Security policy applied to common data security architecture

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S152000, C713S187000, C713S189000, C713S191000

Reexamination Certificate

active

06941471

ABSTRACT:
An improved architecture is provided, based upon the prior art common data security architecture, with the modification of adding in a generic trust policy library (217) at an add-in security modules layer (215) and a policy interpreter (224) at a common security services manager layer (202), so that individual users may provide sets of trust policies in the form of a trust policy description file (223), which uses a generic policy description language provided by the architecture. The architecture provides a generic method of incorporating trust policies into a computing platform in a manner which avoids a prior art problem of the semantics of trust policies which are hard-coded in prior art trust policy modules (117). The architecture also improves management flexibility. In the present disclosure, a generic policy description language is provided, which enables different users to define the semantics of a plurality of trust policies.

REFERENCES:
patent: 6018617 (2000-01-01), Sweitzer et al.
patent: 6314415 (2001-11-01), Mukherjee
patent: 6510468 (2003-01-01), Hayne
patent: 6519601 (2003-02-01), Bosch
patent: 6715077 (2004-03-01), Vasudevan et al.
Common Security Services Manager, Application Programming Interface (API), Draft for release 1.2, Intel Corporation, Mar. 1997.
“Common Data Security Architecture Specification” Draft Release 1.2, Intel Corporation, Mar. 1997.
Engel, J. “Programming for the Java Virtual Machine”, Jun. 22, 1999, Chapter 13.
“Intel Security Program,” XP-002152323, Intel Corporation, 'Online! (1998).
“Accessing the Intel Random Number Gernerator with CDSA,” XP-002152324, Intel Corporation, 'Online! (1999).
Foster et al., “A computational framework for telemedicine,” XP-004129625,Future Generations Computer Systems 14, pp. 109-123 (1998).
Chu et al., “REFEREE: trust management for Web applications,” XP-004095294,Computer Networks and ISDN Systems 29, pp. 953-964 (1997).

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Security policy applied to common data security architecture does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Security policy applied to common data security architecture, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Security policy applied to common data security architecture will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3427055

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.