Method and apparatus for protection domain based security

Information security – Access control or authentication – Network

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S011000, C713S151000, C713S154000, C713S156000

Reexamination Certificate

active

07739731

ABSTRACT:
A first application instance is associated with a protection domain based on credentials (e.g.: a signed certificate) associated with a set of application code that, when executed, gives rise to the application instance. The first application instance executes in a first execution context. An indication is received that the first application instance seeks access to protected functionality associated with a second execution context. In response to receiving the indication, a determining is made as to whether the first application instance has permission to access the protected functionality. The determination is made by determining the protection domain with which the first application instance is associated, and determining if the protection domain with which the first application instance is associated is in the set of one or more protection domains.

REFERENCES:
patent: 6125447 (2000-09-01), Gong
patent: 6282652 (2001-08-01), Scheifler
patent: 6708276 (2004-03-01), Yarsa et al.
patent: 6993665 (2006-01-01), Heddings et al.
patent: 7051366 (2006-05-01), LaMacchia et al.
patent: 2003/0172109 (2003-09-01), Dalton et al.
patent: 2004/0006706 (2004-01-01), Erlingsson
patent: 2004/0088562 (2004-05-01), Vassilev et al.
patent: 2004/0216150 (2004-10-01), Scheifler et al.
patent: 2006/0036570 (2006-02-01), Schaefer et al.
patent: 1 431 862 (2004-06-01), None
patent: WO 2005/045735 (2005-05-01), None
Author: Li Gong and Roland Schemers Title: Implementing Protection Domains in Java Development 1.2 Date: 2003.
Author: Zhiqun Chen Title: Java card technology for smart cards: Architecture and Programmer's Guide Date: Sep. 18, 2000.
Gong, L. et al., “Implementing Protection Domains in the Java™ Development Kit 1.2”, Proceedings of the Internet Society Symposium on Network and Distributed System Security, XP-002304112, Mar. 1988, 10 pages.
Gong, L. et al., “Going Beyond the Sandbox: An Overview of the New Security Architecture in the Java™ Development Kit 1.2”, Proceedings of the Usenix Symposium on Internet Technologies and Systems, XP-002250254, Dec. 1997, 10 pages.
Gong, L. et al., “Java Security Architecture (JDK 1.2)”, Internet Citation, XP-002171445, dated Dec. 6, 1998, 62 pages.
European Patent Office, “European Search Report”, European application No. 07250044.0-2212, received Nov. 30, 2007, 10 pages.
Claims, European application No. 07250044.0-2212, 5 pages.
Chen, Zhiqun, “Applet Firewall and Object Sharing,” Chapter 9 ofJava Card Technology for Smart Cards: Architecture and Programmer's Guide, published by Addison Wesley, Jun. 2000, pp. 105-127.
Knudsen, Jonathan, “What's New in MIDP 2.0,” Sun Microsystems, retrieved from the internet at http://developers.sun.com/techtopics/mobility/midp/articles/midp20/, retrieved on Jan. 10, 2007, 8 pages.
Ortiz, Enrique C., “An Introduction to Java Card Technology—Part 1,” Sun Microsystems, retrieved from the Internet at http://developers.sun.com/techtopics/mobility/javacard/articles/javacard1/, retrieved in Jan. 10, 2007, 16 pages.
European Patent Office, “Communication pursuant to Article 94(3) EPC”, Application No. 06256576.7-2212, dated Jul. 17, 2008, 4 pages.
Claims, Application No. 06256576.7-2212, 3 pages.
European Patent Office, “Communication pursuant to Article 94(3) EPC”, Application No. 07250044-2212, dated Jul. 3, 2008, 1 page.
Claims, Application No. 07250044-2212, 3 pages.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and apparatus for protection domain based security does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and apparatus for protection domain based security, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for protection domain based security will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4217862

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.