Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer
Reexamination Certificate
2005-09-06
2005-09-06
Morse, Gregory (Department: 2134)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Protection at a particular protocol layer
C713S152000, C713S187000, C713S189000, C713S191000
Reexamination Certificate
active
06941471
ABSTRACT:
An improved architecture is provided, based upon the prior art common data security architecture, with the modification of adding in a generic trust policy library (217) at an add-in security modules layer (215) and a policy interpreter (224) at a common security services manager layer (202), so that individual users may provide sets of trust policies in the form of a trust policy description file (223), which uses a generic policy description language provided by the architecture. The architecture provides a generic method of incorporating trust policies into a computing platform in a manner which avoids a prior art problem of the semantics of trust policies which are hard-coded in prior art trust policy modules (117). The architecture also improves management flexibility. In the present disclosure, a generic policy description language is provided, which enables different users to define the semantics of a plurality of trust policies.
REFERENCES:
patent: 6018617 (2000-01-01), Sweitzer et al.
patent: 6314415 (2001-11-01), Mukherjee
patent: 6510468 (2003-01-01), Hayne
patent: 6519601 (2003-02-01), Bosch
patent: 6715077 (2004-03-01), Vasudevan et al.
Common Security Services Manager, Application Programming Interface (API), Draft for release 1.2, Intel Corporation, Mar. 1997.
“Common Data Security Architecture Specification” Draft Release 1.2, Intel Corporation, Mar. 1997.
Engel, J. “Programming for the Java Virtual Machine”, Jun. 22, 1999, Chapter 13.
“Intel Security Program,” XP-002152323, Intel Corporation, 'Online! (1998).
“Accessing the Intel Random Number Gernerator with CDSA,” XP-002152324, Intel Corporation, 'Online! (1999).
Foster et al., “A computational framework for telemedicine,” XP-004129625,Future Generations Computer Systems 14, pp. 109-123 (1998).
Chu et al., “REFEREE: trust management for Web applications,” XP-004095294,Computer Networks and ISDN Systems 29, pp. 953-964 (1997).
Hewlett--Packard Development Company, L.P.
Morse Gregory
Tran Tongoc
LandOfFree
Security policy applied to common data security architecture does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Security policy applied to common data security architecture, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Security policy applied to common data security architecture will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3427055