Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Microsoft Patents Sudo?!!
GrokLaw ^ | 11/11/2009 | PJ

Posted on 11/13/2009 1:37:37 PM PST by Swordmaker

click here to read article


Navigation: use the links below to view more comments.
first 1-2021-4041-48 next last

1 posted on 11/13/2009 1:37:37 PM PST by Swordmaker
[ Post Reply | Private Reply | View Replies]

To: Swordmaker
Micro$oft would not go through the time and expense with the patent process on something already invented if it did not think they could charge screw somebody at a later date.
2 posted on 11/13/2009 1:41:57 PM PST by pikachu (I’m so scared of the swine flu I won’t even watch ‘The View')
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

Extend, Embrace, Envelope.

If you cant beat them, own them.


3 posted on 11/13/2009 1:45:12 PM PST by pvoce ('Good' sense and 'Common' sense are two entirely different concepts.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

Sorry, your analysis is incorrect. What MS patented is NOT sudo. What they did patent is something that sudo does not do, namely, when an attempt to access an application fails, it presents a list of people who ARE authorized to execute the action.

Reading patents is very tricky and the focus has to be on the claims section and read with an mind toward lawyer speak.


4 posted on 11/13/2009 1:45:25 PM PST by taxcontrol
[ Post Reply | Private Reply | To 1 | View Replies]

To: ~Kim4VRWC's~; 1234; 50mm; 6SJ7; Abundy; Action-America; acoulterfan; Airwinger; Aliska; altair; ...
Software Patent Insanity PING!

Apple has been doing since 2001 exactly what Microsoft applied for a patent for in 2005 and received in 2009... and UNIX users have been doing it for 30 years...


Software Patent insanity Ping!

If you want on or off the Mac Ping List, Freepmail me.

5 posted on 11/13/2009 1:45:40 PM PST by Swordmaker (Remember, the proper pronunciation of IE is "AAAAIIIIIEEEEEEE!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: taxcontrol
Reading patents is very tricky and the focus has to be on the claims section and read with an mind toward lawyer speak.

I just read the patent. It's not new.

6 posted on 11/13/2009 1:47:14 PM PST by Swordmaker (Remember, the proper pronunciation of IE is "AAAAIIIIIEEEEEEE!)
[ Post Reply | Private Reply | To 4 | View Replies]

To: Swordmaker
Could someone translate all this into common English?
What does this mean to me?
What the hell is "sudo"?
7 posted on 11/13/2009 1:48:25 PM PST by Villiany_Inc (Conservative Cause increased by 1!! Baby girl, born 4/9/09)
[ Post Reply | Private Reply | To 1 | View Replies]

To: pvoce

envelope? gonna mail that patent to someone?


8 posted on 11/13/2009 1:49:40 PM PST by databoss (Netanyahu will play Obama like a fiddle....)
[ Post Reply | Private Reply | To 3 | View Replies]

To: Swordmaker
Because neither the article, nor the poster, mentions what the heck “sudo” is, this might be helpful:

“The sudo command is a program for some Unix and Unix-like computer operating systems that allows users to run programs with the security privileges of another user (normally the superuser, a.k.a. root).”

http://en.wikipedia.org/wiki/Sudo

9 posted on 11/13/2009 1:49:51 PM PST by ConservativeMind (I love it every time a criminal dies at the hands of a victim.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker
Wow. Just wow.


10 posted on 11/13/2009 1:50:40 PM PST by rdb3 (The mouth is the exhaust pipe of the heart.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

That will teach those nixsters once and for all! /s


11 posted on 11/13/2009 1:51:40 PM PST by D Rider
[ Post Reply | Private Reply | To 1 | View Replies]

To: taxcontrol
Sorry, your analysis is incorrect. What MS patented is NOT sudo. What they did patent is something that sudo does not do, namely, when an attempt to access an application fails, it presents a list of people who ARE authorized to execute the action.

I see what you are getting at... but if that is what it is, it appears to me to be a method to compromise computer security more easily. It would not be something I think would be a good thing.

12 posted on 11/13/2009 1:55:36 PM PST by Swordmaker (Remember, the proper pronunciation of IE is "AAAAIIIIIEEEEEEE!)
[ Post Reply | Private Reply | To 4 | View Replies]

To: Villiany_Inc
What the hell is "sudo"?

Sudo is short for "Super User Do," a command to execute a command which is restricted with privileges normally reserved for high level administrators of the computer. For example, formating the hard drive would be a restricted level command... but SUDO Format C: (simplisticly) would allow a restricted user to execute that command.

13 posted on 11/13/2009 2:00:36 PM PST by Swordmaker (Remember, the proper pronunciation of IE is "AAAAIIIIIEEEEEEE!)
[ Post Reply | Private Reply | To 7 | View Replies]

To: Swordmaker

To the extent that it notifies the potential hacker of which accounts they CAN use to gain access, you are correct. But security is always a balance. The trade of being that if you really do need access, it provides you the person to go to and get permission.


