Data processing: artificial intelligence – Knowledge processing system – Knowledge representation and reasoning technique
Reexamination Certificate
2005-07-22
2009-06-02
Holmes, Michael B (Department: 2129)
Data processing: artificial intelligence
Knowledge processing system
Knowledge representation and reasoning technique
Reexamination Certificate
active
07542957
ABSTRACT:
Method to build rich input validation rules to address values not previously validated by type based rules or regular expressions available in current validation engines. These new validation rules have a rich set of ordered validation rule primitives (VRPs) with acceptance VRP or rejection VRP, thus the new validation rules have capabilities to handle complex data values. Also disclosed is method to build a validation rule applied to data elements defined using a Perl regular expression.
REFERENCES:
patent: 6311194 (2001-10-01), Sheth et al.
patent: 6826695 (2004-11-01), House et al.
patent: 6874025 (2005-03-01), Hoogenboom et al.
patent: 6915454 (2005-07-01), Moore et al.
patent: 7143111 (2006-11-01), Yamada
patent: 7165249 (2007-01-01), Potter et al.
patent: 7203928 (2007-04-01), Mandava et al.
patent: 7254581 (2007-08-01), Johnson et al.
patent: 7290288 (2007-10-01), Gregg et al.
patent: 7296297 (2007-11-01), Kirkpatrick et al.
patent: 7340714 (2008-03-01), Upton
patent: 7366892 (2008-04-01), Spaur et al.
patent: 7424616 (2008-09-01), Brandenburg et al.
patent: 7451352 (2008-11-01), Moore et al.
patent: 7472413 (2008-12-01), Mowshowitz
patent: 2003/0037236 (2003-02-01), Simon et al.
patent: 2004/0189708 (2004-09-01), Larcheveque et al.
patent: 2005/0125438 (2005-06-01), Krishnaswamy et al.
patent: 2005/0228984 (2005-10-01), Edery et al.
Warnings for Disjoint Knowledge Omission in Ontologies Qadir, M.A.; Noshairwan, W.; Internet and Web Applications and Services, 2007. ICIW '07. Second International Conference on May 13-19, 2007 pp. 45-45 Digital Object Identifier 10.1109/ICIW.2007.69.
CERT®, “Understanding Malicious Content Mitigation for Web Developers”, CERT® Coordination Center, Feb. 2000, http://www.cert.org/tech—tips/m-alicious—code—mitigation.html and http://www.cert.org/tech—tips/malicious—-code—FAQ.html, pp. 1-9.
CERT®, “CERT® Advisory CA-2000-02 Malicious HTML Tags Embedded in Client Web Requests”, CERT® Coordination Center, Feb. 2000, http://www.cert.org/advisories/CA-20-00-02.html, pp. 1-7.
Struts, The Apache Software Foundation, 2000-2004, http://struts.apache.org/userGuide/dev—validator.html, pp. 1-18.
“A survey of Trust in Internet Applications”; Gradison et al.; IEEE Communications Surveys and Tutorials, Fourth Quarter 2000; Jan. 24, 2001; [http://www.comsoc.org/pubs/surveys/] [Section 6.4], pp. 1-28.
“Specifying and Enforcing Application-Level Web Security Policies”; Scott et al. IEEE Transactions on Knowledge and Data Engineering, vol. 15, No. 4, Jul./Aug. 2003 [whole document]; pp. 771-783.
“Nedgty: Web Services Firewall”; Bebawy et al.; Proceedings of the IEEE International Conference on Web Services, 2005 (ICWS 2005) Jul. 15, 2005 [Section 3], [Section 4], pp. 5 pages.
Masson Matt
Roy Patrick
Holmes Michael B
International Business Machines - Corporation
Patent Ingenuity, P.C.
Simpson Samuel K.
LandOfFree
Rich Web application input validation does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Rich Web application input validation, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Rich Web application input validation will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4131616