Automated trust negotiation

Data processing: financial – business practice – management – or co – Automated electrical financial or business practice or... – Finance

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C709S229000, C713S169000, C713S155000, C705S076000

Reexamination Certificate

active

09800641

ABSTRACT:
A method and data processing apparatus for performing automated trust negotiations between first and second parties connected over a network can include providing each party with a set of credentials. The method also can include classifying one or more credentials in the set of credentials for the first party as sensitive, such that they can only be disclosed to another party subject to certain predetermined criteria. The method further can include establishing negotiations over the network between the first and second parties in order to complete a desired transaction, wherein the transaction is only authorized to proceed if at least one of the parties receives certain predetermined credentials from the other party. Finally, the method can include transmitting at least one of the one or more sensitive credentials from the first party to the second party as part of said negotiations, subject to the first party previously receiving from the second party one or more credentials that satisfy said certain predetermined criteria.

REFERENCES:
patent: 5826245 (1998-10-01), Sandberg-Diment
patent: 0 745 961 (1996-12-01), None
“VerticalNet and VeriSign Sign Strategic Agreement to Deliver Trusted Environment for Online B2B Transactions”; PR Newswire; New York: Dec. 11, 2000. (4 pages).
E. Bina, V. Jones, R. McCool, and M. Winslett, “Secure Access to Data Over the Internet”, Proceedings of the Third ACM/IEEE International Conference on Parallel and Distributed Information Systems, Austin, Texas, Sep. 1994.
M. Blaze, J. Feigenbuam, J. Ioannidis, and A. Keromytis, “The KeyNote Trust Management system”, work in progress, Internet draft, Mar. 1999.
M. Blaze, J. Feigenbuam, and A.D. Keromytis, “KeyNote: Trust Management for Public-Key Infrastructures”, Cambridge 1998 Security Protocols International Workshop, England, 1998.
M. Blaze, J. Feigenbuam, and J. Iacy, “Decentralized Trust Management”, 1996 IEEE Conference on Privacy and Security, Oakland 1996.
N. Ching, V. Jones, and M. Winslett, “Authorization in the Digital Library: Secure Access to Services Across Enterprise Boundaries”, Proceedings of ADL '96—Forum on Research and Technology Advances in Digital Libraries, Washington, DC, May 1996.
T. Dierks, C. Allen, “The TLS Protocol Version 1.0”, Network Working Group, Jan. 1999, http://www.ietf.org/rfc/rfc2246.txt.
A. Frier, P. Karlton, and P. Kocher, “The SSL 3.0 Protocol”, Netscape Communications Corp., Nov. 1996; http://home.netscape.com/eng/ss13/draft302.txt.
N. Li, J. Feigenbaum, and B. Grosof, “A Logic-based Knowledge Representation for Authorization with Delegation” (extended abstract), Proceedings of the 12thComputer Security Foundations Workshop, IEEE Computer Society Press, Los Alamitos, 1999, pp. 162-174.
N. Li, B. Grosof and J. Feigenbaum, “A Practically Implementable and Tractable Delegation Logic”, Proceedings of the 2000 IEEE Symposium on Security and Privacy.
W. Johnston, S. Mudumbai, and M. Thompson, “Authorization and Attribute Certificates for Widely Distributed Access Control”, Proceedings of the IEEE 7thInternational Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises-WETICE '98.
A. Herzberg, J. Mihaeli, Y. Mass, D. Naor, and Y. Ravid, “Access Control Meets Public Key Infrastructure, Or: Assigning Roles to Strangers”, IBM Haifa Research Laboratory, http://www.hrl.il.ibm.com.
“The Trust Policy Language”, IBM Haifa Research Laboratory, http://www.hrl.il.ibm.com/TrustEstablishment/PolicyLanguage.html.
K. Seamons, W. Winsborough, and M. Winslett, “Internet Credential Acceptance Policies”, Proceedings of the 2ndInternational Workshop on Logic Programming Tools for Internet Aplications, Leuven, Belgium, Jul. 1997.
W.Winsborough, K. Seamons, and V. Jones, “Automated Trust Negotiation: Managing Disclosure of Sensitive Credentials”, Transarc Research White Paper, May 1999.
W. Winsborough, K. Seamons, and V. Jones, “Negotiating Disclosure of Sensitive Credentials”, Second Conference on Security in Communication Networks '99, Amalfi, Italy, Sep. 1999.
W. Winsborough, K. Seamons, and V. Jones, “Automated Trust Negotiation”, DARPA Information Survivability Conference and Exposition (DISCEX '2000), Jan. 2000.
M. Winslett, N. Ching, V. Jones, and I. Slepchin, “Using Digital Credentials on the World-Wide Web”, Journal of Computer Security, 5, 1997.
“Simple Public Key Infrastructure (SPKI)”, http://www.ietf.org/html.charters/spki-charter.html.
International Telecommunication Union, Recommendation X.509, “Information Technology—Open Systems Interconnection—The Directory: Authentication Framework”, Aug. 1997.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Automated trust negotiation does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Automated trust negotiation, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Automated trust negotiation will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3848793

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.