System and method for providing secure resource management

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S168000, C713S169000, C713S170000, C713S173000, C713S174000, C713S165000, C726S002000, C726S003000, C726S026000, C726S027000, C726S028000, C726S029000, C726S030000

Reexamination Certificate

active

07904720

ABSTRACT:
System and method for providing secure resource management. The system includes a first device that creates a secure, shared resource space and a corresponding root certificate for the shared space. The first device associates one or more resources that it can access with the shared space. The first device invites one or more other devices to join as members of the space, and establishes secure communication channels with the devices that accept this invitation. The first device generates a member certificate for each accepting device, and sends the root certificate and the generated member certificate to the device through the secure channel. These devices may then access resources associated with the shared space by presenting their member certificates. Further, members of the shared space may invite other device to join the space, and may create member certificates in the same manner as the first device.

REFERENCES:
patent: 5408250 (1995-04-01), Bier
patent: 5519778 (1996-05-01), Leighton et al.
patent: 5539824 (1996-07-01), Bjorklund et al.
patent: 5862321 (1999-01-01), Lamming et al.
patent: 6064741 (2000-05-01), Horn et al.
patent: 6075860 (2000-06-01), Ketcham
patent: 6105133 (2000-08-01), Fielder et al.
patent: 6243373 (2001-06-01), Turock
patent: 6243772 (2001-06-01), Ghori et al.
patent: 6289460 (2001-09-01), Hajmiragha
patent: 6366654 (2002-04-01), Cramer et al.
patent: 6839843 (2005-01-01), Bacha et al.
patent: 6971017 (2005-11-01), Stringer et al.
patent: 7003550 (2006-02-01), Cleasby et al.
patent: 7185199 (2007-02-01), Balfanz et al.
patent: 7206934 (2007-04-01), Pabla et al.
patent: 7254608 (2007-08-01), Yeager et al.
patent: 7401152 (2008-07-01), Traversat et al.
patent: 7546359 (2009-06-01), Tierney et al.
patent: 7549047 (2009-06-01), Balfanz et al.
patent: 7558797 (2009-07-01), Li
patent: 7562232 (2009-07-01), Zuili et al.
patent: 7631184 (2009-12-01), Ryan
patent: 7673143 (2010-03-01), Yeager et al.
patent: 7711775 (2010-05-01), Tavis et al.
patent: 7729995 (2010-06-01), Alain et al.
patent: 2001/0048744 (2001-12-01), Kimura
patent: 2002/0061748 (2002-05-01), Nakakita et al.
patent: 2002/0065065 (2002-05-01), Lunsford et al.
patent: 2002/0094087 (2002-07-01), Dellmo et al.
patent: 2002/0112164 (2002-08-01), Schmeling et al.
patent: 2002/0147920 (2002-10-01), Mauro
patent: 2002/0156795 (2002-10-01), Edwards et al.
patent: 2002/0159598 (2002-10-01), Rubinstein et al.
patent: 2003/0014646 (2003-01-01), Buddhikot et al.
patent: 2003/0051140 (2003-03-01), Buddhikot et al.
patent: 2003/0078072 (2003-04-01), Serceki et al.
patent: 2003/0081774 (2003-05-01), Lin et al.
patent: 2003/0117985 (2003-06-01), Fujii et al.
patent: 2003/0196087 (2003-10-01), Stringer et al.
patent: 2003/0217264 (2003-11-01), Martin et al.
patent: 2004/0024787 (2004-02-01), Edwards et al.
patent: 2004/0024809 (2004-02-01), Edwards et al.
patent: 2004/0044727 (2004-03-01), Abdelaziz et al.
patent: 2004/0088548 (2004-05-01), Smetters et al.
patent: WO 99/41876 (1999-08-01), None
patent: 0124059 (2001-05-01), None
U.S. Appl. No. 60/480,909 entitled “Methods and Apparatus for Establishing and Using a Secure Credential Infrastructure” to Diana K. Smetters et al., filed Jun. 24, 2003.
U.S. Appl. No. 10/231,194 entitled “Apparatus and Methods for Providing Secured Communication” to Dirk Balfanz et al., filed Aug. 30, 2002.
U.S. Appl. No. 10/424,191 entitled “System and Method for Establishing Secondary Channels” to Conley et al.
U.S. Appl. No. 10/656,439 entitled “Method, Apparatus, and Program for Securely Presenting Situation Information” to Smetters et al.
U.S. Appl. No. 10/656,551 entitled “Method, Apparatus, and Program Product for Provisioning Secure Wireless Sensors,” to Smetters et al.
Asokan et al., “Key Agreement in Ad-Hoc Networks,”Computer Communications, Elsevier Science Publishers BV, Amsterdam, NL, 23(17):1627-1637 (2000).
Bardram et al., “Context-Aware User Authentication—Supporting Proximity-Based Login in Pervasive Computing,” A.K. Dey et al. (Eds.): UbiComp 2003, LNCS 2864, pp. 107-127 (2003).
Kindberg et al., “Secure Spontaneous Device Association,” A.K. Dey et al. (Eds.): UbiComp 2003, LNCS 2864, pp. 124-131 (2003).
Schneier, B., “Applied Cryptography: Protocols, Algorithms, and Source Code in C,” in Section 8.3 “Transferring Keys,” John Wiley & Sons, New York, US, (1996).
Stajano et al., “The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks,” AT&T Software Symposium, ‘Online!’ pp. 1-8 (1999).
Balfanz, D. et al., “Talking to Strangers: Authentication in Ad-Hoc Wireless Networks,” Xerox Palo Alto Research Center, [Retrieved from the Internet at http://www.isoc.org/isoc/conferences
dss/02/proceedings/papers/balfan.pdf on Feb. 18, 2003] (Posted on the Internet on Feb. 11, 2002).
Lopes, C. et al., “Aerial Acoustic Communications,” IEEE Workshop on Applications of Signal Processing to Audio and Acoustics, pp. 21-24, (2001).
Whitehead, Jr., E. et al., “Lessons from WebDAV for the Next Generation Web Infrastructure,” Department of Information And Computer Science, University of California [Retrieved from the Internet at http://www.ics.uci.edu/ejw/http-future/Whitehead/http—pos—paper.html on Sep. 20, 2002].
Fielding, R. et al., “Web-Based Development of Complex Information Products,” Communications Of The ACM, vol. 41, No. 8, pp. 84-92 (1998).
Dridi, F. et al., “How to Implement Web-Based Groupware Systems Based on WebDAV,” Published in Proc. of WETICE 99, IEEE 8thIntl. Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, Standford, CA, pp. 1-7 (1999).
Whitehead, J. et al., “WebDAV, A Network Protocol for Remote Collaborative Authoring on the Web,” pp. 1-21 (1999) [Retrieved from the Internet at http://citeseer.nj.nec.com/whitehead99webdav.html on Mar. 11, 2003].
U.S. Appl. No. 10/066,699 to Balfanz et al., filed Feb. 6, 2002.
U.S. Appl. No. 10/301,931 to Balfanz et al. filed Nov. 21, 2002.
Geer, Daniel E. et al. “Token-Mediated Certification and Electronic Commerce”, Proceedings of the Second USENIX Workshop on Electronic Commerce, Oakland, California, Nov. 1996.
Kindberg, Tim and Zhang, Kan “Validating and Securing Spontaneous Associations between Wireless Devices” HP Laboratories, Palo Alto, HPL-2002-256, Hewlett-Packard Company, Sep. 12, 2002.
“ACC: Automatic Cryptographic Configuration of Embedded Devices” XML Trust Center White Paper Feb. 19, 2002, http://research.verisign.com/Papers/ACC1.html.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

System and method for providing secure resource management does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with System and method for providing secure resource management, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for providing secure resource management will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2672144

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.