Information security – Access control or authentication – Network
Reexamination Certificate
2007-11-06
2007-11-06
Zand, Kambiz (Department: 2134)
Information security
Access control or authentication
Network
C726S004000, C726S021000, C726S002000, C705S051000, C705S052000
Reexamination Certificate
active
09696736
ABSTRACT:
A system and method are presented for authorizing execution of requested actions transmitted between clients and servers of a data processing system. The method includes receiving a message including a set of actions and simulating execution of the set of actions. A list representing allowable actions and user-definable inputs to the simulated actions is defined. The list of allowable actions and user-definable inputs to the allowable action is then compared to user-requested actions and inputs. When elements within the user-requested actions and inputs are included in the allowable actions and input list, the user-requested actions and inputs are authorized for execution.
REFERENCES:
patent: 5347578 (1994-09-01), Duxbury
patent: 5559800 (1996-09-01), Mousseau et al.
patent: 5611048 (1997-03-01), Jacobs
patent: 5623601 (1997-04-01), Vu
patent: 5870544 (1999-02-01), Curtis
patent: 5908469 (1999-06-01), Botz et al.
patent: 5940590 (1999-08-01), Lynne et al.
patent: 6202199 (2001-03-01), Wygodny et al.
patent: 6289462 (2001-09-01), McNabb et al.
Bieber et al., “Formal Techniques for an ITSEC-E4 Secure Gateway”,1996, pp. 236-245.
Freemand, et al. “Developing Secure System: Issues and Solutions”, 1998, pp. 183-190.
Kogan et al., “An Audit Model for Objected-Oriented Databases”, 1991, pp. 90-99.
Lin et al., “Abstraction-Based Misuse Detection: High-Level Specifications an Adaptable Strategies”.
Petersen et al., “IDA-Intrusion Detection Alert”,1992, pp. 306-311.
Sandhu et al., “Role-Based Access Control: A Multi-Dimensional View”, 1994, pp. 54-62.
Song, et al., “Design and Implementation of a Security Management System”, 1995, pp. 261-264.
International Preliminary Examination Report dated Aug. 6, 2002.
Lin et al., “Abstraction-Based Misuse Detection: High-Level Specifications an Adaptable Strategies”, 1998, p. 1-12, Proceedings of 11thComp. Sec. Found. Workshop.
El-Hanani Yuval
Moran Tal
Raanan Gil
Reshef Eran
Powers William S
Thelen Reid Brown Raysman & Steiner LLP
Watchfire Corporation
LandOfFree
Method and system for verifying a client request does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and system for verifying a client request, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and system for verifying a client request will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3863548