Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Security kernel or utility
Reexamination Certificate
2004-03-26
2009-06-23
Nalven, Andrew L (Department: 2434)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Security kernel or utility
Reexamination Certificate
active
07552328
ABSTRACT:
A system and method for resolving a rule conflict within a security policy applied to a trusted computing platform, wherein the fileset to which each of the conflicting rules v and s refers (or “scope”) is determined (step10). It is then determined (at step12) if the scope of one of the rules s is a complete subset of the scope of rule r. If so, rule s is applied to the accessed file f (at step14). If not, the conflict is resolved in another way, for example, by determining the most restrictive of rules r and s (at step16) and applying the result accordingly (step18).
REFERENCES:
patent: 5915085 (1999-06-01), Koved
patent: 6430561 (2002-08-01), Austel et al.
patent: 2002/0077803 (2002-06-01), Kudoh et al.
patent: 2 376 764 (2002-12-01), None
patent: 2 379 764 (2003-03-01), None
patent: 00/48063 (2000-08-01), None
patent: 00/54125 (2000-09-01), None
U.S. Appl. No. 10/810,308, filed Mar. 26, 2004, Wray.
Dalton, C.I., et al., “Applying Military Grade Security to the Internet,”Computer Networks and ISND Systems, vol. 29, pp. 1799-1808 (1997).
“Trusted Computing Platform Alliance (TCPA), TCPA Design Philosophies and Concepts,” Version 1.0, Internet: <http://www.trustedpc.org> pp. 1-30 (Jan. 2001).
Hewlett--Packard Development Company, L.P.
Nalven Andrew L
LandOfFree
Security attributes of nodes in trusted computing systems does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Security attributes of nodes in trusted computing systems, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Security attributes of nodes in trusted computing systems will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4146179