Mechanism for dynamically constructing customized...

Electrical computers and digital processing systems: support – System access control based on user identification by...

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C709S229000

Reexamination Certificate

active

07131008

ABSTRACT:
A mechanism for dynamically constructing service implementations to enforce restrictions on services provided to an application is disclosed. When an application desires an implementation for a particular service, the application makes a request to a framework. The framework receives the request and, in response, determines what restrictions, if any, need to be imposed on the requested implementation. Once the restrictions are determined, the framework dynamically constructs the requested implementation. The requested implementation is constructed such that it incorporates a general implementation of the service, the restrictions, and enforcement logic for enforcing the restrictions on the general implementation. Once the requested implementation is constructed, it is provided to the application. Thereafter, the application invokes the requested implementation directly for services. Since the requested implementation incorporates the restrictions and enforcement logic for enforcing the restrictions, it is not necessary for the application to further interact with the framework. The requested implementation itself will provide the services, and will guarantee that the restrictions are enforced. By dynamically constructing requested implementations in this manner, the framework ensures that the necessary restrictions are enforced on the services provided to the application.

REFERENCES:
patent: 5323464 (1994-06-01), Elander et al.
patent: 5369702 (1994-11-01), Shanton
patent: 5412717 (1995-05-01), Fischer
patent: 5493692 (1996-02-01), Theimer et al.
patent: 5555376 (1996-09-01), Theimer et al.
patent: 5649099 (1997-07-01), Theimer et al.
patent: 5745572 (1998-04-01), Press
patent: 5883956 (1999-03-01), Le et al.
patent: 5889953 (1999-03-01), Thebaut et al.
patent: 5907620 (1999-05-01), Klemba et al.
patent: 5933503 (1999-08-01), Schell et al.
patent: 6125446 (2000-09-01), Olarig et al.
patent: 6148083 (2000-11-01), Fieres et al.
patent: 6178504 (2001-01-01), Fieres et al.
patent: 6209104 (2001-03-01), Jalili
patent: 6298445 (2001-10-01), Shostak et al.
patent: 6308266 (2001-10-01), Freeman
patent: 6378001 (2002-04-01), Aditham et al.
patent: 6389534 (2002-05-01), Elgamal et al.
patent: 6535980 (2003-03-01), Kumar et al.
patent: 6615166 (2003-09-01), Guheen et al.
patent: 2002/0112171 (2002-08-01), Ginter et al.
patent: 0 539 726 (1993-05-01), None
patent: 0780756 (1997-06-01), None
patent: 0 828 208 (1998-03-01), None
patent: WO 97/39553 (1997-10-01), None
patent: WO 98/58322 (1998-12-01), None
Java Cryptography Extension 1.2.1, Java Cryptography Extension 1.2. 1 API Specification & Reference, downloaded May 10, 2002, http://java.sun.com/products/jce/doc/guide/API—users—guide.html, pp. 1-51.
Java(TM) Cryptography Extension (JCE), Java Cryptography Extension (JCE), http://java.sun.com/products/jce/index.html, downloaded May 10, 2002, 5 pages.
Roger S. Pressman, Ph.D., “Software Engineering, A Practitioner's Approach,” Fourth Edition, 1982-1987, pp. 1-22 and 549-576.
Susan Landau, et al., “Crypto Policy Perspectives,” Communications of the ACM, Aug. 1994, vol. 37, No. 8, XP-002253003, pp. 115-121.
Fausto Rabitti, et al., “A Model of Authorization for Next-Generation Database Systems,” ACM Transactions on Database Systems, vol. 16, No. 1, Mar. 1991, XP-002254871, pp. 88-131.
David A. Taylor, “Object-Oriented Information Systems, Planning and Implementation,” 1992, John Wiley and Sons, 369 pages.
European Patent Office, “Search Report,” Application 00309875.3, dated Nov. 28, 2003, 4 pages.
Current Claims, EP Application 00309875.3, 13 pages.
European Patent Office, “Communication,” Application 00 309 875.3, dated Aug. 4, 2004, 4 pages.
Current Claims, EP Application 00 309 875.3, 13 pages.
European Patent Office, “Communication,” Application 00 309 877.9, dated Aug. 20, 2004, 5 pages.
Current Claims, EP Application 00 309 877.9, 11 pages.
Foley, Simon N., “A Model for Secure Information Flow,” Proceedings of the Symposium On Security and Privacy, Oakland, CA, May 1-3, 1989, XP-010016026, pp. 248-258.
Foldoc Online Dictionary of Computing, Online!Jul. 16, 1997, XP-002261382, retrieved from the internet at <http;//foldoc.doc.ic.ac.uk/foldoc/foldc.cgi?query=wildcard&action=Search>, retrieved on Nov. 13, 2003, 1 page.
Don Tibes, “Regression Testing and Conformance Testing Interactive Programs,” Summer '92 USENIX - Jun. 8-Jun. 12, 1992 - San Antonio, TX, XP-002262434, pp. 135-144.
P. Thevenod-Fosse, et al., “An Experimental Study on Software Structural Testing: Deterministic Versus Random Input Generation,” IEEE, 1991, pp. 410-417.
“Definition of wrapper”, Foldoc Dictionary of Computing, Dec. 15, 1998, XP-002263084, 1 page.
M. Mullin, “Object Oriented Program Design,” Jul. 1992, XP-002263085, pp. 54-58, 287-288.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Mechanism for dynamically constructing customized... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Mechanism for dynamically constructing customized..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Mechanism for dynamically constructing customized... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3718775

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.