Information security – Policy
Reexamination Certificate
2011-03-01
2011-03-01
Lipman, Jacob (Department: 2434)
Information security
Policy
C726S010000, C726S026000, C726S027000, C713S176000
Reexamination Certificate
active
07900239
ABSTRACT:
A computer system has a resource, a verification unit and an execution engine for running a body of program code having an associated signature. A cryptographic key is associated with the resource and when the code is to be loaded into the execution engine a verification operation is run on the signature using the cryptographic key associated with the resource. The execution engine is separate from the resource and when access to the resource is required by the code in the execution engine a further verification operation is conducted on the signature using the cryptographic key associated with the resource. Access to the resource by the code depends upon the result of the verification operation.
REFERENCES:
patent: 5337360 (1994-08-01), Fischer
patent: 6138235 (2000-10-01), Lipkin et al.
patent: 6904523 (2005-06-01), Bialick et al.
patent: 0 969 366 (2000-01-01), None
patent: WO 98 19237 (1998-05-01), None
Gong et al., Going Beyond the Sandbox: An Overview of the New Security Architecture in the Java Development Kit 1.2, Dec. 1997, USENIX Symposium on Internet Technology and Systems, pp. 103-112.
International Search Report dated Jun. 15, 2001.
Lipman Jacob
nCipher Corporation Ltd.
Young & Basile
LandOfFree
Controlling access to a resource by a program using a... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Controlling access to a resource by a program using a..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Controlling access to a resource by a program using a... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2779088