Provisional administrator privileges

ABSTRACT

A system grants “provisional privileges” to a user request for the purpose of provisionally performing a requested transaction. If the provisionally-performed transaction does not put the system in a degraded state, the transaction is authorized despite the user request having inadequate privileges originally.

RELATED APPLICATIONS

This Application is a Continuation of and claims priority from U.S.patent application Ser. No. 14/107,211 that was filed on Dec. 16, 2013,and that is a Continuation of U.S. patent application Ser. No.13/478,107 (U.S. Pat. No. 8,613,077) that was filed on May 23, 2012,(issued on Dec. 17, 2013) and that is a Continuation of U.S. patentapplication Ser. No. 12/958,186 (U.S. Pat. No. 8,196,196) that was filedon Dec. 1, 2010, (issued on Jun. 5, 2012) and that is a Continuation ofU.S. patent application Ser. No. 11/654,949 (U.S. Pat. No. 7,865,949)that was filed on Jan. 18, 2007, (issued on Jan. 4, 2011), each of whichis incorporated herein by reference in its entirety.

BACKGROUND

Modern computing systems enforce security and control by assigningdifferent privileges that are required to perform certain actions. Forexample, a user of a computer system may require “administrator”privileges to install new software. In contrast, a lesser level ofsecurity, perhaps “user” privileges, may be all that is necessary tolaunch the program once it is installed. Very many operations requireheightened privileges, such as new software activation or licensing.

Software developers and administrators are plagued by the conflictbetween empowering users with sufficient privileges to perform theirdesired tasks without hindrance, and preventing users from eithermaliciously or negligently harming a computer system. In other words,the more privileges a user has, the fewer hurdles the user will facewhile computing, but the greater the risk of damaging the computingsystem.

An adequate solution to this problem has eluded those skilled in theart, until now.

SUMMARY

The invention is directed generally at provisional privileges in acomputing system. Generally stated, a user request to perform atransaction is evaluated to determine if the user possesses an adequateprivilege level. If not, the transaction is evaluated to determine if itcan be performed without adversely affecting the computing system. Ifso, the transaction is authorized despite the user's inadequateprivileges.

BRIEF DESCRIPTION OF THE DRAWINGS

Many of the attendant advantages of the invention will become morereadily appreciated as the same becomes better understood with referenceto the following detailed description, when taken in conjunction withthe accompanying drawings, briefly described here.

FIG. 1 is a functional block diagram generally illustrating functionalcomponents of an execution environment 101 for providing provisionaladministrator privileges, in accordance with one embodiment of theinvention.

FIG. 2 is a functional block diagram of an exemplary computing devicethat may be used to implement one or more embodiments of the invention.

FIG. 3 is an operational flow diagram generally illustrating the howeach component cooperates in a system for providing provisionaladministrator privileges.

FIG. 4 is an operational flow diagram generally illustrating steps in aprocess for granting provisional privileges for a requested transaction,in accordance with one embodiment.

Embodiments of the invention will now be described in detail withreference to these Figures in which like numerals refer to like elementsthrough-out.

DETAILED DESCRIPTION OF THE DRAWINGS

Various embodiments are described more fully below with reference to theaccompanying drawings, which form a part hereof, and which show specificexemplary implementations for practicing various embodiments. However,other embodiments may be implemented in many different forms and shouldnot be construed as limited to the embodiments set forth herein; rather,these embodiments are provided so that this disclosure will be thoroughand complete. Embodiments may be practiced as methods, systems ordevices. Accordingly, embodiments may take the form of a hardwareimplementation, an entirely software implementation, or animplementation combining software and hardware aspects. The followingdetailed description is, therefore, not to be taken in a limiting sense.

The logical operations of the various embodiments are implemented (1) asa sequence of computer implemented steps running on a computing systemand/or (2) as interconnected machine modules within the computingsystem. The implementation is a matter of choice dependent on theperformance requirements of the computing system implementing theembodiment. Accordingly, the logical operations making up theembodiments described herein are referred to alternatively asoperations, steps or modules.

