Information security – Access control or authentication – Network
Reexamination Certificate
2007-05-31
2010-12-14
Jung, David Y (Department: 2431)
Information security
Access control or authentication
Network
C726S003000, C726S011000
Reexamination Certificate
active
07853992
ABSTRACT:
Implementations of configuring security mechanisms utilizing a trust system are described. In one implementation, a request to communicate is received at a protected device. Before permission to communicate can be granted, a list of trusted devices is accessed. If information, such as an identity or a secret, associated with the device sending the request to communicate correlates to information found on the list of trusted devices, then communication can be allowed. Otherwise, communication between the device and the protected device can be denied.
REFERENCES:
patent: 5204961 (1993-04-01), Barlow
patent: 5968176 (1999-10-01), Nessett et al.
patent: 6304974 (2001-10-01), Samar
patent: 6473791 (2002-10-01), Al-Ghosein et al.
patent: 6968377 (2005-11-01), Gleichauf et al.
patent: 7069438 (2006-06-01), Balabine et al.
patent: 7076655 (2006-07-01), Griffin et al.
patent: 7096498 (2006-08-01), Judge
patent: 7194004 (2007-03-01), Thomsen
patent: 2002/0053032 (2002-05-01), Dowling et al.
patent: 2003/0167405 (2003-09-01), Freund et al.
patent: 2004/0210767 (2004-10-01), Sinclair et al.
patent: 2005/0039051 (2005-02-01), Erofeev
patent: 2006/0143699 (2006-06-01), Nagata et al.
The security of cloud computing system enabled by trusted computing technology; Shen, Zhidong; Tong, Qiang; Signal Processing Systems (ICSPS), 2010 2nd International Conference on vol. 2; Publication Year: 2010 , pp. V2-11-V2-15.
Towards Self-Manageable Cloud Services; Brandic, I.; Computer Software and Applications Conference, 2009. COMPSAC '09. 33rd Annual IEEE International vol. 2; Publication Year: 2009 , pp. 128-133.
Cloud Computing: Issues and Challenges; Dillon, T.; Chen Wu; Chang, E.; Advanced Information Networking and Applications (AINA), 2010 24th IEEE International Conference on Publication Year: 2010 , pp. 27-33.
Almenarez, et al., “PTM: A Pervasive Trust Management Model for Dynamic Open Environments”, available at least as early as Apr. 12, 2007, at <<http://www.pspt.org/camera-ready/p2-almenarez-ptm.pdf>>, pp. 1-8.
Kagal, et al., “Trust-Based Security in Pervasive Computing Environments”, available at least as early as Apr. 12, 2007, at <<http://ebiquity.umbc.edu/—file—directory—/papers/73.pdf>>, Dec. 2001, pp. 2-5.
Saadi, et al., “(Dis)trust Certification Model for Large Access in a Pervasive Environment”, available at least as early as Apr. 12, 2007, <<http://liris.cnrs.fr/publis/pdf/Brunie-2005—liris2288.pdf?id=2288>>, Troubador Publishing Ltd, 2005, pp. 289-299.
Brewer Jason
Garg Neeraj
Panasyuk Anatoliy
Jung David Y
Lee & Hayes PLLC
Microsoft Corporation
LandOfFree
Configuring security mechanisms utilizing a trust system does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Configuring security mechanisms utilizing a trust system, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Configuring security mechanisms utilizing a trust system will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4155323