System and method for authenticating peer components

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Security kernel or utility

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C345S474000

Reexamination Certificate

active

06510516

ABSTRACT:

BACKGROUND OF THE INVENTION
1. Field of the Invention
The invention pertains to the field of data management. More particularly, the invention pertains to a system and method for authenticating peer data objects in component object systems.
2. Description of the Related Technology
Historically, software applications were designed like warehouses that were used to support factories prior to the advent of just-in-time (JIT) manufacturing. Before JIT manufacturing, warehouses were stored with every part without regard to when the part would be needed or whether the part would be needed at all. Similarly, software applications have traditionally been built using a plurality of modules that are stored in the software application, regardless of whether all of the modules may be needed. One technological problem in developing an object based solution is that software code is typically compiled and linked into an executable program. Once the code is in an executable state, integrating further components into the program is difficult.
However, new object models now provide for the dynamic integration of data objects into a working application. For example, Internet browsers, using an interpretive environment, allow for the dynamic integration of various data objects, such as a Java applet, into the Internet browser.
Although data objects according to current object models contain some limited one-way security features, there is currently no way for the data object to authenticate the identity of the browser and for the browser to authenticate the identity of the data object. At most, data objects are designed with a simple security scheme in which the browser can decide whether or not to trust the data object. If the data object is trusted, the data object is granted access to certain system features. Otherwise, if the data object is not trusted, the data object is given limited access to system features.
Moreover, using current technology, data objects cannot verify the identity of the browser or other data objects that may have been installed in the browser. Due to this limitation, secure and protected data objects cannot be developed since they cannot guarantee that the target environment will recognize and understand their internal security.
Therefore, there is a need for a system that can authenticate the identity of a data object to its peers each time the data object is used. In addition, the system should be able to authenticate the identity of the peers to the data object. After the data object and the peer data objects are identified, the data object should be able to dynamically connect with the peer data objects. Also, if the data object needs a selected peer data object, and if the selected peer data object cannot be found on the system or the peer data object cannot be authenticated, the system should be able to retrieve a peer data object that can be authenticated.
SUMMARY OF THE INVENTION
The animating system of the present invention has several features, no single one of which is solely responsible for its desirable attributes. Without limiting the scope of this invention as expressed by the claims which follow, its more prominent features will now be summarized.
One embodiment of the invention includes a method of controlling the usage of data in a computer having one or more peer data objects, the method comprising providing a data object, the data object including a description of one or more of the peer data, determining whether the peer data objects are authorized to communicate with the data object, determining whether the data object is authorized to communicate with the peer data objects, and connecting the data object to the peer data objects based upon authorization being granted such that the data object can communicate with the peer data objects and the peer data objects can communicate with the data object.
Another embodiment of the invention includes a system for controlling the usage of a data object, the system comprising one or more peer data objects, the peer data objects collectively defining a software application, a parser capable of reading from a data object a description of one or more peer data objects that are required for use of the data object, a validate data object module capable of determining whether the data object is authorized to communicate with one or more peer data objects, a validate peer module capable of determining whether the peer data objects are authorized to communicate with the data object, and a wiring module capable of controlling the connection of the peer data objects to the data object.


REFERENCES:
patent: 4919545 (1990-04-01), Yu
patent: 5023907 (1991-06-01), Johnson et al.
patent: 5103476 (1992-04-01), Waite et al.
patent: 5222134 (1993-06-01), Waite et al.
patent: 5235642 (1993-08-01), Wobber et al.
patent: 5319705 (1994-06-01), Halter et al.
patent: 5321841 (1994-06-01), East et al.
patent: 5375240 (1994-12-01), Grundy
patent: 5400403 (1995-03-01), Fahn et al.
patent: 5559884 (1996-09-01), Davidson et al.
patent: 5572590 (1996-11-01), Chess
patent: 5982390 (1999-11-01), Stoneking et al.
patent: 6289320 (2001-09-01), Drummond et al.
patent: 6317868 (2001-11-01), Grimm et al.
patent: 0 367 700 (1989-12-01), None
patent: 0 567 800 (1993-02-01), None
patent: 0 653 695 (1994-02-01), None
patent: 0 689 120 (1995-06-01), None
patent: 0778520 (1997-06-01), None
patent: WO00/14631 (2000-03-01), None
“Virus Checker Integrated in Web Explorers and File Transfer Protocol Utilities” IBM Technical Disclosure Bulletin, vol. 39, No. 1, Jan. 1996, p. 193.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

System and method for authenticating peer components does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with System and method for authenticating peer components, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for authenticating peer components will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3024155

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.