Generally stated, the described embodiments include mechanisms andtechniques for granting “provisional privileges” to a user request forthe purpose of provisionally performing a transaction. If theprovisionally-performed transaction does not put the system in adegraded state, the transaction is authorized despite the user requesthaving inadequate privileges originally.

Illustrative Systems

The principles and concepts will first be described with reference to asample system that implements certain embodiments of the invention. Thissample system may be implemented using conventional or special purposecomputing equipment programmed in accordance with the teachings of theseembodiments.

FIG. 1 is a functional block diagram generally illustrating functionalcomponents of an execution environment 101 for providing provisionalprivileges. Generally stated, the execution environment 101 is asoftware environment executing on a host computer. The componentsillustrated in FIG. 1 are illustrative only and are provided for thepurpose of describing the functionality implemented in one embodiment.Many other embodiments may be implemented with components that differ indetail from those described here.

By way of background, when an individual logs on to a computer, theexecution environment 101 creates a user process 111 that is grantedprivileges 112 that have been assigned to the individual's user account.The privileges 112 define how much execution authority the user process111 has in the execution environment 101. In other words, the privileges112 specify what system resources, such as executable or data files, theuser process 111 can modify or access. In one example, the individualmay have the responsibility of administering the execution environment101. Accordingly, that individual may have a user account withadministrative privileges to allow the user process 111 to perform anydesired task on the system resources of the execution environment 101.Alternatively, the individual may be a common user with only sufficientprivileges 112 to execute installed applications and modify the user'sown personal data. Many other sets of privileges are also possible.

Accordingly, the user requests 110 are operations or applications thatare executing at the initiation of a user. The user requests 110represent any transaction that has been initiated by the user process111. Very frequently, transactions involve accessing and/or modifyingsystem resources. Examples of a transaction include an attempt toinstall software, an attempt to validate or authorize an existingsoftware installation, an attempt to remove or modify installedsoftware, an attempt to access or modify user data, an attempt to accessor modify privileged resources 113, an attempt to access or modifyaccessible resources 114, and the like. “System resources” may be anyfile, data stream, address location, register, hardware device, or othercomputer-readable component of the execution environment 101 or its hostcomputer. System resources commonly include executable files orlibraries, scripts, system registries, other configuration files, userdata, program data, log files, and the like. In addition, systemresources may include other files or information used by the system inconjunction with managing and operating the execution environment 101.

Privileged resources 113 represent any system resources for which theuser process 111 does not have sufficient privileges 112 to satisfy theuser request 110. For example, privileged resources 113 may includesystem configuration files or other data stores with configurationinformation about the execution environment 101 and which requireadministrator privileges to access but the user only has limitedprivileges. In one specific example, the privileged resources 113 mayinclude activation or licensing information about software or componentsthat are installed in the execution environment 101. In another example,the privileged resources 113 may be personal data associated with a useraccount other than the user account with which the user process 111 isassociated. In still another example, the privileged resources 113 mayinclude resources that are modified by installing new software oractivating newly installed software if the user process 111 does nothave sufficient privileges 112 to perform those transactions.

Accessible resources 114 represent any system resources that the userprocess 111 can access, meaning the user process 111 does havesufficient privileges 112 to satisfy the user request 110. For example,accessible resources 114 may include personal data files owned by theuser account with which the user process 111 is associated. In anotherexample, accessible resources 114 may include executable files that areknown to be safe for execution by the user process 111. In still anotherexample, the accessible resources 114 may include resources that aremodified by installing new software or activating newly installedsoftware, but only if the user process 111 has sufficient privileges 112to perform those transactions.

A snapshot service 118 is operative to capture “snapshots” 120 ofaccessible resources 114 and/or privileged resources 113. Generallystated, a snapshot is a copy (or virtual copy) of data as it existed ata particular moment in time. Snapshots are often used for versioncontrol and for system maintenance. Accordingly, the snapshot service118 is used to create snapshots 120 which each reflect a given state ofsystem resources at a particular time.

