Data processing: financial – business practice – management – or co – Automated electrical financial or business practice or... – Finance
Reexamination Certificate
2007-06-05
2007-06-05
Chilcot, Jr., Richard E. (Department: 3628)
Data processing: financial, business practice, management, or co
Automated electrical financial or business practice or...
Finance
C709S229000, C713S169000, C713S155000, C705S076000
Reexamination Certificate
active
09800641
ABSTRACT:
A method and data processing apparatus for performing automated trust negotiations between first and second parties connected over a network can include providing each party with a set of credentials. The method also can include classifying one or more credentials in the set of credentials for the first party as sensitive, such that they can only be disclosed to another party subject to certain predetermined criteria. The method further can include establishing negotiations over the network between the first and second parties in order to complete a desired transaction, wherein the transaction is only authorized to proceed if at least one of the parties receives certain predetermined credentials from the other party. Finally, the method can include transmitting at least one of the one or more sensitive credentials from the first party to the second party as part of said negotiations, subject to the first party previously receiving from the second party one or more credentials that satisfy said certain predetermined criteria.
REFERENCES:
patent: 5826245 (1998-10-01), Sandberg-Diment
patent: 0 745 961 (1996-12-01), None
“VerticalNet and VeriSign Sign Strategic Agreement to Deliver Trusted Environment for Online B2B Transactions”; PR Newswire; New York: Dec. 11, 2000. (4 pages).
E. Bina, V. Jones, R. McCool, and M. Winslett, “Secure Access to Data Over the Internet”, Proceedings of the Third ACM/IEEE International Conference on Parallel and Distributed Information Systems, Austin, Texas, Sep. 1994.
M. Blaze, J. Feigenbuam, J. Ioannidis, and A. Keromytis, “The KeyNote Trust Management system”, work in progress, Internet draft, Mar. 1999.
M. Blaze, J. Feigenbuam, and A.D. Keromytis, “KeyNote: Trust Management for Public-Key Infrastructures”, Cambridge 1998 Security Protocols International Workshop, England, 1998.
M. Blaze, J. Feigenbuam, and J. Iacy, “Decentralized Trust Management”, 1996 IEEE Conference on Privacy and Security, Oakland 1996.
N. Ching, V. Jones, and M. Winslett, “Authorization in the Digital Library: Secure Access to Services Across Enterprise Boundaries”, Proceedings of ADL '96—Forum on Research and Technology Advances in Digital Libraries, Washington, DC, May 1996.
T. Dierks, C. Allen, “The TLS Protocol Version 1.0”, Network Working Group, Jan. 1999, http://www.ietf.org/rfc/rfc2246.txt.
A. Frier, P. Karlton, and P. Kocher, “The SSL 3.0 Protocol”, Netscape Communications Corp., Nov. 1996; http://home.netscape.com/eng/ss13/draft302.txt.
N. Li, J. Feigenbaum, and B. Grosof, “A Logic-based Knowledge Representation for Authorization with Delegation” (extended abstract), Proceedings of the 12thComputer Security Foundations Workshop, IEEE Computer Society Press, Los Alamitos, 1999, pp. 162-174.
N. Li, B. Grosof and J. Feigenbaum, “A Practically Implementable and Tractable Delegation Logic”, Proceedings of the 2000 IEEE Symposium on Security and Privacy.
W. Johnston, S. Mudumbai, and M. Thompson, “Authorization and Attribute Certificates for Widely Distributed Access Control”, Proceedings of the IEEE 7thInternational Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises-WETICE '98.
A. Herzberg, J. Mihaeli, Y. Mass, D. Naor, and Y. Ravid, “Access Control Meets Public Key Infrastructure, Or: Assigning Roles to Strangers”, IBM Haifa Research Laboratory, http://www.hrl.il.ibm.com.
“The Trust Policy Language”, IBM Haifa Research Laboratory, http://www.hrl.il.ibm.com/TrustEstablishment/PolicyLanguage.html.
K. Seamons, W. Winsborough, and M. Winslett, “Internet Credential Acceptance Policies”, Proceedings of the 2ndInternational Workshop on Logic Programming Tools for Internet Aplications, Leuven, Belgium, Jul. 1997.
W.Winsborough, K. Seamons, and V. Jones, “Automated Trust Negotiation: Managing Disclosure of Sensitive Credentials”, Transarc Research White Paper, May 1999.
W. Winsborough, K. Seamons, and V. Jones, “Negotiating Disclosure of Sensitive Credentials”, Second Conference on Security in Communication Networks '99, Amalfi, Italy, Sep. 1999.
W. Winsborough, K. Seamons, and V. Jones, “Automated Trust Negotiation”, DARPA Information Survivability Conference and Exposition (DISCEX '2000), Jan. 2000.
M. Winslett, N. Ching, V. Jones, and I. Slepchin, “Using Digital Credentials on the World-Wide Web”, Journal of Computer Security, 5, 1997.
“Simple Public Key Infrastructure (SPKI)”, http://www.ietf.org/html.charters/spki-charter.html.
International Telecommunication Union, Recommendation X.509, “Information Technology—Open Systems Interconnection—The Directory: Authentication Framework”, Aug. 1997.
Seamons Kent E.
Winsborough William H.
Carey Rodriguez Greenberg & Paul LLP
Chilcot Jr. Richard E.
Flynn, Esq. John D.
Greenberg, Esq. Steven M.
International Business Machines - Corporation
LandOfFree
Automated trust negotiation does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Automated trust negotiation, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Automated trust negotiation will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3848793