Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Security kernel or utility
Reexamination Certificate
2011-04-26
2011-04-26
Lanier, Benjamin E (Department: 2432)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Security kernel or utility
C726S007000, C726S026000, C726S027000, C705S051000
Reexamination Certificate
active
07934091
ABSTRACT:
A technique for establishing a perimeter of accountability for usage of digital assets such as data files. The accountability model not only tracks authorized users' access to files, but monitors passage of such files to uncontrollable removable storage media or through network connections and the like which may indicate possible abuse of access. In accordance with a preferred embodiment, an autonomous independent agent process running at a point of use, such as in the background of a client operating system kernel, interrupts requests for access to resources. The agent process senses low level system events, filters, aggregates them, and makes reports to a journaling server. The journaling server analyzes sequences of low level events to detect when aggregate events of interest occur, such as “FileEdit”, network file transfers and the like. Reports can be generated to provide an understanding of how digital assets have been accessed, used or communicated by individuals in an enterprise.
REFERENCES:
patent: 5032979 (1991-07-01), Hecht et al.
patent: 5666411 (1997-09-01), McCarty
patent: 5692124 (1997-11-01), Holden et al.
patent: 5897635 (1999-04-01), Torres et al.
patent: 6118862 (2000-09-01), Dorfman et al.
patent: 6163506 (2000-12-01), Mundy
patent: 6192403 (2001-02-01), Jong et al.
patent: 6427140 (2002-07-01), Ginter et al.
patent: 6510513 (2003-01-01), Danieli
patent: 6678883 (2004-01-01), Berry et al.
patent: 6754890 (2004-06-01), Berry et al.
patent: 6839896 (2005-01-01), Coffman et al.
patent: 6990513 (2006-01-01), Belfiore et al.
patent: 7100047 (2006-08-01), Stamos et al.
patent: 7165174 (2007-01-01), Ginter et al.
patent: 7281011 (2007-10-01), Bradley et al.
patent: 7281020 (2007-10-01), Fine
patent: 7409547 (2008-08-01), Stamos et al.
patent: 7454462 (2008-11-01), Belfiore et al.
patent: 7472272 (2008-12-01), Stamos et al.
patent: 7814021 (2010-10-01), Stamos et al.
patent: 2001/0042043 (2001-11-01), Shear et al.
patent: 2002/0002609 (2002-01-01), Chung et al.
patent: 2002/0118220 (2002-08-01), Lui et al.
patent: 2002/0120685 (2002-08-01), Srivastava et al.
patent: 2002/0161766 (2002-10-01), Lawson et al.
patent: 2002/0165988 (2002-11-01), Khan et al.
patent: 2002/0178271 (2002-11-01), Graham et al.
patent: 2003/0005174 (2003-01-01), Coffman et al.
patent: 2003/0051026 (2003-03-01), Carter et al.
patent: 2003/0120935 (2003-06-01), Teal et al.
patent: 2003/0145235 (2003-07-01), Choo
patent: 2003/0169306 (2003-09-01), Makipaa et al.
patent: 2004/0039809 (2004-02-01), Ranous et al.
patent: 2004/0044912 (2004-03-01), Connary et al.
patent: 2004/0054894 (2004-03-01), Lambert
patent: 2004/0181794 (2004-09-01), Coleman et al.
patent: 2004/0255160 (2004-12-01), Stamos et al.
patent: 2005/0060537 (2005-03-01), Stamos et al.
patent: 2008/0034228 (2008-02-01), Shear et al.
patent: 2008/0288775 (2008-11-01), Baier et al.
patent: 07-295892 (1995-11-01), None
patent: 11-017915 (1999-01-01), None
patent: 2001-184264 (2001-07-01), None
patent: 2002-175210 (2002-06-01), None
patent: WO 00/22777 (2000-04-01), None
patent: WO 2004/066082 (2004-08-01), None
patent: WO 2004/066085 (2004-08-01), None
patent: WO 2004/066541 (2004-08-01), None
“Planning for CA-ACF2 Migration to OS/390 Security Server (RACF),”IBM International Technical Support Organization, Poughkeepsie, NY, 1sted. (1996).
Kirichenko, A., “F-Secure Kennel Mode Cryptographic Driver, FIPS 140-2 Validation Security Policy,” F-Secure Corp., Dec. 2001 entire document, cs-www.ncsi.nist.gov/cryptval/140-1/120sp/140sp237.pdf.
Reid, Jason, F., et al., DRM, Trusted Computing and Operating System Architecture', 2005, Information Security Research Centre, Queensland Univer. of Technology, entire document, ‘http://crpit.com/confpapers/CRPITV44Reid.pdf’.
International Search Report from International Application No. PCT/US2004/001454, Dated: Dec. 10, 2004.
Written Opinion of the International Searching Authority from International Application No. PCT/US2004/001454, Dated: Dec. 10, 2004.
International Search Report from International Application No. PCT/US2004/001508, Dated: Dec. 17, 2004.
Written Opinion of the International Searching Authority from International Application No. PCT/US2004/001508, Dated: Dec. 17, 2004.
Reply to Written Opinion from International Application No. PCT/US2004/001454, Dated: Mar. 10, 2005.
Reply to Written Opinion from International Application No. PCT/US2004/001508, Dated: Mar. 16, 2005.
International Search Report from International Application No. PCT/US2004/001529, Dated: May 6, 2005.
Written Opinion of the International Searching Authority from International Application No. PCT/US2004/001529, Dated: May 6, 2005.
Reply to Written Opinion from International Application No. PCT/US2004/001529, Dated: Aug. 8, 2005.
International Preliminary Report on Patentability from International Application No. PCT/US2004/001454, Dated: Oct. 21, 2005.
International Preliminary Report on Patentability from International Application No. PCT/US2004/001529, Dated: May 15, 2006.
International Search Report from International Application No. PCT/US2005/040395, Dated: Sep. 5, 2007.
Written Opinion of the International Searching Authority from International Application No. PCT/US2005/040395, Dated: Sep. 5, 2007.
International Preliminary Report on Patentability from International Application No. PCT/US2004/001508, 4 pages, Dated: Dec. 17, 2008.
Blaze, M., “A Cryptographic File System for Unix,” Conference on Computer and Communications Security, Proceedings of the 1st ACM Conference on Compute, ACM, 1993, pp. 9-16.
Wespi, A., et al., “Intrusion Detection Using Variable-Length Audit Trail Patterns,”RAID 2000, H. Debar, L. Mé, eds. (Berlin Heidelbergp: Springer-Verlag ), pp. 110-129 (2000).
Chari and Cheng, “BlueBoX: A Policy-Driven, Host-Based Intrusion Detection System,” Proceedings of the Network and Distributed System Security Symposium, San Diego, California, USA (2002).
Lunt, T.F. et al., “A Real-Time Intrusion-Detection Expert System (IDES),” (SRI Project 6784). Washington, D.C.: SPAWAR (Feb. 1992).
“HIBUN/Enterprise,” Open Space HAND Library, p. 18, Hitac2003-1, (mechanical English translation).
Birnbaum Seth N.
Buccella Donato
Carson Dwayne A.
Fletcher William E.
MacDonald Keith A.
Hamilton Brook Smith & Reynolds P.C.
Lanier Benjamin E
Lemma Samson
Verdasys, Inc.
LandOfFree
Digital asset usage accountability via event journaling does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Digital asset usage accountability via event journaling, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Digital asset usage accountability via event journaling will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2642520