Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique
Reexamination Certificate
2002-06-14
2010-02-02
Shiferaw, Eleni A (Department: 2436)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Particular communication authentication technique
C713S156000, C713S175000, C713S180000, C726S010000, C726S027000
Reexamination Certificate
active
07657747
ABSTRACT:
A grantor issues a trustable electronic document for the benefit of a requestor. The requestor may be able to get the benefits specified by the electronic document through access controls located at the service or information origin. A request digitally signed by a requestor is received. The digitally signed request contains the electronic document digitally signed by the grantor. The electronic document also contains a grantor certified reference, a requestor certified reference, and access control rules for the requestor. The request is validated using the requestor certified reference and the access control rules for the requestor.
REFERENCES:
patent: 5390297 (1995-02-01), Barber et al.
patent: 5978484 (1999-11-01), Apperson et al.
patent: 6226618 (2001-05-01), Downs et al.
patent: 6535978 (2003-03-01), Padgett et al.
patent: 6587945 (2003-07-01), Pasieka
patent: 6601172 (2003-07-01), Epstein
patent: 2001/0053223 (2001-12-01), Ishibashi et al.
patent: 2002/0015185 (2002-02-01), Onishi et al.
patent: 2003/0195854 (2003-10-01), Wittkotter
patent: 2005/0005118 (2005-01-01), Wheeler et al.
patent: 0 828 208 (1997-01-01), None
Ashley P., Vandenwauer M., Claessens J.: “Using Sesame to Secure Web Based Applications on an Internet” Sep. 20, 1999, Information Security Research Center Australia, XP-002260869, pp. 303-317.
Ashley, Paul, “Using Sesame to Secure WEB Based Applications on an Intranet”, Sep. 20-21, 1999, Secure Information Networks, Proceedings of the IFIP TC6/TC11 Joint.Working Conference on Communications and Multimedia Security, pp. 303-317.
Damiani et al., “Design and Implementation of an Access Control Processor for XML Documents”, 2000, Computer Networks 33, pp. 59-75.
Herzberg et al., “Access Control Meets Public Key Infrastructure, Or: Assigning Roles to Strangers”, 2000, IEEE, pp. 2-14.
Linn et al., “Attribute Certification: An Enabling Technology for Delegration and Role-Based Controls in Distributed Environments”, 1999, RBAC, Fairfax, VA, pp. 121-130.
Zhan et al., “On the Security of HY-key Authentication Scheme”, 1999, Computer Communications 22, pp. 739-741.
International Search Report (Partial) dated Dec. 3, 2003, PCT/US02.19100, from the International Searching Authority of the Patent Cooperation Treaty.
Brezak, J., “Utilizing the Windows 2000 Authorization Data in Kerberos Tickets for Access Control to Resources.” Microsoft Corporation, Feb. 2002, http://msdn.microsoft.com/en-us/library/aa302203(printer).aspx, pp. 1-7.
Microsoft Tech Net, “Authentication for Administrative Authority”, 2000, http://www.microsoft.com/technet/Security/bestpract/authent.mspx?pf=true, pp. 1-18.
Coulon Etienne
Ozog Francois Frederic
Buchanan & Ingersoll & Rooney PC
Link Us All, LLC
Shiferaw Eleni A
LandOfFree
System and method for specifying security, privacy, and... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with System and method for specifying security, privacy, and..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for specifying security, privacy, and... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4167073