Transaction filters 132 describe certain transactions that may beperformed with provisional privileges. For the purpose of thisdiscussion, the term “provisional privileges” means a heightened set ofprivileges over those actually associated with a user's account, butwhich will only be made available to user requests 110 for particulartransactions that will not put the execution environment 101 in adegraded state. There may be multiple transaction filters 132, with eachtransaction filter being associated with a particular type or class oftransaction. For example, one transaction filter 132 may be associatedwith a user request 110 to install software applications. Anothertransaction filter 132 may be associated with a user request 110 toactivate installed software. Yet another transaction filter 132 may beassociated with a user request 110 to modify certain important systemresources, such as a system registry.

As described in greater detail below, each transaction filter 132includes data that specifies operations or changes in state that wouldinvalidate the provisional privileges for that transaction. For example,a particular transaction could necessarily involve access to certainportions of a system registry, but should not involve access to otherportions of the registry. An attempt to access the other portions wouldconstitute an invalidating operation. In another example, a transactionthat changed the state of installed software from authorized (orlicensed) to unauthorized (or unlicensed) could be considered aninvalidating operation.

A transaction manager 130 is included to administer the provisionalprivileges in accordance with this particular embodiment. Thetransaction manager 130 evaluates user requests 110 for the privileges112 that are assigned to the requesting user process 111. In cases wherethe assigned privileges 112 are insufficient to perform the requestedtransaction, the transaction manager 130 is configured to determine if atransaction filter 132 is available that corresponds with the requestedtransaction. If so, the transaction manager 130 provisionally authorizesthe transaction, despite the privileges 112 being insufficient.“Provisionally authorizing” the transaction refers to attempting toperform the transaction as requested, but without actually committingthe transaction or without permanently affecting any resources. Simplyput, the provisionally authorized transaction could be viewed as a “dryrun” or “dress rehearsal.” As the user request 110 performs theprovisionally authorized transaction, the transaction manager 130continually monitors the progress to determine if the user request 110performs an invalidating operation, as specified in the transactionfilters 132.

The transaction manager 130 interacts with the snapshot service 118 tocapture snapshots 120 of the privileged resources 113. It should benoted that for the purpose of the snapshot 120, the privileged resources113 may be fewer than all the possible system resources that the userprocess has insufficient privileges to access, if only a limited set ofsystem resources will be accessible with the provisional privileges. Inother words, the privileged resources 113 need not necessarily representall the system resources that are inaccessible to the user process 111based on the current privileges 112.

The snapshots 120 may be taken prior to provisionally authorizing theuser request 110 and again after the user request 110 has completed thetransaction. The transaction manager 130 may compare the pre-transactionand post-transaction snapshots 120 to determine if authorizing therequested transaction would put the system in a degraded state. Thedegraded state could be specified in the transaction filters 132 (orelsewhere). For the purpose of this discussion, the “degraded state”could involve any one or more of many different situations, such as thesystem (or any constituent component) becoming unstable, unusable,bloated, excessively large, suffering from unacceptable or unintendeddata loss, improper modification of another user's data, or anyotherwise compromised condition.

If a provisionally authorized user request 110 does not perform aninvalidating operation or put the system in a degraded state, thetransaction manager 130 may affirm the transaction. In one example,affirming the transaction may constitute actually committing changesmade by the user request 110. In another example, affirming thetransaction may constitute instructing the user request 110 tore-perform the transaction without limitations. In still anotherexample, affirming the transaction may constitute simply not rollingback the system to its pre-transaction state. Still other examples willbe apparent to those skilled in the art.

FIG. 2 is a functional block diagram of an exemplary computing device200 that may be used to implement one or more embodiments of theinvention. The computing device 200, in one basic configuration,includes at least a processing unit 202 and memory 204. Depending on theexact configuration and type of computing device, memory 204 may bevolatile (such as RAM), non-volatile (such as ROM, flash memory, etc.)or some combination of the two. This basic configuration is illustratedin FIG. 2 by dashed line 206.

