Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer
Reexamination Certificate
2005-09-27
2005-09-27
Sheikh, Ayaz (Department: 2131)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Protection at a particular protocol layer
C713S151000, C713S155000, C713S156000, C713S165000, C713S166000, C713S176000, C713S182000, C713S152000, C713S152000, C709S223000, C709S224000, C709S225000, C709S226000, C709S227000, C709S228000, C709S229000
Reexamination Certificate
active
06950932
ABSTRACT:
The invention provides a system and method for providing security against unauthorized access to a java enabled network device. The system includes multiple conventional class loaders, code verifiers, security managers, access managers, SAMs, a certificate authority and a policy server. The SAM verifies the authenticity of the entity and either allows a download/access to a device or rejects the download/access to a network device. The certificate authority is a repository for public key certificates and may be a part of the secure network or part of the unsecured network. The policy server is a repository for the rights (privileges) an entity is entitled to on the secure network. The code verifiers verify that the Byte Code is valid java code. The security manager is the conventional security manager. The class loader loads the code to the device and the access manager assigns access levels to each Java thread that is created.
REFERENCES:
patent: 5974549 (1999-10-01), Golan
patent: 6480962 (2002-11-01), Touboul
patent: 6766454 (2004-07-01), Riggins
Yerxa, Network Computing, 1998, n 904, p. 134.
Bott, Online Security, Sep. 1196, v9, n9, p. 344(2).
Gilliland, Can Encryption Protect Your Data, Dec. 1996, Databased Advisor, v14, n12, p. 84(4).
Indermaur, Assessing Java for Electronic Commerce, 1998, v11, n2, p. 38(5).
Kirtland, Safe Web Surfing with The Internet Component Download Service, 1996, Microsoft Systems, v11, n7, p. 65(7).
Karve, Securing Java and ActiveX, 1998, Network, v13, n3, p. 67(4).
Crotty, A Travel Guide To Component Software, 1997, MacWorld, v14, n3, p. 143(4).
Leach, Norvin; Moeller, Michael, IE 3.0 Applets Will Earn Certification, Jul. 22, 1996, PC Week, v13, n29, p1(2).
Gage, McLain's Crusade: Consultant Sets Out To Prove Technology's Faults, Computer Reseller News, 1996, n 701, p. 71.
Mardesich and Gage, Developers waging all-out war for share of the Web, 1996, Computer Reseller News, 1996, n671, p. 1.
Schneier, Applied Cryptography, 1996, 37-42.
Virginia Tech Institute, 1996, 14 Java Security.
Zhong, Security in the Large: is Java's Sandbox Scalable?, Apr. 1998, p. 1-8.
Bank, 1995, Java Security, p. 1-11.
Gaudin et al., Augus 19, 1996, Computer World.
Schultz, Oct. 21, 1996, Network World, p. 46.
Duncan Rob
Hardjono Thomas
Lavian Tal
Travostino Franco
Jackson Jenise
Nortel Networks Limited
Sheikh Ayaz
Steubing McGuinness & Manaras LLP
LandOfFree
Security association mediator for java-enabled devices does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Security association mediator for java-enabled devices, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Security association mediator for java-enabled devices will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3447889