Information security – Prevention of unauthorized use of data including prevention...
Reexamination Certificate
2006-08-29
2006-08-29
Zand, Kambiz (Department: 2132)
Information security
Prevention of unauthorized use of data including prevention...
C726S004000, C713S185000
Reexamination Certificate
active
07100206
ABSTRACT:
A method for secured access to data in a network has the effect that data protection rights are respected, especially personal data present in a network with distributed memories. The method is based on the granting of access rights, with the possibility of revocation, to the data available in the network, and the storage of data within the network only after authorization by the owner of the rights to the data. When certain data are requested, only the references of those data records to which the requesting party also has the access rights can be given. Identification of the data is not possible without access rights. Should certain data be accessed, the access rights may be verified before data access is permitted.
REFERENCES:
patent: 5678041 (1997-10-01), Baker et al.
patent: 5694471 (1997-12-01), Chen et al.
patent: 5699526 (1997-12-01), Siefert
patent: 5787175 (1998-07-01), Carter
patent: 5867821 (1999-02-01), Ballantyne et al.
patent: 6055506 (2000-04-01), Frasca, Jr.
patent: 6234964 (2001-05-01), Iliff
patent: 6463417 (2002-10-01), Schoenberg
patent: 6651060 (2003-11-01), Harper et al.
patent: 0398492 (1990-11-01), None
patent: 10111897 (1998-04-01), None
patent: 9729428 (1997-08-01), None
patent: 9815910 (1998-04-01), None
patent: WO 98/15910 (1998-04-01), None
Article: S. De Capitani di Vimercati et al., “Access Control in Federated Systems”Association For Computing Machinery ISBN: New Paradigms Workshop(Sep. 17-20, 1996), pp. 87-99.
D. Caramella et al., “Security Management For Radiological Information Systems”,CAR 97(Jun. 1997), pp. 25-28 (Abstract of Article).
Article: Telesec Kommunikationssicherheit, “Telekom, Produkentwicklung Telesec beim Fernmeldeamt Siegen” (1994), pp. 7-14.
C. Piret et al., “Development of a Coherent Policy of Security-Confidentiality in a Heterogeneous University Hospital in Belgium”,Proceedings of Medical Informatics, Europe 96 (1996), pp. 951-956.
Kramsky Elliott N.
Zand Kambiz
LandOfFree
Method for secured access to data in a network does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method for secured access to data in a network, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for secured access to data in a network will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3666002