Additionally, device 200 may also have other features and functionality.For example, device 200 may also include additional storage (removableand/or non-removable) including, but not limited to, magnetic or opticaldisks or tape. Such additional storage is illustrated in FIG. 2 byremovable storage 208 and non-removable storage 210. Computer storagemedia includes volatile and nonvolatile, removable and non-removablemedia implemented in any method or technology for storage of informationsuch as computer readable instructions, data structures, program modulesor other data. Memory 204, removable storage 208 and non-removablestorage 210 are all examples of computer storage media. Computer storagemedia includes, but is not limited to, RAM, ROM, EEPROM, flash memory orother memory technology, CD-ROM, digital versatile disks (DVD) or otheroptical storage, magnetic cassettes, magnetic tape, magnetic diskstorage or other magnetic storage devices, or any other medium which canbe used to store the desired information and which can accessed bydevice 200. Any such computer storage media may be part of device 200.The term “computer storage medium” (and the like) as used herein refersspecifically to a statutory article of manufacture.

Computing device 200 includes one or more communication connections 214that allow computing device 200 to communicate with one or morecomputers and/or applications 213. Device 200 may also have inputdevice(s) 212 such as keyboard, mouse, pen, voice input device, touchinput device, etc. Output device(s) 211 such as a monitor, speakers,printer, PDA, mobile phone, and other types of digital display devicesmay also be included. These devices are well known in the art and neednot be discussed at length here.

Illustrative Processes

The principles and concepts will now be described with reference tosample processes that may be implemented by a computing device, such asthe computing device illustrated in FIG. 2, in certain embodiments ofthe invention. The processes may be implemented usingcomputer-executable instructions in software or firmware, but may alsobe implemented in other ways, such as with programmable logic,electronic circuitry, or the like. In some alternative embodiments,certain of the operations may even be performed with limited humanintervention. Moreover, the process is not to be interpreted asexclusive of other embodiments, but rather is provided as illustrativeonly.

FIG. 3 is an operational flow diagram generally illustrating the howeach component cooperates in a system for providing provisionaladministrator privileges. The operations begin at block 301, where auser process initiates a transaction by issuing a request to perform thetransaction. In accordance with this implementation, the user processdoes not have sufficient privileges to perform the requestedtransaction. For example, the user process may only have limited userprivileges while administrator or other heightened privileges arenecessary to perform the transaction. Accordingly, the systemprovisionally grants the user process sufficient privileges in order todetermine if allowing the transaction to proceed would compromise thesystem in any way.

At block 302, a set of pre-transaction filters may be applied to therequested transaction. The pre-transaction filters are transactionfilters as described above in conjunction with FIG. 1. However, in thisparticular implementation, certain transaction filters may be applied tothe requested transaction prior to actually allowing any operations tobe performed. These pre-transaction filters may be used to determine ifthe requested transaction is at all possible regardless of what statethe system may be in later. For example, the user process may havelimited user privileges while requesting a transaction that requiresadministrative privileges. The pre-transaction filter may be configuredto only allow users with heightened privileges to attempt thetransaction. Accordingly, the limited-rights user would not be allowedto perform the transaction even with provisional privileges.Accordingly, the pre-transaction filter would immediately terminate thetransaction.

At block 303, a baseline snapshot 320 is prepared. The baseline snapshot320 represents a copy of the system state immediately prior toperforming the various operations of the transaction. Capturing thebaseline snapshot 320 provides the system with knowledge about exactlywhat state the system is in prior to performing the transaction. Itshould be noted that reference to the “system state” should beunderstood as possibly being only the relevant system state or a subsetof the entire system state. In particular, the system state which iscaptured could be the state of the elements of interest to thisparticular transaction attempt. For example, for licensing relatedoperations, elements such as current disk free space, current licensingstate, license store size, and the like would be relevant, but elementssuch as current screen resolution or current sound volume would likelynot be relevant. Accordingly, the baseline snapshot 320 could representonly a subset of the entire system state, or it could alternativelyrepresent the entire system state.

