Information security – Prevention of unauthorized use of data including prevention... – Access control
Reexamination Certificate
2011-08-16
2011-08-16
Flynn, Nathan (Department: 2431)
Information security
Prevention of unauthorized use of data including prevention...
Access control
C726S002000, C380S247000, C455S026100
Reexamination Certificate
active
08001615
ABSTRACT:
A method for managing the security of applications with a security module associated to an equipment connected to a network managed by a control server of an operator. The applications use resources as data or functions stored in the security module locally connected to the equipment. The method may include steps of receiving, analyzing and verifying, by the control server, identification data from the equipment and the security module, generating a cryptogram from the result of the verification of the identification data, transmitting the cryptogram to the security module of the equipment, and selectively activating or selectively deactivating by the security module at least one resource as data or functions of the security module by executing instructions included in the cryptogram and conditioning the functioning of an application according to criteria established by a supplier of the application or the operator or a user of the equipment.
REFERENCES:
patent: 5864757 (1999-01-01), Parker
patent: 5898783 (1999-04-01), Rohrbach
patent: 6553375 (2003-04-01), Huang et al.
patent: 6711262 (2004-03-01), Vatanen
patent: 6804707 (2004-10-01), Ronning
patent: 6944859 (2005-09-01), Bunger
patent: 6947727 (2005-09-01), Brynielsson
patent: 7024226 (2006-04-01), Sandberg et al.
patent: 7133920 (2006-11-01), Tsujisawa
patent: 2002/0062451 (2002-05-01), Scheidt et al.
patent: 2002/0077094 (2002-06-01), Leppanen
patent: 2002/0169983 (2002-11-01), Rygaard
patent: 2002/0186845 (2002-12-01), Dutta et al.
patent: 2002/0188736 (2002-12-01), Jarvensivu
patent: 2002/0197991 (2002-12-01), Anvekar et al.
patent: 2003/0041125 (2003-02-01), Salomon
patent: 2003/0114144 (2003-06-01), Minemura
patent: 2003/0236867 (2003-12-01), Natsuno et al.
patent: 2004/0092248 (2004-05-01), Kelkar et al.
patent: 2004/0110488 (2004-06-01), Komsi
patent: 2004/0172542 (2004-09-01), Minemura
patent: 2004/0205749 (2004-10-01), Dalton et al.
patent: 2004/0250074 (2004-12-01), Kilian-Kehr
patent: 2005/0021592 (2005-01-01), Patel et al.
patent: 2005/0222949 (2005-10-01), Inotay et al.
patent: 2005/0246282 (2005-11-01), Naslund et al.
patent: 2008/0233942 (2008-09-01), Kim
patent: 0757502 (1996-07-01), None
patent: WO 0042498 (2000-07-01), None
Cantini Renato
Ksontini Rached
Flynn Nathan
Harness & Dickey & Pierce P.L.C.
Nagravision S.A.
Swisscom Mobile AG
Vaughan Michael R
LandOfFree
Method for managing the security of applications with a... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method for managing the security of applications with a..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for managing the security of applications with a... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2638525