passed in plaintext over a network. Some examples of information disclosure vulnerabilities include the use of hidden form fields, comments embedded in web pages that contain database connection strings and connection details, and weak exception handling that can lead to internal system level details being revealed to the client. Any of this information can be very useful to the attacker.
“Denial of service” is the process of making a system or application unavailable. For example, a denial of service attack might be accomplished by bombarding a server with requests to consume all available system resources or by passing it malformed input data that can crash an application process.
“Elevation of privilege” occurs when a user with limited privileges assumes the identity of a privileged user to gain privileged access to an application. For example, an attacker with limited privileges might elevate his or her privilege level to compromise and take control of a highly privileged and trusted process or account. Each of these STRIDE categories can include the threat categories described infra.
Referring now to
Additionally, as shown, the threats and countermeasures schema component 104 can include 1 to B category components 204, 1 to C vulnerability components 206, 1 to D threat/attack components 208, and 1 to E countermeasure components 210, where B, C, D and E are integers. Each of these threats and countermeasures schema subcomponents (204, 206, 208, 210) will be better understood upon a review of the figures that follow.
Referring again to the engineering activity components 202 and with reference to
It is to be understood and appreciated that the subject security engineering model of
Below is an exemplary list of categories 204 in accordance with an aspect of the innovation. While the exemplary categories illustrate a particular grouping, it is to be understood the groupings can be organized in any manner without departing from the spirit and scope of the innovation and claims appended hereto in any way.
The following table summarizes categories 204 that can be represented within a threats and countermeasures schema 104 in accordance with aspects of the innovation. Additionally, the table below includes a description of each of the categories 204 in order to add perspective to the innovation.
The following table illustrates an exemplary list of vulnerabilities 206 that correspond to the aforementioned categories 204. Again, as mentioned above, this list is not intended to be exhaustive or limiting in any way. Other vulnerabilities exist and are to be included within the scope of this disclosure and claims appended hereto.
One particularly useful method of analyzing application-level threats/attacks 208 is to organize them by category 204. The table below summarizes a set of threats/attacks 208 with reference to each category 204 identified above.
In accordance with the exemplary categories 204, vulnerabilities 206 and threats/attacks 208, the following table illustrates exemplary countermeasures 210 that can be included within the threats and countermeasures schema component 104.
Following is a list of exemplary countermeasures 210 with respect to more specific threats and/or attacks 208 in accordance with an aspect of the innovation. These more specific threats/attacks 208 correspond to the STRIDE acronym described supra. While this list includes specific countermeasures 210, it is to be appreciated that the list is not intended to be exhaustive and/or limiting in any way. As well, it is to be understood that other countermeasures 210 can exist to address each exemplary threat/attack 208 listed. These additional countermeasures 210 are to be included within the scope of this innovation and claims appended hereto. As such, these additional countermeasures 210 can be incorporated (e.g., embedded) into the threats and countermeasures component (104 of
Referring now to
As described supra, the threats and countermeasures schema 104 can include a category component 402, a vulnerability component 404, a threat/attack component 406 and a countermeasure component 408. In the specific example shown, the category 402 is an input validation category. Accordingly, the vulnerability (404), threat/attack (406) and countermeasure components (408) are non-validated input, buffer overflow and validate input respectively.
Although specific threats and countermeasure schema components 104 are shown, it is to be understood that other sub-components and information can be embedded within novel threats and countermeasures schema 104 without departing from the spirit and scope of the innovation described herein. In all, the novel threats and countermeasures schema component 104 enables a user to leverage expertise developed and embedded within the sub-components.
Continuing with the example of
When network and host level entry points are protected; the public interfaces exposed by the application become a primary source of attack. The input to the application is a means to both test the system and a way to execute code on an attacker's behalf. If the application blindly trusts input, the application may be vulnerable. Accordingly, the countermeasure (408) included within the novel threats and countermeasure schema 104 of
Other examples of countermeasures to authentication attacks can include the following:
Encryption of credentials over the wire. It is particularly important to avoid sending plain-text credentials over the wire. If it is necessary to send credentials over the wire, they should be encrypted to help protect them if they are captured during a network sniffing attack.
