Information security – Prevention of unauthorized use of data including prevention... – Access control
Reexamination Certificate
2006-11-28
2006-11-28
Louis-Jacques, Jacques H. (Department: 2134)
Information security
Prevention of unauthorized use of data including prevention...
Access control
Reexamination Certificate
active
07143443
ABSTRACT:
A registry architecture for securely sharing personal devices among different users is disclosed. The registry architecture is a distributed architecture that includes at least one registry server communicating over a network with at least one personal device. The architecture provides verification and authorization of users and applications on personal devices registered with the registry server. In addition, secure migration of applications between a first personal device and at least one second personal device may be performed as a function of the registry architecture. Further, the ability to securely share a personal device among different users is provided by identification of potential users of the personal device within the registry architecture.
REFERENCES:
patent: 6055636 (2000-04-01), Hillier et al.
patent: 6073242 (2000-06-01), Hardy et al.
patent: 6453419 (2002-09-01), Flint et al.
patent: 6499109 (2002-12-01), Balasubramaniam et al.
patent: 6510236 (2003-01-01), Crane et al.
patent: 6789191 (2004-09-01), Lapstun et al.
patent: 6862594 (2005-03-01), Saulpaugh et al.
patent: 6889376 (2005-05-01), Barritz et al.
patent: H10-247177 (1998-09-01), None
patent: 2001-77858 (2001-03-01), None
Sandhu, R.; Coyne, Edward J.; Feinstein, Hal L. and Youman, Charles E., “Role-Based Access Control Models,”IEEE Computer, vol. 29, No. 2, Feb. 1996.
Sandhu, Ravi and Park, Joon S., “Decentralized User-Role Assignment for Web-based Intranets,” In Proc. of the 3rdACM Workshop on Role-Based Access Control, Oct. 1998.
Tezuka, Satoru; Sasaki, Ryoichi and Kataoka, Masanori, “Seamless Object Authentication in Different Security Policy Domains,” In Proc. of 33rdHawaii International Conference on System Sciences, Jan. 2000.
Demurjian, S.A.; Ting, T.C.; Balthazar, J.; Ren, H.; Phillips, C. and Barr, P., “Role-Based Security in a Distributed Resource Environment,” In Proc. of Fourteenth IFIP WG 11.3 Working Conference on Database Security, Aug. 2000.
Chu, H; Song, H.; Wong, C. and Kurakake, S., “Seamless Applications over Roam . System,”UbiTools '01(Part ofACM UbiComp '01), Sep. 2001, http://choices.cs.uiuc.edu/UbiTools01/.
Office Action mailed May 16, 2006. Notice for reasons for rejection. English and Japanese translations. 8 pages.
Akirhiro Hokimoto and Tatsuo Nakajima, “Mobility Support for Mobile Applications Using Service Proxies”.
Chu Hao-hua
Kurakake Shoji
Song Yu
Louis-Jacques Jacques H.
Nalven Andrew L.
NTT Docomo Inc.
LandOfFree
Secure sharing of personal devices among different users does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Secure sharing of personal devices among different users, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Secure sharing of personal devices among different users will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3659522