Information security – Access control or authentication
Reexamination Certificate
2006-09-05
2006-09-05
Song, Hosuk (Department: 2135)
Information security
Access control or authentication
C713S168000
Reexamination Certificate
active
07103910
ABSTRACT:
The legitimacy of an untrusted mechanism is verified by submitting a first set of information and a second set of information to the untrusted mechanism in an unpredictable sequence. For each submission of either the first set or the second set of information, a response is received from the untrusted mechanism. Each response is tested to determine if the response is correct for the information set submitted. If any of the responses from the untrusted mechanism is incorrect, then it is determined that the untrusted mechanism is not legitimate. Because the submission sequence is unpredictable, it is highly difficult if not impossible for an illegitimate untrusted mechanism to “fake” proper responses. As a result, this verification process provides an effective means for testing and verifying the legitimacy of the untrusted mechanism.
REFERENCES:
patent: 5493692 (1996-02-01), Theimer et al.
patent: 5555376 (1996-09-01), Theimer et al.
patent: 5649099 (1997-07-01), Theimer et al.
patent: 6209104 (2001-03-01), Jalili
patent: 6298445 (2001-10-01), Shostack et al.
patent: 6535980 (2003-03-01), Kumar et al.
patent: 2002/0112171 (2002-08-01), Ginter et al.
patent: WO 98/58322 (1998-12-01), None
Roger S. Pressman, Ph.D., “Software Engineering, A Practitioner's Approach,” Fourth Edition, 1982-1987, pp. 1-22 and 549-576.
European Patent Office, “Communication pursuant to Article 96(2) EPC,” Aug. 4, 2004, 4 pages.
European Patent Office, “Communication pursuant to Article 96(2) EPC,” Aug. 20, 2004, 5 pages.
Current Claims in European patent application, Application No. 00309875.3, 13 pages.
Current Claims in European patent application, Application No. 00309877.9, 11 pages.
FOLDOC Online Dictionary of Computing, “wild card,” Jul. 16, 1997, XP-002261382, 1 page.
Simon N. Foley, “A Model for Secure Information Flow,” Feb. 1, 1989, IEEE, pp. 248-258.
European Patent Office, “Communication,” Nov. 11, 2003, 4 pages.
Current Claims in European patent application no. 00309875.3, 13 pages.
David A. Taylor, “Object-Oriented Inforamtion Systems, Planning and Implementations,” 1992, John Wiley and Sons, 369 pages.
Liu Sharon S.
Luehe Jan
Hickman Palermo & Truong & Becker LLP
Klimach Paula
Song Hosuk
Sun Microsystems Inc.
LandOfFree
Method and apparatus for verifying the legitimacy of an... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and apparatus for verifying the legitimacy of an..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for verifying the legitimacy of an... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3555340