Application level security

Information security – Policy

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S003000, C713S166000

Reexamination Certificate

active

10453873

ABSTRACT:
Techniques for providing application layer security may be facilitated by an arbitrator. In general, in one implementation, an arbitrator may receive a security tender including security requirements for an application, search for security services to fulfill the security requirements, determine whether discovered security services can satisfy the security requirements, and, if security services that can satisfy the security requirements exist, generate a security contract for the application, the security contract specifying how the application is to communicate with the security services that can satisfy the security requirements.

REFERENCES:
patent: 5935248 (1999-08-01), Kuroda
patent: 6892307 (2005-05-01), Wood et al.
patent: 7089584 (2006-08-01), Sharma
Atkinson, Bob, et al., “Web Services Security (WS-Security) Version 1.0,” Apr. 5, 2002, International Business Machines Corporation, Microsoft Corporation, VeriSign, Inc., retrieved from the Internet on Jun. 18, 2004, at http://www-106.ibm.com/developerworks/webservices/library/ws-secure/, 28 pgs.
Avolio, Frederick M., “Firewalls: A Brief History,” 2000, slideshow, retrieved from the Internet at http://www.avolio.com/pres/FirewallsHistory—files/, 18 pgs.
Bellovin, Steven M., “Distributed Firewalls,” ;login:, Nov. 1999, pp. 37-39, retrieved from the Internet on Jun. 18, 2004, at http://www.research.att.com/˜smb/papers/distfw.pdf, 11 pgs.
Box, Don, et al., “Simple Object Access Protocol (SOAP) 1.1: W3C Note, May 8, 2000,” retrieved from the Internet on Jun. 18, 2004, at http://www.w3.org/TR/SOAP, 35 pgs.
Celestial, “A Security Management Architecture for Providing Survivable Security Services in Heterogeneous Networking Environments,” Apr. 1999, retrieved from the Internet at http://projects.anr.mcnc.org/Celestial/Celestial.html, 3 pgs.
Cheswick, Bill, “An Evening with Berferd in Which a Cracker is Lured, Endured, and Studied,” AT&T Bell Laboratories, 1991, retrieved from the Internet at http://www.tracking-hackers.com/papers/berferd.pdf, 11 pgs.
Cisco, “Understanding Internet Security Risks,” retrieved from the Internet on Jun. 18, 2004, at http://www.dtr.com.br/cdrom/cc/cisco/mkt/isol/secur/centr/centr—wp.htm.
CORBA Security, “CORBA Security Conformance Statement,” Nov. 28, 2000, retrieved from the Internet on Aug. 20, 2004, at http://doc.ece.uci.edu/TAO/Security/Conformance.html, 4 pgs.
Ellermann, Uwe, “IPv6 and Firewalls,”DFN-CERT, University of Hamburg, Jun. 1996, retrieved from the Internet on Jun. 22, 2004, at http://www.dfn-cert.de/eng/team/ue/fw/ipv6fw, 15 pgs.
“Ernst & Young and Computer Associates Forge Alliance to Deliver World-Class Information Security and Risk Management Services,” PR Newswire, Apr. 22, 2002, retrieved from the Internet on Jun. 24, 2004, at http://www.prnewswire.com/gh/cnoc/comp/196575.html, 2 pgs.
“Final Report: 13th Annual HIMSS Leadership Survey Sponsored by Superior Consultant Company,” 2002, retrieved from the Internet on Jun. 24, 2004, at http://www.himss.org/2002survey/print—versions.htm, 28 pgs.
Freed, N., “Behavior of and Requirements for Internet Firewalls,” retrieved from the Internet on Jun. 18, 2004, at ftp://ftp.isi.edu/in-notes/rfc2979.txt, 7 pgs.
Hofmann, Markus, et al. “Open Pluggable Edge Services (opes),” retrieved from the Internet on Jun. 18, 2004, at http://www.ietf.org/html.charters/opes-charter.html, 4 pgs.
The Honeynet project, “Know Your Enemy: Statistics,” Jul. 22, 2001, retrieved from the Internet on Jun. 18, 2004, at http://project.honeynet.org/papers/stats, 7 pgs.
Imielinski, Tomasz, et al., “Mobile Wireless Computing: Solutions and Challenges in Data Management,” WINLAB Rutgers University, 1993, retrieved from the Internet at http://citeseer.ist.psu.edu/cache/papers/cs/269/ftp:zSzzSzwww.cs.rutgers.eduzSzpubzSztechnical-reportszSzdcs-tr-296.pdf/imielinski93mobile.pdf, 38 pgs.