14 posted on 11/13/2009 2:04:47 PM PST by taxcontrol
[ Post Reply | Private Reply | To 12 | View Replies]

To: taxcontrol
What they did patent is something that sudo does not do, namely, when an attempt to access an application fails, it presents a list of people who ARE authorized to execute the action.

You are right, sudo does not do this at all. The idea behind sudo was to find a way to preserve system security and still allow users to perform useful tasks. List users who have permission to execute an action gives crackers a road-map to break into the system, which decreases security.

15 posted on 11/13/2009 2:07:31 PM PST by DrDavid (George Orwell was an optimist.)
[ Post Reply | Private Reply | To 4 | View Replies]

To: pikachu
I'm getting an attorney and going after awk.
16 posted on 11/13/2009 2:08:37 PM PST by Ukiapah Heep (Shoes for Industry!)
[ Post Reply | Private Reply | To 2 | View Replies]

To: DrDavid
You are right, sudo does not do this at all. The idea behind sudo was to find a way to preserve system security and still allow users to perform useful tasks. List users who have permission to execute an action gives crackers a road-map to break into the system, which decreases security.

This invention apparently cuts at least half of the security out... given that it was a two step process. One had to input both an authorized user and that user's password. By cutting out the step of knowing the authorized user's name, it makes it that much easier to compromise security. For example, if I know that Joe Blow always uses his Wife's maiden name along with his anniversary date as a password, finding Joe Blow's name on the list of users authorized to execute the command opens the door to me immediately.

17 posted on 11/13/2009 2:12:48 PM PST by Swordmaker (Remember, the proper pronunciation of IE is "AAAAIIIIIEEEEEEE!)
[ Post Reply | Private Reply | To 15 | View Replies]

To: DrDavid
You are right, sudo does not do this at all. The idea behind sudo was to find a way to preserve system security and still allow users to perform useful tasks. List users who have permission to execute an action gives crackers a road-map to break into the system, which decreases security.

This invention apparently cuts at least half of the security out... given that it was a two step process. One had to input both an authorized user and that user's password. By cutting out the step of knowing the authorized user's name, it makes it that much easier to compromise security. For example, if I know that Joe Blow always uses his Wife's maiden name along with his anniversary date as a password, finding Joe Blow's name on the list of users authorized to execute the command opens the door to me immediately.

18 posted on 11/13/2009 2:13:02 PM PST by Swordmaker (Remember, the proper pronunciation of IE is "AAAAIIIIIEEEEEEE!)
[ Post Reply | Private Reply | To 15 | View Replies]

To: Swordmaker

“I just read the patent. It’s not new. “

You graduated from Stanford Law, right?

Seriously, leave patent claim analysis for professionals. Typically patents, like this one, try to capture some very detailed scenarios, not just basic scenario such as “sudo”. The claim 1 is long and includes many limitations that are presumed novel.


19 posted on 11/13/2009 2:14:14 PM PST by heiss
[ Post Reply | Private Reply | To 6 | View Replies]

To: Swordmaker
The scope of protection provided by a patent is defined by the claims, not the description of the drawings. I could file a 100-page patent application describing every aspect of a 1960 Ford Mustang and include 2 pages describing a new invention (lets say a cruise control that automatically adjusts its speed based on neighboring cars). If my claims all describe a car with this type of cruise control, I can get a patent even though most of the patent describes a known car.

Here, claim 1 says:

1. One or more computer-readable media having computer-readable instructions therein that, when executed by a computing device, cause the computing device to present a user interface in response to a task being prohibited based on a user's current account not having a right to permit the task, the user interface comprising: information indicating the task and an entity that attempted the task; a selectable help graphic wherein responsive to receiving selection of the selectable help graphic, the computer-readable instructions further cause the computing device to present the information; identifiers, each of the identifiers identifying other accounts having a right to permit the task, wherein the identifiers presented are based on criteria comprising: frequency of use; association with the user; and indication of sufficient but not unlimited rights; one of the identifiers identifies a higher-rights account having a right to permit the task, wherein the one of the identifiers comprises: a graphic identifying the higher-rights accounts associated with the user; and a name of the higher-rights account; an authenticator region capable of receiving, from the user, an authenticator usable to authenticate the higher-rights account having the right to permit the task, wherein: the authenticator comprises a password, and the authenticator region comprises a data-entry field configured to receive the password.

To invalidate this claim, you would need to show that every single part of this claim was known or suggested by what's been done before.
20 posted on 11/13/2009 2:21:23 PM PST by TexasAg
[ Post Reply | Private Reply | To 19 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-4041-48 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson