Electrical computers and digital processing systems: support – Digital data processing system initialization or configuration – Loading initialization program
Reexamination Certificate
2006-06-06
2006-06-06
Wright, Norman M. (Department: 2134)
Electrical computers and digital processing systems: support
Digital data processing system initialization or configuration
Loading initialization program
C726S030000, C726S007000
Reexamination Certificate
active
07058798
ABSTRACT:
The basic concept is that before a resource is accessed, the entity that has the burden of gathering the credentials, pro-actively refreshes the credentials and keeps them current. In one instance, a presenter of credentials, for example, a client, pro-actively refreshes the credentials such that at the time of presentation, the credentials meet the resource-specific constraints of a recipient of credentials, for example, a resource server. For each resource that it protects, a resource server typically establishes various constraints such as a recency requirement, which specifies how recently a credential has to have been issued to be accepted as an adequate credential. Other constraints may include maximum certificate chain length, trust level and so forth. In another instance, a recipient of credentials pro-actively gathers and refreshes credentials to prevent un-authorized access to the various resources it is protecting.
REFERENCES:
patent: 5173939 (1992-12-01), Abadi et al.
patent: 5220604 (1993-06-01), Gasser
patent: 5224163 (1993-06-01), Gasser et al.
patent: 5261002 (1993-11-01), Perlman et al.
patent: 5283830 (1994-02-01), Hinsley et al.
patent: 5315657 (1994-05-01), Abadi et al.
patent: 5586260 (1996-12-01), Hu
patent: 5764772 (1998-06-01), Kaufman et al.
patent: 5768519 (1998-06-01), Swift et al.
patent: 5901227 (1999-05-01), Perlman
patent: 5991807 (1999-11-01), Schmidt et al.
patent: 6079020 (2000-06-01), Liu
patent: 6088805 (2000-07-01), Davis et al.
patent: 6138235 (2000-10-01), Lipkin et al.
patent: 6158011 (2000-12-01), Chen et al.
patent: 6212634 (2001-04-01), Geer et al.
patent: 6216231 (2001-04-01), Stubblebine
patent: 6223291 (2001-04-01), Puhl et al.
patent: 6230266 (2001-05-01), Perlman et al.
patent: 6256741 (2001-07-01), Stubblebine
patent: 6263434 (2001-07-01), Hanna et al.
patent: 6275941 (2001-08-01), Saito et al.
patent: 6301658 (2001-10-01), Koehler
patent: 6308274 (2001-10-01), Swift
patent: 6366913 (2002-04-01), Fitler et al.
patent: 6370648 (2002-04-01), Diep
patent: 6397329 (2002-05-01), Aiello et al.
patent: 6405313 (2002-06-01), Reiter et al.
patent: 6438690 (2002-08-01), Patel et al.
patent: 6496858 (2002-12-01), Frailong et al.
patent: 6678700 (2004-01-01), Moore et al.
patent: 6732277 (2004-05-01), Vandergeest et al.
patent: 6883100 (2005-04-01), Elley et al.
patent: 2002/0144149 (2002-10-01), Hannah et al.
patent: 2003/0028585 (2003-02-01), Yeager et al.
patent: 2003/0041141 (2003-02-01), Abdelaziz et al.
patent: 2003/0055894 (2003-03-01), Yeager et al.
patent: 2003/0055898 (2003-03-01), Yeager et al.
patent: 2003/0056093 (2003-03-01), Huitema et al.
patent: 2004/0054899 (2004-03-01), Balfanz et al.
patent: 0779570 (1997-06-01), None
patent: 0942568 (1999-09-01), None
patent: WO 98/10381 (1998-03-01), None
patent: WO 99/41878 (1999-08-01), None
Gaul et al., “Mining Generalized Association Rules for Sequential and Path Data,” 2001,IEEE,pp. 593-596.
Kaufman, Charlie et al., “Network Security, Private Communication in a Public World,” PTR Prentic Hall, 1995, chapters 5, 7 and 8 pp. 129-161, and pp. 177-222.
Kaufman, Charlie et al., “Network Security, Private Communication in a Public World,” PTR Prentice Hall, 1995, pp. 455-459.
Micali, “Enhanced Certificate Revocation System,” MIT Laboratory for Computer Science.
Micali, “Efficient Certificate Revocation,” MIT Laboratory for Computer Science (Mar. 22, 1996).
Myers et al., “X.509 Internet Public Key Infrastructure Online Cerfificate Status Protocol OCSP,” (Sep., 1998).
Morrissey, P., “Demystifying Crisco Access Control Lists,” Apr. 1998,Network Computing,pp. 116, 118 and 120.
Rivest, “Can We Eliminate Certificate Revocation Lists?” MIT Laboratory for Computer Science.
Ryutov et al., “Access Control Framework for Distributed Application,”USC/Information Sciences Institute(Aug. 7, 1998).
Woo et al., “A Framework for Distributed Authorization” Nov. 1993, ACM 1stConference Computer and Communication Security, p. 112-118.
International Search Report completed on Oct. 2, 2002 amd mailed Oct. 9, 2002.
Anderson Anne H.
Elley Yassir K.
Hanna Stephen R.
Mullan Sean J.
Perlman Radia Joy
Kudirka & Jobse LLP
Wright Norman M.
LandOfFree
Method ans system for pro-active credential refreshing does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method ans system for pro-active credential refreshing, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method ans system for pro-active credential refreshing will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3626684