Data processing: financial – business practice – management – or co – Business processing using cryptography – Secure transaction
Reexamination Certificate
2011-05-17
2011-05-17
Elisca, Pierre E (Department: 3718)
Data processing: financial, business practice, management, or co
Business processing using cryptography
Secure transaction
C705S067000, C705S075000, C705S076000
Reexamination Certificate
active
07945519
ABSTRACT:
An information management system is described comprising one or more workstations running applications to allow a user of the workstation to connect to a network, such as the Internet. Each application has an analyzer, which monitors transmission data that the application is about to transmit to the network or about to receive from the network and which determines an appropriate action to take regarding that transmission data. Such actions may be extracting data from the transmission data, such as passwords and usernames, digital certificates or eCommerce transaction details for storage in a database; ensuring that the transmission data is transmitted at an encryption strength appropriate to the contents of the transmission data; determining whether a check needs to be made as to whether a digital certificate received in transmission data is in force, and determining whether a transaction about to be made by a user of one of the workstations needs third party approval before it is made. The analyzer may consult a policy data containing a policy to govern the workstations in order to make its determination. The information management system provides many advantages in the eCommerce environment to on-line trading companies, who may benefit by being able to regulate the transactions made by their staff according to their instructions in a policy data, automatically maintain records of passwords and business conducted on-line, avoid paying for unnecessary checks on the validity of digital certificates and ensure that transmissions of data made by their staff are always protected at an agreed strength of encryption.
REFERENCES:
patent: 5235642 (1993-08-01), Wobber et al.
patent: 5701484 (1997-12-01), Artsy
patent: 5740355 (1998-04-01), Watanabe et al.
patent: 5835726 (1998-11-01), Shwed et al.
patent: 5903882 (1999-05-01), Asay et al.
patent: 5917489 (1999-06-01), Thurlow et al.
patent: 5944787 (1999-08-01), Zoken
patent: 5964839 (1999-10-01), Johnson et al.
patent: 5974149 (1999-10-01), Leppek
patent: 5987611 (1999-11-01), Freund
patent: 6006333 (1999-12-01), Nielsen
patent: 6009173 (1999-12-01), Sumner
patent: 6009526 (1999-12-01), Choi et al.
patent: 6073142 (2000-06-01), Geiger et al.
patent: 6085224 (2000-07-01), Wagner
patent: 6141686 (2000-10-01), Jackowski et al.
patent: 6359557 (2002-03-01), Bilder
patent: 7017187 (2006-03-01), Marshall et al.
patent: 2002/0087645 (2002-07-01), Ertugrul et al.
patent: 2003/0140282 (2003-07-01), Kaler et al.
patent: 0736827 (1996-10-01), None
patent: 0817099 (1998-01-01), None
patent: 0959419 (1999-11-01), None
patent: 2247549 (1992-03-01), None
patent: 2295299 (1996-05-01), None
patent: 2339938 (2000-02-01), None
patent: 07-154615 (1995-06-01), None
patent: 2000-235540 (2000-08-01), None
patent: 2000-278260 (2000-10-01), None
patent: 2007072526 (2007-03-01), None
patent: WO-9967931 (1999-12-01), None
patent: WO-0068811 (2000-11-01), None
patent: WO-0127813 (2001-04-01), None
patent: WO-0139023 (2001-05-01), None
Examiners Report No. 4 issued for corresponding Australian Patent Application No. 2002212549 mailed Feb. 25, 2009.
Norio Miya, “Network solution course. How to use practically mail filtering,” NIKKEI Communications, Japan, Nikkei Business Publication, Inc., Jul. 3, 2000, No. 321, pp. 148-153.
Miwa, “Two piece of security software preventing intrusion from outside,” Monthly ASCII, Japan, ASCII Corporation, vol. 24, No. 10, pp. 266-267 (translator's note: this reference ws published on Oct. 1, 2000 according the last page of this reference.
White, R., “How Computers Work,” Millennium Ed., Que Corporation, Indianapolis, IN, 1999.
Abrams, M. et al. “A Higher Level of Computer Security through Active Policies,” Computers & Security, 14 (1995) pp. 147-157.
Hurwitz Group, “Managing Exchange 2000 Migration with Bindview,” www.Hurwitz.com, Oct. 2000, pp. 1-15. cited by other.
Schlosser, M., “IBM Application Framework for E-business: Security,” www-4.ibm.com, Nov. 1999, pp. 1-8. cited by other.
Satchell, S., “Keeping E-mail Secure,” www-106.ibm, Oct. 2000, pp. 1-4. cited by other.
Rothman, M., “Email Security: the PKI Way,” www.comnews.com, Oct. 2000, p. 1. cited by other.
Grimm, R. et al. “Security Policies in OSI-Management Experiences from the DeTeBerkom Project BMSec”. Computer Networks and ISDN Systems, North Holland Publishing, Amsterdam, NL vol. 28, No. 4 (1996) pp. 499-511. cited by other.
Hamilton, “Visual Basic Shell Programming,” Jul. 2000, O'Reilly & Associates, Inc., Sebastopol, CA, 1st Edition, Chapter 12.
Muller, “Desktop Encyclopedia of the Internet,” 1999, Artech House, Inc., Norwood, MA, all pages.
Esposito, D. (1999) “Browser Helper Objects: The Browser the Way You Want It” Microsoft Corporation, retrieved from http://msdn.Microsoft.com/library/techart/bho.htm.
Lloyd, S. (1998) “Microsoft Outlook and Exchange Client and Extensions”.
Baker & Botts L.L.P.
Computer Associates Think Inc.
Elisca Pierre E
LandOfFree
Information management system does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Information management system, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Information management system will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2705150