At block, 304, the various detailed operations of the requestedtransaction are performed. It should be appreciated that the operationsmay not be performed in fact. Rather, the operations may be simulated inorder to determine their effect on the system and its resources.Alternatively, the operations could actually be performed if doing so isa reversible process.

At block 305, as each of the various operations of the transaction isbeing performed, it may be tested against an intra-transaction filter todetermine if any of the operations constitutes an invalidatingoperation. As with the pre-transaction filters, the intra-transactionfilters are transaction filters that describe what operations andmodifications may be performed while provisionally executing atransaction. Examples of intra-transaction filters may includeidentifying a certain set of resources that may be modified by thetransaction, and any attempt to modify or access a resource outside thatset constitutes an invalidating operation.

At block 306, an updated snapshot 321 is prepared after the operationsof the transaction are complete (e.g., have been completely simulated).The updated snapshot 321 represents a copy of the system stateimmediately after performing the various operations of the transactionif the transaction were in fact authorized. Capturing the updatedsnapshot 321 provides the system with knowledge about exactly what statethe system would be in after performing the transaction.

At block 307, the baseline snapshot 320 and the updated snapshot 321 areevaluated using post-transaction filters to determine if the completedtransaction would put the system in a degraded state. Thepost-transaction filters are also transaction filters as describedabove. However, the post-transaction filters specify circumstances orcriteria that determine if the state of the system would be degraded byperforming the transaction. In one example, the post-transaction filtersmay compare the baseline snapshot 320 to the updated snapshot 321 toidentify the changes made by provisionally performing the transaction.The post-transaction filters may include or identify specificmodifications that are allowed, classes of modifications that areallowed, specific modifications that are disallowed, classes ofmodifications that are disallowed, specific characteristics of thesystem state that should not be changed, and the like.

At block 308, if the determination at block 307 is positive, meaningthat the system state is not degraded, the provisionally authorizedtransaction is committed. Committing the transaction depends on theparticular technique applied for provisionally executing thetransaction. For example, if the transaction were merely simulated, thenthe transaction could be repeated without limitations. If thetransaction was actually performed, then the changes that were madecould simply be accepted and any limitations removed. These and otheralternatives will be appreciated by those skilled in the art.

It should also be noted that in the event that the determination atblock 307 is negative, meaning that the transaction would put the systemin a degraded state, then the transaction could be undone. For example,the system could be rolled back to its pre-transaction state, perhapsusing the baseline snapshot. Alternatively, the user process couldsimply be returned an error and disallowed to actually perform thetransaction.

FIG. 4 is an operational flow diagram generally illustrating steps in asample process 400 for granting provisional privileges for a requestedtransaction, in accordance with one embodiment. The process 400 isperformed by a system, sub-system, or component of a computing system.

At block 401, the process 400 begins when a user process requests atransaction. The user process includes privileges. In this example, theprivileges are insufficient to perform the transaction. The transactionmay be any operation that is performed programmatically on a computingdevice.

At block 403, a determination is made whether the user process includesthe appropriate privileges to perform the transaction. In one example,the transaction may require administrator privileges, so the process 400determines if the user has administrative privileges. If so, then atblock 404, the transaction is authorized.

At block 405, if the user does not have the appropriate privileges toperform the requested transaction, then a set of pre-transaction filtersis evaluated to determine if provisional privileges could possiblyresult in a successful transaction. If not, then at block 406, therequested transaction is denied and the user process is informed of thefailure.

At block 407, if the request does not fail the pre-transaction filters,then a baseline snapshot is captured. The baseline snapshot representsthe state of the system prior to attempting the transaction.

At blocks 408 and 409, as each of the operations of the transaction areattempted (block 408), intra-transaction filters are evaluated (block409) to determine if any operations performed during the transactioninvalidate the provisional privileges. If any intra-transaction filtersare violated while attempting the transaction, the process 400 proceedsto block 406, where the transaction is failed and the user is notified.Blocks 408 and 409 iterate until the transaction is complete.

At block 411, if attempting the transaction does not violate anyintra-transaction filters, then an update snapshot is captured. Theupdate snapshot represents the state of the system if the transaction isactually authorized.