Protect authentication tokens. It is particularly important to encrypt authentication tokens over the wire. A user should employ an encrypted channel (for example by using SSL) to prevent an attacker from sniffing authentication tokens and using them in cookie replay attacks.
Enforce strong password policies. It can be helpful to enforce password complexity requirement by requiring long passwords with a combination of upper case, lower case, numeric and special (for example punctuation) characters. This assists in mitigation of the threat posed by dictionary attacks. If possible, it can also be helpful to enforce automatic password expiry.
As well, a user should store password hashes instead of the passwords or encrypted passwords. If forms authentication is implemented, user passwords should not be stored if the sole purpose is to verify that the user knows the password value. Rather, it can be helpful to store a verifier in the form of a hash value and to re-compute the hash using the user-supplied value during the logon process. It is also prudent to avoid storing encrypted passwords because it raises key management issue. A user should combine password hashes with a salt value (a cryptographically strong random number) to mitigate the threat associated with brute force attacks and dictionary attacks.
Following is a discussion of other novel threats and countermeasures categories. It is to be understood that this list is not exhaustive and is to be considered in addition to those categories highlighted in the tables supra. Moreover, those skilled in the art will understand that other categories, and associated vulnerabilities, attacks and/or countermeasures, exist. These additional categories and sub-components are to be included within the novelty of leveraging expertise within the novel threats and countermeasures schema described herein.
With reference now to authorization, based upon user identity and role membership, authorization to a particular resource or service is either allowed or denied. Accordingly, vulnerabilities such as poor authorization control and poor or predictable session identifiers exist with respect to this category.
Attacks such as forceful browsing or session hijacking are possible in view of these vulnerabilities. As such, countermeasures can include applying an authorization control to every object that authorizes access based on the identity of the authenticated principle requesting access. As well, a user should employ strong random numbers for session identifiers (e.g. GUIDs).
Auditing and logging can be used to help detect suspicious activity such as footprinting or possible password cracking attempts before an exploit actually occurs. This auditing and logging category can also help deal with the threat of repudiation. It is to be understood that it can be increasingly more difficult for a user to deny performing an operation if a series of synchronized log entries on multiple servers indicate that the user performed a particular transaction. A countermeasure to prevent an auditing and logging attack can include disabling anonymous access and authenticating every principle.
Client side validation occurs when the server trusts the client to authenticate, authorize itself or validate data. The attack can occur when the attacker turns off this authentication and misrepresents the authentication or authorization state to the server. Client side validation is usually accomplished via scripts that run on the client machine. These scripts can either be blocked or altered by the client at will and are completely attacker controlled. To combat client side validation, a server should not trust the client to authenticate or authorize itself. As well, client side validation accomplished for performance reasons should be verified by the server.
With respect to communications security, vulnerabilities can include unsecure communication channels (e.g. lacking confidentiality protection). The following is a list of examples of attacks that can occur:
To this end, countermeasures can include:
It is to be understood that the aforementioned information can be embedded within a novel threats and countermeasures schema component 104 thereby leveraging expertise into the application development life cycle. This novel approach of the threats and countermeasures schema enables a user to create a library of threats that becomes very actionable because it is possible to organize principles/patterns specifically around each dimension: threat, attack, vulnerability, and countermeasure.
Turning now to
The novel context precision component 602 is a tool that can clarify guidance and product design. In other words, the context precision component 602 can generate a set of categories 204 that facilitates highly relevant, highly specific guidance and actions in view of the application and/or user goal(s), etc. For example, one dimension can be application type, another dimension can be scenario, another dimension can be project type, and yet another dimension can be life cycle.
Accordingly, the context precision component 602 can determine a context of a particular application environment thereby facilitating automatic generation of an appropriate threats and countermeasures schema component 104. By way of further example, the context precision component 602 can be employed to determine if an environment contains a specific web application type, for example, e-commerce, digital rights management based application, etc. In still another aspect, the context precision component 602 can determine a particular application scenario, for example, Internet, intranet, etc.
