Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer
Reexamination Certificate
2005-08-23
2005-08-23
Jung, David (Department: 2134)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Protection at a particular protocol layer
C709S201000, C707S793000
Reexamination Certificate
active
06934859
ABSTRACT:
An accessing technique includes a first networked entity having a first security level and a search engine having a second security level. Access is allowed to the first networked entity upon the second security level being equal to or higher than the first security level. Access to the search engine by a user having a third security level is allowed upon the third security level being equal to or higher than the second security level. The search engine and the user may present a digital signature certificate in attempting access of the first networked entity and the search engine respectively. The first networked entity may query a second networked entity to determine the security level of the search engine relative to the first networked entity and the search engine may query the second networked entity to determine the security level of the user relative to the search engine.
REFERENCES:
patent: 5572673 (1996-11-01), Shurts
patent: 5991751 (1999-11-01), Rivette
patent: 0926605 (1999-06-01), None
Securing electronic commerce: reducing the SSL overhead Apostolopoulos, G.; Peris, V.; Pradhan, P.; Saha, D.; Network, IEEE , vol.: 14 , Issue: 4 , Jul.-Aug. 2000, pp. 8-16.
Security server incorporating relay servers for distributed processing environments Imada, M.; Kogiku, I.; Autonomous Decentralized Systems, 1999. Integration of Heterogeneous Systems. Proceedings. The Fourth International Symposium on Mar. 21-23, 1999, pp. 246-251.
Policy based access control framework for large networks Duan Haixin; Wu Jianping; Li Xing; Networks, 2000. (ICON 2000). Proceedings. IEEE International Conference on , Sep. 5-8, 2000, pp. 267-272.
http://www.windowsecurity.com/.
http://www.libertas-solutions.com/solutions/search-engine-promotion/control-search-engine-access.php.
Charles R. Young,A Security Policy for a Profile-Oriented Operating System, May 4, 1981, pp. 273-282.
Northrop Grumman Corporation
Tarolli, Sundheim Covell & Tummino L.L.P.
LandOfFree
Authenticated search engines does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Authenticated search engines, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Authenticated search engines will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3464539