Method for managing the security of applications with a...

Information security – Prevention of unauthorized use of data including prevention... – Access control

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S002000, C380S247000, C455S026100

Reexamination Certificate

active

08001615

ABSTRACT:
A method for managing the security of applications with a security module associated to an equipment connected to a network managed by a control server of an operator. The applications use resources as data or functions stored in the security module locally connected to the equipment. The method may include steps of receiving, analyzing and verifying, by the control server, identification data from the equipment and the security module, generating a cryptogram from the result of the verification of the identification data, transmitting the cryptogram to the security module of the equipment, and selectively activating or selectively deactivating by the security module at least one resource as data or functions of the security module by executing instructions included in the cryptogram and conditioning the functioning of an application according to criteria established by a supplier of the application or the operator or a user of the equipment.

REFERENCES:
patent: 5864757 (1999-01-01), Parker
patent: 5898783 (1999-04-01), Rohrbach
patent: 6553375 (2003-04-01), Huang et al.
patent: 6711262 (2004-03-01), Vatanen
patent: 6804707 (2004-10-01), Ronning
patent: 6944859 (2005-09-01), Bunger
patent: 6947727 (2005-09-01), Brynielsson
patent: 7024226 (2006-04-01), Sandberg et al.
patent: 7133920 (2006-11-01), Tsujisawa
patent: 2002/0062451 (2002-05-01), Scheidt et al.
patent: 2002/0077094 (2002-06-01), Leppanen
patent: 2002/0169983 (2002-11-01), Rygaard
patent: 2002/0186845 (2002-12-01), Dutta et al.
patent: 2002/0188736 (2002-12-01), Jarvensivu
patent: 2002/0197991 (2002-12-01), Anvekar et al.
patent: 2003/0041125 (2003-02-01), Salomon
patent: 2003/0114144 (2003-06-01), Minemura
patent: 2003/0236867 (2003-12-01), Natsuno et al.
patent: 2004/0092248 (2004-05-01), Kelkar et al.
patent: 2004/0110488 (2004-06-01), Komsi
patent: 2004/0172542 (2004-09-01), Minemura
patent: 2004/0205749 (2004-10-01), Dalton et al.
patent: 2004/0250074 (2004-12-01), Kilian-Kehr
patent: 2005/0021592 (2005-01-01), Patel et al.
patent: 2005/0222949 (2005-10-01), Inotay et al.
patent: 2005/0246282 (2005-11-01), Naslund et al.
patent: 2008/0233942 (2008-09-01), Kim
patent: 0757502 (1996-07-01), None
patent: WO 0042498 (2000-07-01), None

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method for managing the security of applications with a... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method for managing the security of applications with a..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for managing the security of applications with a... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2638525

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.