Method for executing a security critical activity

Information security – Access control or authentication – Network

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S003000, C726S012000

Reexamination Certificate

active

06996840

ABSTRACT:
The present invention relates to a method for executing a security critical activity in a security device (40), wherein the security critical activity is executed with user involvement. Each security critical activity is divided into a number of situations/actions, belonging either to a proxy letter group or a user involvement group. The processor (42) of the security device (40) starts the execution of an action of a security critical activity, and then checks if this situation/action can be handled by a proxy letter or shall be handled by a user. If the user or the proxy letter grants the situation/action the execution of the action is continued and ended. This is repeated until all actions of the security critical activity have been executed. If neither the user nor the proxy letter grants the situation/action the execution of the security critical activity will be stopped.

REFERENCES:
patent: 4809160 (1989-02-01), Mahon et al.
patent: 5406624 (1995-04-01), Tulpan
patent: 5596718 (1997-01-01), Boebert et al.
patent: 5680452 (1997-10-01), Shanton
patent: 5845068 (1998-12-01), Winiger
patent: 5914472 (1999-06-01), Foladare et al.
patent: 5920861 (1999-07-01), Hall et al.
patent: 5933498 (1999-08-01), Schneck et al.
patent: 6009518 (1999-12-01), Shiakallis
patent: 6530024 (2003-03-01), Proctor
patent: 2001/0014839 (2001-08-01), Belanger et al.
patent: 2 267 986 (1993-12-01), None
patent: WO 94/01821 (1994-01-01), None
patent: WO 98/19243 (1998-05-01), None
Computer security: Proxy-based security protocols in networked mobile devices; M. Burnside, D. Clarke, T. Mills, A. Maywah, S. Devadas, R. Rivest ; Mar. 2002; Proceedings of the 2002 ACM symposium on Applied computing.
Security: A privacy-protecting proxy signature scheme and its application; Jia-Zhu Dai, Xiao-Hu Yang, Jin-Xiang Dong ; Apr. 2004 ;Proceedings of the 42nd annual Southeast regional conference.
On the security of some proxy blind signature schemes; Hung-Min Sun, Bin-Tsan Hsieh; Jan. 2004 ; Proceedings of the second workshop on Australasian information security, Data Mining and Web Intelligence, and Software Internationalisation—vol. 32 C.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method for executing a security critical activity does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method for executing a security critical activity, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for executing a security critical activity will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3648955

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.