Analytics
11/16/2009
10:00 AM
Connect Directly
RSS
E-Mail
50%
50%

Does New Microsoft Patent Infringe On Unix Program Sudo?

Some in the open source community suspicious of Microsoft's intent

A patent granted to Microsoft (NSDQ: MSFT) has stirred up worry that world's largest software company wants to claim Unix's "sudo" as its own.

Sudo is a Unix program used to raise a user's privilege level to accomplish tasks that require administrative privileges. It allows a user to temporarily execute commands as the root user.

Microsoft's "Rights elevator" patent describes a way to "enable a user to elevate his or her rights," which of course is what "sudo" does.

This apparent similarity has led some in the open source community, cognizant of Microsoft's past hostility toward open source software, to ask whether the company plans to demand a patent licensing fee from open source vendors.

Microsoft may wish it could do so. If so, it won't say: The company declined to comment.

In any event, the "Rights elevator" patent isn't likely to provide Microsoft with the opportunity to seek such fees.

Michael B. Einschlag, a partner at Rosenlaw & Einschlag, which specializes in open source and intellectual property law, said Microsoft's "Right elevator" patent is narrowly framed to cover the graphic user interface used to present computer privilege elevation.

"It's a description of how to present the information to the user," he said. "It doesn't cover the concept of how the user is trying to accomplish some task."

After reviewing documents covering the patent's history, Einschlag pointed to three specific identifiers that the patent's examiner concluded were necessary for Microsoft's invention to qualify as a patentable innovation: frequency of use; association with the current user; and indication of sufficient but not unlimited rights.

"Fundamentally, it's something to make it easy for users to understand how to upgrade their rights," he said.

In short, suspicions about this patent are overblown.

Previous
1 of 2
Next
Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-6651
Published: 2014-07-31
Multiple directory traversal vulnerabilities in the Vitamin plugin before 1.1.0 for WordPress allow remote attackers to access arbitrary files via a .. (dot dot) in the path parameter to (1) add_headers.php or (2) minify.php.

CVE-2014-2970
Published: 2014-07-31
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-5139. Reason: This candidate is a duplicate of CVE-2014-5139, and has also been used to refer to an unrelated topic that is currently outside the scope of CVE. This unrelated topic is a LibreSSL code change adding functionality ...

CVE-2014-3488
Published: 2014-07-31
The SslHandler in Netty before 3.9.2 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted SSLv2Hello message.

CVE-2014-3554
Published: 2014-07-31
Buffer overflow in the ndp_msg_opt_dnssl_domain function in libndp allows remote routers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted DNS Search List (DNSSL) in an IPv6 router advertisement.

CVE-2014-5171
Published: 2014-07-31
SAP HANA Extend Application Services (XS) does not encrypt transmissions for applications that enable form based authentication using SSL, which allows remote attackers to obtain credentials and other sensitive information by sniffing the network.

Best of the Web
Dark Reading Radio