Data processing: financial – business practice – management – or co – Business processing using cryptography – Usage protection of distributed data files
Reexamination Certificate
2008-04-22
2008-04-22
Cheung, Mary D. (Department: 3694)
Data processing: financial, business practice, management, or co
Business processing using cryptography
Usage protection of distributed data files
C713S176000, C707S793000
Reexamination Certificate
active
07363275
ABSTRACT:
Method signatures included in an input program are detected. An access analyzer sequentially analyzes the method signatures and obtains a run-time access right list based on a rule. This rule specifies method signatures and the access rights which may possibly be included in the program so that the method signatures correspond to the access rights, respectively. A comparator compares the run-time access right list with the design-time access right list in width of restriction based on another rule. This rule specifies widths related to restrictions of the access rights which may possibly be included in the program.
REFERENCES:
patent: 5983225 (1999-11-01), Anfindsen
patent: 5983348 (1999-11-01), Ji
patent: 6032216 (2000-02-01), Schmuck et al.
patent: 6092194 (2000-07-01), Touboul
patent: 6205466 (2001-03-01), Karp et al.
patent: 6317868 (2001-11-01), Grimm et al.
patent: 6466983 (2002-10-01), Strazza
patent: 6625603 (2003-09-01), Garg et al.
patent: 6889209 (2005-05-01), Rabin et al.
patent: 2001/0010045 (2001-07-01), Stefik et al.
patent: 2001/0021926 (2001-09-01), Schneck et al.
patent: 2002/0099952 (2002-07-01), Lambert et al.
patent: 2003/0115147 (2003-06-01), Feldman et al.
patent: 2003/0131073 (2003-07-01), Lucovsky et al.
patent: 2003/0188183 (2003-10-01), Lee et al.
Kiely, “Secure NT apps”, Informationweek, n667, pp. 1A-4A, Feb. 2, 1998, ISSN: 8750-6874.
Jensen et al., “Verification of Control Flow Based Security Properties”, May 9, 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy, Oakland, CA, May 9-12, 1999, Proceedings of the IEEE Symposium on Security and Privacy, Los Alamitos, CA, IEEE Comp. Soc., US, pp. 89-103.
Wallach et al., “Understanding Java Stack Inspection”, Proceedings of the 1998 IEEE Symposium on Security and Privacy, Oakland, CA, May 3-6, 1998, IEEE Symposium on Security and Privacy, Los Alamitos, CA, IEEE Computer Soc, US, vol. CONF. 19, May 3, 1998, pp. 52-63.
Gong et al., “Implementing Protection Domains in the Java™ Development Kit 1.2”, Proceedings Internet Society Symposium on Network and Distributed System Security, Mar. 1988.
Gong et al., “Going Beyond the Sandbox: an Overview of the New Security Architecture in the Java™ Development Kit 1.2”, Proceedings of the Usenix Symposium on Internet Technologies and Systems, Dec. 8, 1997, pp. 103-112.
Kojima Hisashi
Torii Satoru
Cheung Mary D.
Fujitsu Limited
Staas & Halsey , LLP
LandOfFree
Access right contradiction detection apparatus and analysis... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Access right contradiction detection apparatus and analysis..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Access right contradiction detection apparatus and analysis... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2751224