Ipsec IETF working group, “IP Security Protocol (ipsec),” retrieved from the Internet on Jun. 22, 2004, at http://www.jetf.org/html.charters/ipsec-charter.html, 3 pgs.
“IP Spoofing Demystified,” Jun. 1996, retrieved from the Internet on Jun. 18, 2004, at http://ftp.cdut.edu.cn/pub/document/book/IP-spoof.pdf, 12 pgs.
Julian, Ted, et al., “The Forrester Report: Turning Security On Its Head,” Forrester Research Inc., Jan. 1999, retrieved from the Internet on Nov. 16, 2004, at http://www.atstake.com/company—info/acrobat/turning—security—on—head.pdf, 15 pgs.
Kaspersky Labs, “‘Worm’ Crawls into the KaZaA Network,” May 18, 2002, retrieved from the Internet on Jun. 18, 2004, at http://www.kaspersky.com
ews.html?id=738605, 1 pg.
Keadle, Laura, “Comparison Shopping For Scalable Firewall Products,” SANS Institute, Aug. 13, 2001, retrieved from the Internet at http://rr.sans.org/firewall/shopping.php, 9 pgs.
Kelly, Kevin, “New Rules for the New Economy: 10 Radical Strategies for a Connected World,” Viking, 1998, retrieved from the Internet on Jun. 24, 2004, at http://www.kk.org
ewrules, 101 pgs.
King, Steve, et al., “The Case for IPv6,” Internet Architecture Board, Dec. 25, 1999, retrieved from the Internet on Jun. 22, 2004, at http://www.6bone.net/misc/case-for-ipv6.html, 50 pgs.
Leiner, Barry M., et al., “The Past and Future History of the Internet,”Communications of the ACM, Feb. 1997, vol. 40, No. 2, pp. 102-108.
McCurley, Kevin S., “Cryptography and the Internet: Lessons and Challenges,” abstract for an invited talk at AsiaCrypt '96, retrieved from the Internet on Jun. 22, 2004, at http://www.swcp.com/˜mccurley/pubs/outline.html, 6 pgs.
Meadows, Catherine, “A Formal Framework and Evaluation Method for Network Denial of Service,” PCSFW: Proceedings of the 12th Computer Security Foundations Workshop, 1999, retrieved from the Internet at http://chacs.nrl.navy.mil/publications/CHACS/1999/1999meadows-CSFW99.pdf, 11 pgs.
Morrissey, Peter, “Follow the Mellow Brick Road,” Lucent Technical Material, Network Computing Magazine, Nov. 12, 2001, retrieved from the Internet at http://ww.lucent.com/livelink/220746—TechnicalMaterial.pdf, 4 pgs.
Oasis, “Technical Overview of the OASIS Security Assertion Markup Language (SAML) V1.1,” May 11, 2004, retrieved from the Internet on Jun. 22, 2004, at http://www.oasis-open.org/committees/security/#documents, 19 pgs.
Odlyzko, Andrew, “The History of Communications and its Implications for the Internet,” AT&T Labs—Research, Jun. 16, 2000, retrieved from the Internet at http://www.dtc.umn.edu/˜odlyzko/doc/history.communications0.pdf, 160 pgs.
Perkins, Charles E., et al., “Mobility Support in IPv6,”Proceedings of the Second Annual International Conference on Mobile Computing and Networking(MobiCom '96), Nov. 10-12, 1996, New York, USA, retrieved from the Internet on Jun. 24, 2004, at http://www.monarch.cs.cmu.edu/monarch-papers/mobicom96.ps, 11 pgs.
Posegga, Joachim, et al., “Wireless Internet Security,” Informatik Spektrum, Dec. 24, 2001, pp. 383-386 [translation provided].
Ranum, Marcus J., “Thinking about Firewalls,” Digital Equipment Corporation, Washington Open Systems Resource Center, 1994, 10 pgs., retrieved from the Internet on Jun. 24, 2004, at http://www.deter.com/unix/papers/firewalls—ranum.pdf.
“Squid Web proxy Cache,” retrieved from the Internet on Jun. 18, 2004, at http://www.squid-cache.org, 12 pgs.
Richmond, Robert, “Personal Firewall Comparison,” Nov. 4, 2000, retrieved from the Internet on Jun. 18, 2004, at http://www.sysopt.com/reviews/firewall, 23 pgs.
Schiller, Jeffrey I., “Encryption and Security Requirements for IETF Standard Protocols,” Jul. 2001, retrieved from the In

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Application level security does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Application level security, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Application level security will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3897928

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.