Electrical computers and digital processing systems: multicomput – Computer-to-computer data modifying
Reexamination Certificate
2008-07-29
2008-07-29
Harrell, Robert B. (Department: 2142)
Electrical computers and digital processing systems: multicomput
Computer-to-computer data modifying
Reexamination Certificate
active
07406542
ABSTRACT:
Method and system are disclosed for assured denotation of application semantics (“ADAS”). In a computer system operating at least one application, a method is disclosed for providing assured denotation of application semantics associated with the application. A graphical operation is received for the application. The graphical operation includes at least one argument. The argument is intercepted for the graphical operation, and modified for the graphical operation to provide an indication of at least one application semantic associated with the application.
REFERENCES:
patent: 5263147 (1993-11-01), Francisco et al.
patent: 5377317 (1994-12-01), Bates et al.
patent: 5497484 (1996-03-01), Potter et al.
patent: 5537548 (1996-07-01), Fin et al.
patent: 5564005 (1996-10-01), Weber et al.
patent: 5619639 (1997-04-01), Mast
patent: 5634102 (1997-05-01), Capps
patent: 5673403 (1997-09-01), Brown et al.
patent: 5760769 (1998-06-01), Petrie
patent: 5761477 (1998-06-01), Wahbe et al.
patent: 5764985 (1998-06-01), Smale
patent: 5790127 (1998-08-01), Anderson et al.
patent: 5828893 (1998-10-01), Wied et al.
patent: 5832263 (1998-11-01), Hansen et al.
patent: 5845129 (1998-12-01), Wendorf et al.
patent: 5913024 (1999-06-01), Green et al.
patent: 5915085 (1999-06-01), Koved
patent: 5918018 (1999-06-01), Gooderum et al.
patent: 5956507 (1999-09-01), Shearer, Jr. et al.
patent: 5974413 (1999-10-01), Beauregard et al.
patent: 5974470 (1999-10-01), Hammond
patent: 6014134 (2000-01-01), Bell et al.
patent: 6023721 (2000-02-01), Cummings
patent: 6073157 (2000-06-01), Horiguchi et al.
patent: 6167520 (2000-12-01), Touboul
patent: 6271839 (2001-08-01), Mairs et al.
patent: 6323884 (2001-11-01), Bird
patent: 6385724 (2002-05-01), Beckman et al.
patent: 6415385 (2002-07-01), Cotugno et al.
patent: 6441833 (2002-08-01), Anderson et al.
patent: 6505300 (2003-01-01), Chan et al.
patent: 6529985 (2003-03-01), Deianov et al.
patent: 6587888 (2003-07-01), Chieu et al.
patent: 6657645 (2003-12-01), Costea et al.
patent: 6711579 (2004-03-01), Balakrishnan
patent: 6772168 (2004-08-01), Ardoin et al.
patent: 6772216 (2004-08-01), Ankireddipally et al.
patent: 6807636 (2004-10-01), Hartman et al.
patent: 6865300 (2005-03-01), Kokemohr
patent: 7013289 (2006-03-01), Horn et al.
patent: 7039875 (2006-05-01), Khalfay et al.
patent: 7047232 (2006-05-01), Serrano
patent: 7088871 (2006-08-01), Mairs et al.
patent: 2002/0038451 (2002-03-01), Tanner et al.
patent: 2002/0099952 (2002-07-01), Lambert et al.
patent: 2002/0137507 (2002-09-01), Winkler
patent: 2002/0165912 (2002-11-01), Wenocur et al.
patent: 2002/0186245 (2002-12-01), Chandhoke et al.
patent: 2003/0227483 (2003-12-01), Schultz et al.
patent: 2003/0233544 (2003-12-01), Erlingsson
patent: 2004/0006706 (2004-01-01), Erlingsson
patent: 2004/0093350 (2004-05-01), Alexander et al.
Anurag Acharya et al., “MAPbox: Using Parameterized Behavior Classes to Confine Untrusted Applications,” Proceedings of the 9thUSENIX Security Symposium, Aug. 14-17, 2000, 17 pages.
Barry Boehm, “Managing Software Productivity and Reuse,” University of Southern California, Sep. 1999, pp. 111-113.
P. Deutsch et al., “A Flexible Measurement Tool for Software Systems,” Information Processing (Proceedings of the IFIP Congress), 1972, pp. 320-326.
Guy Edjlali et al., “History-based Access Control for Mobile Code,” 5thConference on Computer & Communications Security, 1998, pp. 38-48.
Úlfar Erlingsson et al., “IRM Enforcement of Java Stack Inspection,” IEEE, 2000, 10 pages.
Úlfar Erlingsson et al., “SASI Enforcement of Security Policies: A Retrospective,” Department of Computer Science, Cornell University, pp. 87-95, no date.
David Evans et al. “Flexible Policy-Directed Code Safety,” MIT Laboratory for Computer Science, IEEE, 1999, 14 pages.
Timothy Fraser et al. “Hardening COTS Software with Generic Software Wrappers,” TIS Labs at Network Associates, Inc., IEEE, 1999, 15 pages.
Ian Goldberg et al., “A Secure Environment for Untrusted Helper Applications (Confining the Wily Hacker),” Proceedings of the Sixth USENIX UNIX Security Symposium, Jul. 1996, 14 pages.
Robert P. Goldberg, “Survey of Virtual Machine Research,” IEEE Computer, Jun. 1974, vol. 7, No. 6, pp. 34-45.
Sotris Ioannidis, “Sub-Operating Systems: A New Approach to Application Security,” 8 pages, no date.
Manoj Lal et al., “A Scheduling Scheme for Controlling Allocation of CPU Resources for Mobile Programs,” University of California, Davis, Aug. 31, 1999, pp. 1-33.
Dennis M. Ritchie, “The Evolution of the Unix Time-Sharing System,” Bell Labs, Lucent Technologies, 11 pages, no date.
Jerome H. Salzter et al., “The Protection of Information in Computer Systems,” Proceedings of the IEEE 63, Sep. 1975, 30 pages.
Jeremy Sugarman et al., “Virtualizing I/O Devices on Vmware Workstation's Hosted Virtual Machine Monitor,” Proceedings of the 2001 UNSENIX Annual Technical Conference, Jun. 2001, 15 pages.
Robert Wahbe et al., “Efficient Software-Based Fault Isolation,” Computer Science Division, University of California, SIGOPS, 1993, pp. 203-216.
Google Inc.
Harrell Robert B.
Sterne Kessler Goldstein & Fox P.L.L.C.
LandOfFree
Method and system for assured denotation of application... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and system for assured denotation of application..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and system for assured denotation of application... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2780943