Method of controlling access to cryptographic resources

Cryptography – Cellular telephone cryptographic authentication

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S277000, C380S278000, C380S280000

Reexamination Certificate

active

07496199

ABSTRACT:
The cryptographic resources are supplied by at least one cryptographic source having a specific access interface. The application is presented with a mutualized interface substantially independent of the cryptographic sources and of their respective access interfaces. A translation module is placed between the mutualized interface and each interface for accessing a cryptographic source to provide access to the cryptographic resources from the application via the mutualized interface.

REFERENCES:
patent: 5559887 (1996-09-01), Davis et al.
patent: 5689565 (1997-11-01), Spies et al.
patent: 5787175 (1998-07-01), Carter
patent: 5790677 (1998-08-01), Fox et al.
patent: 5913024 (1999-06-01), Green et al.
patent: 5966448 (1999-10-01), Namba et al.
patent: 6389535 (2002-05-01), Thomlinson et al.
patent: RE38070 (2003-04-01), Spies et al.
patent: 6681327 (2004-01-01), Jardin
patent: 6732277 (2004-05-01), Vandergeest et al.
patent: 6839437 (2005-01-01), Crane et al.
patent: 7110548 (2006-09-01), Ougi et al.
patent: 7149510 (2006-12-01), Hansson et al.
patent: 7167985 (2007-01-01), Ahmed
patent: 7181017 (2007-02-01), Nagel et al.
patent: 2002/0056044 (2002-05-01), Andersson
patent: 2002/0143813 (2002-10-01), Jellum et al.
patent: 2002/0162021 (2002-10-01), Audebert et al.
patent: 2003/0079128 (2003-04-01), Mullen et al.
patent: 2004/0025022 (2004-02-01), Yach et al.
patent: 2004/0148429 (2004-07-01), Audebert et al.
patent: 2004/0215661 (2004-10-01), Zhang et al.
patent: WO 01/35194 (2001-05-01), None
patent: WO0135194 (2001-05-01), None
patent: WO 2006072692 (2006-07-01), None
The Open Group, Technical Standard Common Security: CDSA and CSSM Version 2 (with Corrigenda), pp. 47-70.
Gian Pietro Picco, Gruia-Catalin Roman, Peter J. McCann, “Reasoning about code mobility with mobile UNITY”, Jul. 2001, ACM Transactions on Software Engineering and Methodology (TOSEM), pp. 338-395.
Emms, “A Definition of an Access Control Systems Language,”Computer Standards and Interfaces, 6 (4), pp. 443-454, Elsevier Sequoia, Lausanne, Switzerland (1987).

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method of controlling access to cryptographic resources does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method of controlling access to cryptographic resources, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method of controlling access to cryptographic resources will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4059220

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.