Information security – Access control or authentication – Network
Reexamination Certificate
2006-02-07
2006-02-07
Jung, David (Department: 2134)
Information security
Access control or authentication
Network
C726S003000, C726S012000
Reexamination Certificate
active
06996840
ABSTRACT:
The present invention relates to a method for executing a security critical activity in a security device (40), wherein the security critical activity is executed with user involvement. Each security critical activity is divided into a number of situations/actions, belonging either to a proxy letter group or a user involvement group. The processor (42) of the security device (40) starts the execution of an action of a security critical activity, and then checks if this situation/action can be handled by a proxy letter or shall be handled by a user. If the user or the proxy letter grants the situation/action the execution of the action is continued and ended. This is repeated until all actions of the security critical activity have been executed. If neither the user nor the proxy letter grants the situation/action the execution of the security critical activity will be stopped.
REFERENCES:
patent: 4809160 (1989-02-01), Mahon et al.
patent: 5406624 (1995-04-01), Tulpan
patent: 5596718 (1997-01-01), Boebert et al.
patent: 5680452 (1997-10-01), Shanton
patent: 5845068 (1998-12-01), Winiger
patent: 5914472 (1999-06-01), Foladare et al.
patent: 5920861 (1999-07-01), Hall et al.
patent: 5933498 (1999-08-01), Schneck et al.
patent: 6009518 (1999-12-01), Shiakallis
patent: 6530024 (2003-03-01), Proctor
patent: 2001/0014839 (2001-08-01), Belanger et al.
patent: 2 267 986 (1993-12-01), None
patent: WO 94/01821 (1994-01-01), None
patent: WO 98/19243 (1998-05-01), None
Computer security: Proxy-based security protocols in networked mobile devices; M. Burnside, D. Clarke, T. Mills, A. Maywah, S. Devadas, R. Rivest ; Mar. 2002; Proceedings of the 2002 ACM symposium on Applied computing.
Security: A privacy-protecting proxy signature scheme and its application; Jia-Zhu Dai, Xiao-Hu Yang, Jin-Xiang Dong ; Apr. 2004 ;Proceedings of the 42nd annual Southeast regional conference.
On the security of some proxy blind signature schemes; Hung-Min Sun, Bin-Tsan Hsieh; Jan. 2004 ; Proceedings of the second workshop on Australasian information security, Data Mining and Web Intelligence, and Software Internationalisation—vol. 32 C.
Jung David
Myspace AB
Young & Thompson
LandOfFree
Method for executing a security critical activity does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method for executing a security critical activity, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for executing a security critical activity will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3648955