Method and computer system for controlling access by...

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S150000, C713S151000, C713S152000

Reexamination Certificate

active

06883098

ABSTRACT:
Application execution contexts within an untrusted computer system are classified as trusted or untrusted based on respective names assigned to the execution contexts. If an application runs in an untrusted execution context, an operating system within the untrusted computer system prevents the application from initiating a connection with a trusted computer system and accessing sensitive parts of the untrusted computer system. If the application runs in a trusted execution context, the operating system permits the application to initiate a connection with the trusted computer system.

REFERENCES:
patent: 4945468 (1990-07-01), Carson et al.
patent: 5713018 (1998-01-01), Chan
patent: 5781550 (1998-07-01), Templin et al.
patent: 5787175 (1998-07-01), Carter
patent: 5825877 (1998-10-01), Dan et al.
patent: 5841871 (1998-11-01), Pinkas
patent: 5884024 (1999-03-01), Lim et al.
patent: 5937159 (1999-08-01), Meyers et al.
patent: 6212636 (2001-04-01), Boyle et al.
patent: 6321337 (2001-11-01), Reshef et al.
patent: 6473791 (2002-10-01), Al-Ghosein et al.
patent: 6829704 (2004-12-01), Zhang et al.
patent: 6829707 (2004-12-01), Marshall et al.
patent: 6829712 (2004-12-01), Madoukh
Secure compartmented data access over an untrusted network using a COTS-based architecture□□ Clark, P.C.; Meissner, M.C.; Vance, K.O.;□□ Computer Security Applications, 2000. ACSAC '00. 16th Annual Conference, Dec. 11-15, 2000 □□pp.: 217-223.*
Safe virtual execution using software dynamic translation□□Scott, K.; Davidson, J.;□□Computer Security Applications Conference, 2002. Proceedings. 18th Annual, Dec. 9-13, 2002 □□pp.: 209-218.*
An integrated management environment for network resources and services□□Bellavista, P.; Corradi, A.; Stefanelli, C.;□□Selected Areas in Communications, IEEE Journal on, vol.: 18, Issue: 5, May 2000 □□pp.: 676-685.*
Arsenault et al., “Trusted Network Interpretation of the TCSEC”, 1987, Working Group, section 3.1.1.3, Labels.*
Sebes et al., SIGMA: Security for Distributed Object Interoperability Between Trusted and Untrusted Systems, 1996, IEEE, p. 158-168.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and computer system for controlling access by... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and computer system for controlling access by..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and computer system for controlling access by... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3381695

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.