Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer
Reexamination Certificate
2005-04-19
2005-04-19
Jung, David (Department: 2134)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Protection at a particular protocol layer
C713S150000, C713S151000, C713S152000
Reexamination Certificate
active
06883098
ABSTRACT:
Application execution contexts within an untrusted computer system are classified as trusted or untrusted based on respective names assigned to the execution contexts. If an application runs in an untrusted execution context, an operating system within the untrusted computer system prevents the application from initiating a connection with a trusted computer system and accessing sensitive parts of the untrusted computer system. If the application runs in a trusted execution context, the operating system permits the application to initiate a connection with the trusted computer system.
REFERENCES:
patent: 4945468 (1990-07-01), Carson et al.
patent: 5713018 (1998-01-01), Chan
patent: 5781550 (1998-07-01), Templin et al.
patent: 5787175 (1998-07-01), Carter
patent: 5825877 (1998-10-01), Dan et al.
patent: 5841871 (1998-11-01), Pinkas
patent: 5884024 (1999-03-01), Lim et al.
patent: 5937159 (1999-08-01), Meyers et al.
patent: 6212636 (2001-04-01), Boyle et al.
patent: 6321337 (2001-11-01), Reshef et al.
patent: 6473791 (2002-10-01), Al-Ghosein et al.
patent: 6829704 (2004-12-01), Zhang et al.
patent: 6829707 (2004-12-01), Marshall et al.
patent: 6829712 (2004-12-01), Madoukh
Secure compartmented data access over an untrusted network using a COTS-based architecture□□ Clark, P.C.; Meissner, M.C.; Vance, K.O.;□□ Computer Security Applications, 2000. ACSAC '00. 16th Annual Conference, Dec. 11-15, 2000 □□pp.: 217-223.*
Safe virtual execution using software dynamic translation□□Scott, K.; Davidson, J.;□□Computer Security Applications Conference, 2002. Proceedings. 18th Annual, Dec. 9-13, 2002 □□pp.: 209-218.*
An integrated management environment for network resources and services□□Bellavista, P.; Corradi, A.; Stefanelli, C.;□□Selected Areas in Communications, IEEE Journal on, vol.: 18, Issue: 5, May 2000 □□pp.: 676-685.*
Arsenault et al., “Trusted Network Interpretation of the TCSEC”, 1987, Working Group, section 3.1.1.3, Labels.*
Sebes et al., SIGMA: Security for Distributed Object Interoperability Between Trusted and Untrusted Systems, 1996, IEEE, p. 158-168.
Roman John S.
Wade Brian K.
Jung David
McGinn & Gibb PLLC
Samodovitz, Esq. Authur J.
LandOfFree
Method and computer system for controlling access by... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and computer system for controlling access by..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and computer system for controlling access by... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3381695