Information security – Access control or authentication – Network
Reexamination Certificate
2006-06-20
2006-06-20
Revak, Christopher (Department: 2131)
Information security
Access control or authentication
Network
C726S001000, C709S229000
Reexamination Certificate
active
07065783
ABSTRACT:
A mobile application security system and method, in the preferred embodiment, ensures the integrity of a mobile application's multi-jump access control list (ACL) by either (a) checking the compatibility of a mobile application's multi-jump ACL with a known accurate multi-jump ACL, or (b) overwriting a mobile application's multi-jump ACL with an ACL which is known to be accurate, depending on whether the host dispatching the mobile application is trusted or not trusted to modify a mobile application's multi-jump ACL, respectively.
REFERENCES:
patent: 5633932 (1997-05-01), Davis et al.
patent: 5787427 (1998-07-01), Benantar et al.
patent: 5850516 (1998-12-01), Schneier
patent: 5850517 (1998-12-01), Verkler et al.
patent: 5963731 (1999-10-01), Sagawa et al.
patent: 5968176 (1999-10-01), Nessett et al.
patent: 5974549 (1999-10-01), Golan
patent: 6009456 (1999-12-01), Frew et al.
patent: 6065118 (2000-05-01), Bull et al.
patent: 6141754 (2000-10-01), Choy
patent: 6148327 (2000-11-01), Whitebread et al.
patent: 6173405 (2001-01-01), Nagel
patent: 6189103 (2001-02-01), Nevarez et al.
patent: 6192354 (2001-02-01), Bigus et al.
patent: 6233601 (2001-05-01), Walsh
patent: 6272528 (2001-08-01), Cullen et al.
patent: 6308181 (2001-10-01), Jarvis
patent: 6539416 (2003-03-01), Takewaki et al.
patent: 6615232 (2003-09-01), Suzuki et al.
patent: 6622157 (2003-09-01), Heddaya et al.
patent: 6931550 (2005-08-01), Rygaard
patent: 0942370 (1999-09-01), None
Hamilton, “Sun Microsystems JavaBeans”, Aug. 8, 1997, Sun Microsystems Inc., p. 1-114.
W.A. Jansen, “A Privilege Management Scheme for Mobile Agent Systems” NIST May 2001.
Wayne Jansen, “Countermeasures for Mobile Agent Security”, NIST Nov. 2000.
Wayne Jansen et al., “Privilege Management of Mobile Agents”, NIST Oct. 2000.
W. Jansen, “Intrusion Detection with Mobile Agents” Computer Communications Journal, Special Issue On Intrusion Detection Oct. 2, 2001.
“Jumping Beans™ White Paper” Ad Astra Engineering, Incorporated Dec. 1998.
Intrusion Detection with Mobile Agents, Computer Communications Journal, Special Issue on Intrusion Detection, Jansen.
Determining Privileges of Mobile Agents, Proceedings of the Computer Security Applications Conference, Dec. 2001. Jansen.
A Privilege Management Scheme for Mobile Agent Systems, First International Workshop on Security of Mobile Multiagent Systems, Autonomous Agents Conference, May 2001. Jansen.
A Denial of Service Resistant Intrusion Detection Architecture, Computer Networks, Special Issue on Intrusion Detection, Elsevier Science BV, Nov. 2000. Mell et al.
Countermeasures for Mobile Agent Security, Computer Communications, Special Issue on Advanced Security Techniques for Network Protection, Elsevier Science BV, Nov. 2000. Jansen.
Privilege Management of Mobile Agents, National Information System Security Conference, Oct. 2000. Jansen et al.
Mobile Agent Attack Resistant Distributed Hierarchical Intrusion Detection Systems, Second International t Workshop on Recent Advances in Intrusion Detection, Sep. 1999, Purdue University. Mell et al.
Applying Mobile Agents to Intrusion Detection and ResponseNISTIR 6416, Sep. 1999. Jansen et al.
Mobile Agent Security, NIST Special Publication 800-19, Aug. 1999. Jansen et al.
Agents for the Masses: Is it Possible To Make Development of Sophisticated Agents Simple Enough To Be Practical?, IEEE Intelligent Systems, Special Issue on Agents, May-Jun., 1999. Bradshaw et al.
Network Security Testing Using Mobile AgentsThird International Conference and Exhibition on the Practical Application of Intelligent and multi-Agent Technology. London, UK Mar. 1998. Karygiannis.
A Framework For Multi-Mode Authentication: Overview and Implementation Guide. NISTIR 7046 Aug. 2003. Jansen et al.
Picture Password: A Visual Login Technique for Mobile Devices. NISTIR 7030, Jul. 2003. Jansen et al.
Security Policy Management for Handheld Devices. The Int'l. Conference on Security and Management (SAM'03), Jun. 2003. Jansen et al.
Authenticating Users on Handheld Devices, Proceedings of the Canadian Information Technology Security Symposium, May 2003. Jansen.
Policy Expression and Enforcement for Handheld Devices, NISTIR 6981, May 2003. Jansen et al.
Assigning and Enforcing Security Policies on Handheld Devices, Proceedings of the Canadian Information Technology Security Symposium, May 2002. Jansen et al.
PCT International Search Report dated Jan. 2, 2003 corresponding to PCT US02/21186.
Office Action dated Dec. 18, 2003 for U.S. Appl. No. 09/764,548, filed Jan. 18, 2001.
Office Action dated Dec. 22, 2003 for U.S. Appl. No. 09/591,034, filed Jun. 9, 2000.
Office Action dated Dec. 31, 2003 for U.S. Appl. No. 09/758,941, filed Jan. 10, 2001.
Office Action dated Dec. 31, 2003 for U.S. Appl. No. 09/645,028, filed Aug. 23, 2000.
PCT International Search Report dated Jan. 2, 2003 corresponding to PCT US02/21186.
Aramira Corporation
Revak Christopher
LandOfFree
Mobile application access control list security system does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Mobile application access control list security system, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Mobile application access control list security system will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3655836