Using these dimensions, very specific guidance can be generated and incorporated within the novel threats and countermeasures schema component 104. In all, the threats and countermeasures schema 104 is a pattern-based information model that defines a set of security-related categories specifically for the application type that is being designed. Frequently, these categories represent the areas where security mistakes are most often made and/or problems encountered. Patterns and practices security guidance includes context-specific security frames for each major application type.
A classifier is a function that maps an input attribute vector, x=(x1, x2, x3, x4, xn), to a confidence that the input belongs to a class, that is, f(x)=confidence (class). Such classification can employ a probabilistic and/or statistical-based analysis (e.g. factoring into the analysis utilities and costs) to prognose or infer an action that a user desires to be automatically performed.
A support vector machine (SVM) is an example of a classifier that can be employed. The SVM operates by finding a hypersurface in the space of possible inputs, which the hypersurface attempts to split the triggering criteria from the non-triggering events. Intuitively, this makes the classification correct for testing data that is near, but not identical to training data. Other directed and undirected model classification approaches include, e.g. naïve Bayes, Bayesian networks, decision trees, neural networks, fuzzy logic models, and probabilistic classification models providing different patterns of independence can be employed. Classification as used herein also is inclusive of statistical regression that is utilized to develop models of priority.
As will be readily appreciated from the subject specification, the subject innovation can employ classifiers that are explicitly trained (e.g. via a generic training data) as well as implicitly trained (e.g., via observing user behavior, receiving extrinsic information). For example, SVM's are configured via a learning or training phase within a classifier constructor and feature selection module. Thus, the classifier(s) can be used to automatically learn and perform a number of functions, including but not limited to determining according to a predetermined criteria threats, vulnerabilities and/or countermeasures.
At 802, the context can be determined of an application and/or system. In other words, in one aspect, a context precision mechanism can be employed to analyze an application thereby establishing an application type, project type, scenario, life cycle type, etc. The gathered information can be employed in order to generate a threats and countermeasures schema at 804.
At 804, in one aspect of the innovation, a threats and countermeasures schema can be established that defines one or more categories, vulnerabilities, attacks and/or countermeasures. This threats and countermeasures schema can facilitate incorporating expertise into an engineering activity at 806. For example, the threats and countermeasures schema facilitates incorporating expertise into a security modeling activity. It is to be understood and appreciated that numerous threats and countermeasures schemas can be established which facilitate incorporating expertise into other engineering activities.
Referring now to
Generally, program modules include routines, programs, components, data structures, etc., that perform particular tasks or implement particular abstract data types. Moreover, those skilled in the art will appreciate that the inventive methods can be practiced with other computer system configurations, including single-processor or multiprocessor computer systems, minicomputers, mainframe computers, as well as personal computers, hand-held computing devices, microprocessor-based or programmable consumer electronics, and the like, each of which can be operatively coupled to one or more associated devices.
The illustrated aspects of the innovation may also be practiced in distributed computing environments where certain tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules can be located in both local and remote memory storage devices.
A computer typically includes a variety of computer-readable media. Computer-readable media can be any available media that can be accessed by the computer and includes both volatile and nonvolatile media, removable and non-removable media. By way of example, and not limitation, computer-readable media can comprise computer storage media and communication media. Computer storage media includes both volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, program modules or other data. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disk (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by the computer.
Communication media typically embodies computer-readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism, and includes any information delivery media. The term “modulated data signal” means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. By way of example, and not limitation, communication media includes wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, RF, infrared and other wireless media. Combinations of the any of the above should also be included within the scope of computer-readable media.
With reference again to
The system bus 908 can be any of several types of bus structure that may further interconnect to a memory bus (with or without a memory controller), a peripheral bus, and a local bus using any of a variety of commercially available bus architectures. The system memory 906 includes read-only memory (ROM) 910 and random access memory (RAM) 912. A basic input/output system (BIOS) is stored in a non-volatile memory 910 such as ROM, EPROM, EEPROM, which BIOS contains the basic routines that help to transfer information between elements within the computer 902, such as during start-up. The RAM 912 can also include a high-speed RAM such as static RAM for caching data.