At block 413, the update snapshot is compared to the baseline snapshotto determine if the system state has been degraded by attempting thetransaction. If not, the transaction is actually authorized at block404. If the system state would be degraded, the transaction is denied atblock 406 and the user is informed of the failure.

Although the subject matter has been described in language specific tostructural features and/or methodological acts, it is to be understoodthat the subject matter defined in the appended claims is notnecessarily limited to the specific features or acts described above.Rather, the specific features and acts described above are disclosed asexample forms of implementing the claims.

1. A method performed on at least one computing device, the methodcomprising: performing, by the at least one computing device, one ormore portions of a transaction that were requested with privileges thatare insufficient for performing the one or more portions of thetransaction.
 2. The method of claim 1 where the performed one or moreportions of the transaction comprise the transaction in its entirety. 3.The method of claim 1 where others of the one or more portions of thetransaction are simulated as opposed to being performed.
 4. The methodof claim 1 further comprising determining whether or not the requestedone or more portions of the transaction, once performed, would put thesystem into a degraded state.
 5. The method of claim 4 where thedetermining is based on states of the at least one computing devicebefore and after the performing.
 6. The method of claim 4 furthercomprising committing, based on the determining that the requested oneor more portions of the transaction, once performed, would not put thesystem into a degraded state, the performed one or more portions of therequested transaction in spite of the insufficient privileges.
 7. Themethod of claim 4 further comprising rolling-back, based on thedetermining that the requested one or more portions of the transaction,once performed, would put the system into a degraded state, theperformed one or more portions of the requested transaction.
 8. At leastone computing device comprising: a processing unit; memory coupled tothe processing unit; a transaction manager implemented at least in partby the processing unit and configured to perform one or more portions ofa transaction that were requested with privileges that are insufficientfor performing the one or more portions of the transaction.
 9. The atleast one computing device of claim 8 where the performed one or moreportions of the transaction comprise the transaction in its entirety.10. The at least one computing device of claim 8 where others of the oneor more portions of the transaction are simulated as opposed to beingperformed.
 11. The at least one computing device of claim 8, thetransaction manager further configured to determine whether or not therequested one or more portions of the transaction, once performed, wouldput the system into a degraded state.
 12. The at least one computingdevice of claim 11 where the transaction manager determines based onstates of the at least one computing device before and after theperforming.
 13. The at least one computing device of claim 11, thetransaction manager further configured to commit, based on determiningthat the requested one or more portions of the transaction, onceperformed, would not put the system into a degraded state, the performedone or more portions of the requested transaction in spite of theinsufficient privileges.
 14. The at least one computing device of claim11, the transaction manager further configured to roll-back, based onthe determining that the requested one or more portions of thetransaction, once performed, would put the system into a degraded state,the performed one or more portions of the requested transaction.
 15. Atleast one computer storage device storing computer-executableinstructions that, based on execution by at least one computing device,configure the at least one computing device to perform actionscomprising: performing one or more portions of a transaction that wererequested with privileges that are insufficient for performing the oneor more portions of the transaction.
 16. The at least one computerstorage device of claim 15 where the performed one or more portions ofthe transaction comprise the transaction in its entirety, or whereothers of the one or more portions of the transaction are simulated asopposed to being performed.
 17. The at least one computer storage deviceof claim 15, the actions further comprising determining whether or notthe requested one or more portions of the transaction, once performed,would put the system into a degraded state.
 18. The at least onecomputer storage device of claim 17 where the determining is based onstates of the at least one computing device before and after theperforming.
 19. The at least one computer storage device of claim 17,the actions further comprising committing, based on the determining thatthe requested one or more portions of the transaction, once performed,would not put the system into a degraded state, the performed one ormore portions of the requested transaction in spite of the insufficientprivileges.
 20. The at least one computer storage device of claim 17,the actions further comprising rolling-back, based on the determiningthat the requested one or more portions of the transaction, onceperformed, would put the system into a degraded state, the performed oneor more portions of the requested transaction.