Secure sharing of personal devices among different users

Information security – Prevention of unauthorized use of data including prevention... – Access control

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

Reexamination Certificate

active

07143443

ABSTRACT:
A registry architecture for securely sharing personal devices among different users is disclosed. The registry architecture is a distributed architecture that includes at least one registry server communicating over a network with at least one personal device. The architecture provides verification and authorization of users and applications on personal devices registered with the registry server. In addition, secure migration of applications between a first personal device and at least one second personal device may be performed as a function of the registry architecture. Further, the ability to securely share a personal device among different users is provided by identification of potential users of the personal device within the registry architecture.

REFERENCES:
patent: 6055636 (2000-04-01), Hillier et al.
patent: 6073242 (2000-06-01), Hardy et al.
patent: 6453419 (2002-09-01), Flint et al.
patent: 6499109 (2002-12-01), Balasubramaniam et al.
patent: 6510236 (2003-01-01), Crane et al.
patent: 6789191 (2004-09-01), Lapstun et al.
patent: 6862594 (2005-03-01), Saulpaugh et al.
patent: 6889376 (2005-05-01), Barritz et al.
patent: H10-247177 (1998-09-01), None
patent: 2001-77858 (2001-03-01), None
Sandhu, R.; Coyne, Edward J.; Feinstein, Hal L. and Youman, Charles E., “Role-Based Access Control Models,”IEEE Computer, vol. 29, No. 2, Feb. 1996.
Sandhu, Ravi and Park, Joon S., “Decentralized User-Role Assignment for Web-based Intranets,” In Proc. of the 3rdACM Workshop on Role-Based Access Control, Oct. 1998.
Tezuka, Satoru; Sasaki, Ryoichi and Kataoka, Masanori, “Seamless Object Authentication in Different Security Policy Domains,” In Proc. of 33rdHawaii International Conference on System Sciences, Jan. 2000.
Demurjian, S.A.; Ting, T.C.; Balthazar, J.; Ren, H.; Phillips, C. and Barr, P., “Role-Based Security in a Distributed Resource Environment,” In Proc. of Fourteenth IFIP WG 11.3 Working Conference on Database Security, Aug. 2000.
Chu, H; Song, H.; Wong, C. and Kurakake, S., “Seamless Applications over Roam . System,”UbiTools '01(Part ofACM UbiComp '01), Sep. 2001, http://choices.cs.uiuc.edu/UbiTools01/.
Office Action mailed May 16, 2006. Notice for reasons for rejection. English and Japanese translations. 8 pages.
Akirhiro Hokimoto and Tatsuo Nakajima, “Mobility Support for Mobile Applications Using Service Proxies”.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Secure sharing of personal devices among different users does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Secure sharing of personal devices among different users, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Secure sharing of personal devices among different users will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3659522

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.