The computer 902 further includes an internal hard disk drive (HDD) 914 (e.g., EIDE, SATA), which internal hard disk drive 914 may also be configured for external use in a suitable chassis (not shown), a magnetic floppy disk drive (FDD) 916, (e.g., to read from or write to a removable diskette 918) and an optical disk drive 920, (e.g., reading a CD-ROM disk 922 or, to read from or write to other high capacity optical media such as the DVD). The hard disk drive 914, magnetic disk drive 916 and optical disk drive 920 can be connected to the system bus 908 by a hard disk drive interface 924, a magnetic disk drive interface 926 and an optical drive interface 928, respectively. The interface 924 for external drive implementations includes at least one or both of Universal Serial Bus (USB) and IEEE 1394 interface technologies. Other external drive connection technologies are within contemplation of the subject innovation.
The drives and their associated computer-readable media provide nonvolatile storage of data, data structures, computer-executable instructions, and so forth. For the computer 902, the drives and media accommodate the storage of any data in a suitable digital format. Although the description of computer-readable media above refers to a HDD, a removable magnetic diskette, and a removable optical media such as a CD or DVD, it should be appreciated by those skilled in the art that other types of media which are readable by a computer, such as zip drives, magnetic cassettes, flash memory cards, cartridges, and the like, may also be used in the exemplary operating environment, and further, that any such media may contain computer-executable instructions for performing the methods of the innovation.
A number of program modules can be stored in the drives and RAM 912, including an operating system 930, one or more application programs 932, other program modules 934 and program data 936. All or portions of the operating system, applications, modules, and/or data can also be cached in the RAM 912. It is appreciated that the innovation can be implemented with various commercially available operating systems or combinations of operating systems.
A user can enter commands and information into the computer 902 through one or more wired/wireless input devices, e.g. a keyboard 938 and a pointing device, such as a mouse 940. Other input devices (not shown) may include a microphone, an IR remote control, a joystick, a game pad, a stylus pen, touch screen, or the like. These and other input devices are often connected to the processing unit 904 through an input device interface 942 that is coupled to the system bus 908, but can be connected by other interfaces, such as a parallel port, an IEEE 1394 serial port, a game port, a USB port, an IR interface, etc.
A monitor 944 or other type of display device is also connected to the system bus 908 via an interface, such as a video adapter 946. In addition to the monitor 944, a computer typically includes other peripheral output devices (not shown), such as speakers, printers, etc.
The computer 902 may operate in a networked environment using logical connections via wired and/or wireless communications to one or more remote computers, such as a remote computer(s) 948. The remote computer(s) 948 can be a workstation, a server computer, a router, a personal computer, portable computer, microprocessor-based entertainment appliance, a peer device or other common network node, and typically includes many or all of the elements described relative to the computer 902, although, for purposes of brevity, only a memory/storage device 950 is illustrated. The logical connections depicted include wired/wireless connectivity to a local area network (LAN) 952 and/or larger networks, e.g., a wide area network (WAN) 954. Such LAN and WAN networking environments are commonplace in offices and companies, and facilitate enterprise-wide computer networks, such as intranets, all of which may connect to a global communications network, e.g., the Internet.
When used in a LAN networking environment, the computer 902 is connected to the local network 952 through a wired and/or wireless communication network interface or adapter 956. The adapter 956 may facilitate wired or wireless communication to the LAN 952, which may also include a wireless access point disposed thereon for communicating with the wireless adapter 956.
When used in a WAN networking environment, the computer 902 can include a modem 958, or is connected to a communications server on the WAN 954, or has other means for establishing communications over the WAN 954, such as by way of the Internet. The modem 958, which can be internal or external and a wired or wireless device, is connected to the system bus 908 via the serial port interface 942. In a networked environment, program modules depicted relative to the computer 902, or portions thereof, can be stored in the remote memory/storage device 950. It will be appreciated that the network connections shown are exemplary and other means of establishing a communications link between the computers can be used.
