Electrical computers and digital processing systems: multicomput – Computer-to-computer session/connection establishing – Network resources access controlling
Reexamination Certificate
2006-05-12
2010-10-26
Osman, Ramy M (Department: 2457)
Electrical computers and digital processing systems: multicomput
Computer-to-computer session/connection establishing
Network resources access controlling
C709S217000
Reexamination Certificate
active
07822863
ABSTRACT:
A method of accessing a data resource identifies the data resource, the data resource accessible through a first device and associated with a resource locator, the first device configured to provide access to the data resource responsive to possession of a whitelisted credential. The method includes receiving a second-device credential from a second device by a personal domain controller, the personal domain controller and the first device within a first trusted relationship and provides, by the personal domain controller, the second-device credential to the first device for whitelisting subject to the first trusted relationship. The method uses, by the second device, the second-device credential to access the data resource responsive to the resource locator.
REFERENCES:
patent: 6397261 (2002-05-01), Eldridge et al.
patent: 6601102 (2003-07-01), Eldridge et al.
patent: 6971017 (2005-11-01), Stringer et al.
patent: 7424736 (2008-09-01), Cook et al.
patent: 2003/0061511 (2003-03-01), Fischer
patent: 2003/0236895 (2003-12-01), Ohkubo et al.
patent: 2005/0213763 (2005-09-01), Owen et al.
patent: 2005/0249200 (2005-11-01), Oelsner
patent: 2007/0130457 (2007-06-01), Kamat et al.
patent: 1 594 317 (2005-09-01), None
patent: 2003 299064 (2003-10-01), None
patent: WO 03/067594 (2003-08-01), None
patent: WO2005/125091 (2005-12-01), None
Abadi, M.; Burrows, M.; Lampson, B.; “A Calculus for Access Control in Distributed Systems,”Lecture Notes in Computer Science No. 576, Springer, 1992, (29 pages).
Balfanz, D.; Dean, D.; Spreitzer, M.; “A Security Infrastructure for Distributed Java Applications,”21th IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, CA, May 2000 (12 pages).
Balfanz, D.; Durfee, G.; Grinter, R.; Smetters, D.K.; Stewart, P.; “Network-in-a-Box: How to Set Up a Secure Wireless Network in Under a Minute,”Proceedings of the 13thUSENIX Security Symposium, San Diego, CA, Aug. 2004.
Balfanz, D.; Smetters, D. K.; Stewart, P.; Wong, H. Chi; “Talking to Strangers: Authentication in Ad-Hoc Wireless Networks,”Proceedings of the 2002 Network and Distributed Systems Security Symposium(NDSS '02), San Diego, CA, Feb. 2002. The Internet Society (13 pages).
Bauer, L.; Schneider, M.A.; Felten, E.W.; “A General and Flexible Access-Control System for the Web,”Proceedings of the 11thUSENIX Security Symposium, San Francisco, CA, Aug. 2002. (16 pages).
Blaze, M.; Feigenbaum, J.; Ioannidis, J.; and Keromytis, A.; “The KeyNote Trust-Management System Version 2,”IETF—Network Working Group, The Internet Society, Sep. 1999. RFC 2704 (35 pages).
Corner, M. D.; Noble, B. D.; “Zero-Interaction Authentication,”Proceedings of the Eighth Annual International Conference on Mobile Computing and Networking(MOBICOM-02), New York, Sep. 23-28 2002, ACM Press (11 pages).
Lorrie Faith Cranor and Simpson Garfinkel, editors, “Security and Usability—Designing Secure Systems the People Can Use,” chapter 16, O'Reilly Media, Inc., 2005.
DeTreville, J.; “Binder, a Logic-Based Security Language,”2002 IEEE Symposium on Security and Privacy, Oakland, CA, May 2002 (9 pages).
GoToMyPC, http://www.gotomypc.com (1 page).
Halpern, J.Y.; van der Meyden, R.; “A Logic for SDSI's Linked Local Name Spaces” (Preliminary Version),Proceedings of the 12thIEEE Computer Security Foundations Workshop, Mordano, Italy, Jun. 1999, (12 pages).
Orb Networks, http://www.orb.com (1 page).
Oprea, A.; Balfanz, D.; Durfee, G.; Smetters, D.K.; “Securing a Remote Terminal Application with a Mobile Trusted Device,”Proceedings of the Annual Computer Security Applications Conference, Tucson, AZ, Dec. 2004 (10 pages).
Smetters, D.K.; Grinter, R. E.; “Moving From the Design of Usable Security Technologies to the Design of Useful Secure Applications,”New Security Paradigms Workshop'02, ACM 2002 (8 pages).
Stajano, F.; Anderson, R.; “The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks,”7thSecurity Protocols Workshop, vol. 1796 ofLecture Notes in Computer Science, Cambridge, United Kingdom, 1999, Springer-Verlag, Berlin Germany (11 pages).
DVB-Digital Video Broadcasting: “Digital Video Broadcasting (DVB); Content Protection & Copy Management,” DVB Document A094, Nov. 2005, (103 pages).
Balfanz Dirk
Durfee Glenn E.
Smetters Diana K.
Smith Trevor F.
Marger & Johnson & McCollom, P.C.
McLeod Marshall
Osman Ramy M
Palo Alto Research Center Incorporated
LandOfFree
Personal domain controller does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Personal domain controller, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Personal domain controller will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4185738