Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular node for directing data and applying cryptography
Reexamination Certificate
2011-07-05
2011-07-05
Revak, Christopher A (Department: 2431)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Particular node for directing data and applying cryptography
C713S187000, C713S162000, C713S170000, C726S003000, C709S202000, C719S317000
Reexamination Certificate
active
07975137
ABSTRACT:
A method, a system, and a computer program product for access control using resource filters for a strict separation of application and security logic are described. The computer-implemented method for access control may include receiving at least one access request to at least one resource from an application; providing a resource hierarchy for the at least one resource, the resource having at least one resource class, wherein the resource hierarchy is defined in a single resource; providing a policy comprising at least one access control rule for accessing at least one element of the at least one resource class; verifying the at least one access request based on the policy through an authorization service; and processing the at least one access request through a service interface.
REFERENCES:
patent: 6055562 (2000-04-01), Devarakonda et al.
patent: 6233601 (2001-05-01), Walsh
patent: 6330588 (2001-12-01), Freeman
patent: 6466963 (2002-10-01), Shigemori
patent: 7213021 (2007-05-01), Taguchi et al.
patent: 7213047 (2007-05-01), Yeager et al.
patent: 7257843 (2007-08-01), Fujita et al.
patent: 7269845 (2007-09-01), Rygaard et al.
patent: 7328243 (2008-02-01), Yeager et al.
patent: 7383433 (2008-06-01), Yeager et al.
patent: 7430761 (2008-09-01), Fujita et al.
patent: 7567562 (2009-07-01), Lee et al.
patent: 7711117 (2010-05-01), Rohrle et al.
patent: 7743089 (2010-06-01), Putzolu
patent: 2003/0135541 (2003-07-01), Maeda et al.
patent: 2004/0088347 (2004-05-01), Yeager et al.
patent: 2004/0133640 (2004-07-01), Yeager et al.
patent: 2008/0201762 (2008-08-01), Rits
patent: 2008/0253571 (2008-10-01), Rits
patent: 1780653 (2007-05-01), None
patent: 1860816 (2007-11-01), None
patent: 1860817 (2007-11-01), None
patent: 1879136 (2008-01-01), None
patent: 1879323 (2008-01-01), None
Borselius, N., Mobile agent security, Oct. 2002, Electronics and Communication Engineering Journal, pp. 211-218.
Jansen, W.A., Countermeasures for mobile agent security, 2000, Computer Communications, vol. 23, pp. 1667-1676.
Ordille, Joann J., When agents roam, who can you trust?, 1996, IEEE, pp. 188-191.
Intent to Grant for EP Application No. 07290073.1, mailed Sep. 10, 2008, 4 pages.
Extended EP Search Report for EP Application No. 07290073.1, mailed Aug. 21, 2007, 6 pages.
Office Action for EP Application No. 07290073.1, mailed Jul. 10, 2008, 1 page.
Office Action Response for EP Application No. 07290073.1, filed Jul. 31, 2008, 3 pages.
Karnik, et al, “Security in the Ajanta Mobile Agent System”, Department of COmputer Science, University of Minnesota, May 17, 1999, 28 pages.
Green, et al, “Software Agents: A Review”, Trinity College Dublin, May 27, 1997, 51 pages.
Hohl, “Time Limited Blackbox Security: Protecting Mobile Agents from Malicious Hosts”, LNCS, vol. 1419, 1998, 7 pages.
Yee, “Using Secure Coprocessors”, School of Computer Science, Carnegie Mellon University, CMU-CS-94-149, May 1994, 104 pages.
Wilhelm, et al, “Introducing Trusted Third Parties to the Mobile Agent Paradigm”, Secure Internet Programming: Security Issues for Mobile and Distributed Objects, 1999, 21 pages.
Sander, et al, “Towards Mobile Cryptography”, International Computer Science Institute, TR-97-049, Nov. 22, 1997, 16 pages.
Brake Hughes Bellermann LLP
Kosowski Carolyn B
Revak Christopher A
SAP (AG)
LandOfFree
Method and system for securely extending a path of a mobile... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and system for securely extending a path of a mobile..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and system for securely extending a path of a mobile... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2731646