The computer 902 is operable to communicate with any wireless devices or entities operatively disposed in wireless communication, e.g., a printer, scanner, desktop and/or portable computer, portable data assistant, communications satellite, any piece of equipment or location associated with a wirelessly detectable tag (e.g. a kiosk, news stand, restroom), and telephone. This includes at least Wi-Fi and Bluetooth™ wireless technologies. Thus, the communication can be a predefined structure as with a conventional network or simply an ad hoc communication between at least two devices.
Wi-Fi, or Wireless Fidelity, allows connection to the Internet from a couch at home, a bed in a hotel room, or a conference room at work, without wires. Wi-Fi is a wireless technology similar to that used in a cell phone that enables such devices, e.g. computers, to send and receive data indoors and out; anywhere within the range of a base station. Wi-Fi networks use radio technologies called IEEE 802.11 (a, b, g, etc.) to provide secure, reliable, fast wireless connectivity. A Wi-Fi network can be used to connect computers to each other, to the Internet, and to wired networks (which use IEEE 802.3 or Ethernet). Wi-Fi networks operate in the unlicensed 2.4 and 5 GHz radio bands, at an 11 Mbps (802.11a) or 54 Mbps (802.11b) data rate, for example, or with products that contain both bands (dual band), so the networks can provide real-world performance similar to the basic 10BaseT wired Ethernet networks used in many offices.
Referring now to
The system 1000 also includes one or more server(s) 1004. The server(s) 1004 can also be hardware and/or software (e.g., threads, processes, computing devices). The servers 1004 can house threads to perform transformations by employing the innovation, for example. One possible communication between a client 1002 and a server 1004 can be in the form of a data packet adapted to be transmitted between two or more computer processes. The data packet may include a cookie and/or associated contextual information, for example. The system 1000 includes a communication framework 1006 (e.g., a global communication network such as the Internet) that can be employed to facilitate communications between the client(s) 1002 and the server(s) 1004.
Communications can be facilitated via a wired (including optical fiber) and/or wireless technology. The client(s) 1002 are operatively connected to one or more client data store(s) 1008 that can be employed to store information local to the client(s) 1002 (e.g., cookie(s) and/or associated contextual information). Similarly, the server(s) 1004 are operatively connected to one or more server data store(s) 1010 that can be employed to store information local to the servers 1004.
What has been described above includes examples of the innovation. It is, of course, not possible to describe every conceivable combination of components or methodologies for purposes of describing the subject innovation, but one of ordinary skill in the art may recognize that many further combinations and permutations of the innovation are possible. Accordingly, the innovation is intended to embrace all such alterations, modifications and variations that fall within the spirit and scope of the appended claims. Furthermore, to the extent that the term “includes” is used in either the detailed description or the claims, such term is intended to be inclusive in a manner similar to the term “comprising” as “comprising” is interpreted when employed as a transitional word in a claim.
This application is a Continuation-in-Part of pending U.S. patent application Ser. No. 11/321,153 entitled “INFORMATION MODELS AND THE APPLICATION LIFE CYCLE” filed on Dec. 29, 2005. Additionally, this application is related to pending U.S. patent applications Ser. No. 11/321,425 entitled “SECURITY MODELING AND THE APPLICATION LIFE CYCLE” and filed Dec. 29, 2005, Ser. No. 11/321,818 entitled “PERFORMANCE MODELING AND THE APPLICATION LIFE CYCLE” filed on Dec. 29, 2005, Ser. No. 11/353,821 entitled “WEB APPLICATION SECURITY FRAME” filed on Feb. 14, 2006, and Ser. No. 11/363,142 entitled “SERVER SECURITY SCHEMA” filed on Feb. 27, 2006. The entireties of the above-noted applications are incorporated by reference herein.
Number | Date | Country | |
---|---|---|---|
Parent | 11321153 | Dec 2005 | US |
Child | 11382857 | May 2006 | US |