Method and system for the secure use of a network service

Information security – Prevention of unauthorized use of data including prevention... – Access control

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S004000, C713S170000, C713S185000, C713S187000

Reexamination Certificate

active

09877874

ABSTRACT:
In a network, in particular an ad-hoc network AHN, having a blackboard on which all the usable services are entered, following detection of a service which has not yet been entered on the blackboard, a check is carried out to determine whether use of the service is admissible. The service is entered onto the blackboard only if use of the service is admissible. This provides centrally administrable secure use of services in plug & play networks.

REFERENCES:
patent: 5457798 (1995-10-01), Alfredsson
patent: 5812533 (1998-09-01), Cox et al.
patent: 5974549 (1999-10-01), Golan
patent: 6134603 (2000-10-01), Jones et al.
patent: 6138238 (2000-10-01), Scheifler et al.
patent: 6185611 (2001-02-01), Waldo et al.
patent: 6708171 (2004-03-01), Waldo et al.
patent: 6832223 (2004-12-01), Scheifler et al.
patent: 6845393 (2005-01-01), Murphy et al.
patent: 6877094 (2005-04-01), DiGiorgio et al.
patent: 2001/0002473 (2001-05-01), Waldo et al.
patent: 2002/0133573 (2002-09-01), Matsuda et al.
Andersson, Fredrik et al. “Secure Jini Services in Ad Hoc Networks”, Feb. 2000.
Cap, Celemens H. et al. “Overview of Spontaneous Networking—Evolving Concepts and Technologies”.
Crichton, Charles et al. “When to trust mobile objects: access control in the Jini Software System”, Aug. 1999.
Czerwinski, Steven E. et al. “An Architecture for a Secure Service Discovery Service”, 1999 ACM.
Richter, Jeffrey. “Manipulate Windows NT Services by Writing a Service Control Program”, Feb. 1998, <http://www.microsoft.com/msj/0298/service.aspx>.
Williams, Jeff. “Jini and Mobile Agent Security”, Agent Technology '98.
De Nicola, Rocco et al. “Coordinating Mobile Agents via Blackboards and Access Rights”, LNCS 1997.
Eronen, Pasi et al. “Extending Jini with Decentralized Trust Management”, Mar. 2000.
Hasselmeyer, Peer. “Jini Security”, Nov. 1999.
Hasselmeyer, Peer et al. “Trade-offs in a Secure Jini Service Architecture”, Sep. 2000.
Gehrmann, C. et al. “Securing ad hoc services, a Jini view—extended abstract”, 2000 IEEE.
McGrath, Robert E. “Discovery and Its Discontents: Discovery Protocols for Ubiquitous Computing”, Apr. 2000.
Minsky, Naftaly H. et al. “Making Tuple Spaces Safe for Heterogeneous Distributed Systems”, 2000 ACM.
Jini organisiert das Netz selbst pp. 82-85.
Geitreiche Verbindungen.
Jini Architectural Overview Technical White Paper.
Stajano et al., “The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks”, Security Protocols, International Workshop Proceedings, Sep. 15, 1999, pp. 1-11.
Pemont, “Geistreiche Verbindungen Intelligente Gerdte In dezentralen Nietzen” CT Magazin fur Computer Technik, No. 20, 1998, pp. 196-202.
Edwards, “Core Jini”, Jun. 1999, Prentice Hall pp. 68-76.
Czerwinski, et al. “Nan Architecture for a Secure Service Discovery Service”, Proceedings of Mobicom 99 Aug. 15, 1999, pp. 24-35.
Kauser et al., “Sesame The Solution to Security for Open Distributed Systems”, Computer Communications, 7 07 07, pp. 501-518.
Velzades et al., Service Location Protocol In RFC 2165 IETF 1997, pp. 17-19.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and system for the secure use of a network service does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and system for the secure use of a network service, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and system for the secure use of a network service will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3908147

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.