US 12,445,453 B2
Access control systems and methods
Daniel Chien, Bellevue, WA (US)
Filed by Daniel Chien, Bellevue, WA (US)
Filed on Feb. 22, 2023, as Appl. No. 18/113,037.
Application 18/113,037 is a continuation in part of application No. 16/708,423, filed on Dec. 9, 2019, granted, now 11,677,754.
Prior Publication US 2023/0198997 A1, Jun. 22, 2023
Int. Cl. H04L 9/40 (2022.01)
CPC H04L 63/105 (2013.01) [H04L 63/104 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method for computer security, the method comprising:
receiving an indication that a user is attempting to access a resource on a computing system, wherein the computing system includes an operating system that represents multiple users and groups including a safe mode superuser, an administrative group with a corresponding administrative superuser, and an application group with a corresponding application superuser;
determining a source identifier associated with the user, wherein the user is in exactly one of the multiple user groups;
controlling access to the resource based on the resource, the group of the user, and the source identifier;
storing a list that identifies executable programs or libraries;
allowing modification of the list only by the safe mode superuser when that superuser is logged in during maintenance mode; and
when the resource is an executable application, allowing execution of the application only if it is identified by the list.