Information security – Prevention of unauthorized use of data including prevention... – Access control
Reexamination Certificate
2003-09-09
2009-10-20
Zand, Kambiz (Department: 2434)
Information security
Prevention of unauthorized use of data including prevention...
Access control
Reexamination Certificate
active
07607175
ABSTRACT:
A small footprint device can securely run multiple programs from unrelated vendors by the inclusion of a context barrier isolating the execution of the programs. The context barrier performs security checks to see that principal and object are within the same namespace or memory space and to see that a requested action is appropriate for an object to be operated upon. Each program or set of programs runs in a separate context. Access from one program to another program across the context barrier can be achieved under controlled circumstances by using an entry point object. The entry point object can either perform accesses across the context barrier on behalf of a requesting program or can pass the request to the program to be accessed and switch contexts to the program to be accessed.
REFERENCES:
patent: 4930129 (1990-05-01), Takahira
patent: 5057997 (1991-10-01), Chang et al.
patent: 5204663 (1993-04-01), Lee
patent: 5204897 (1993-04-01), Wyman
patent: 5446901 (1995-08-01), Owicki et al.
patent: 5452431 (1995-09-01), Bournas
patent: 5481715 (1996-01-01), Hamilton et al.
patent: 5544246 (1996-08-01), Mandelbaum et al.
patent: 5594227 (1997-01-01), Deo
patent: 5649118 (1997-07-01), Carlisle et al.
patent: 5721781 (1998-02-01), Deo et al.
patent: 5742756 (1998-04-01), Dillaway et al.
patent: 5768385 (1998-06-01), Simon
patent: 5781723 (1998-07-01), Yee et al.
patent: 5802519 (1998-09-01), De Jong
patent: 5884316 (1999-03-01), Bernstein et al.
patent: 5894550 (1999-04-01), Thiriet
patent: 5912453 (1999-06-01), Gungl et al.
patent: 5930363 (1999-07-01), Stanford et al.
patent: 6052690 (2000-04-01), De Jong
patent: 6094656 (2000-07-01), De Jong
patent: 6173391 (2001-01-01), Tabuchi et al.
patent: 6182158 (2001-01-01), Kougiouris et al.
patent: 6212633 (2001-04-01), Levy et al.
patent: 6220510 (2001-04-01), Everett et al.
patent: 6233683 (2001-05-01), Chan et al.
patent: 6233688 (2001-05-01), Montenegro et al.
patent: 6292874 (2001-09-01), Barnett
patent: 6308317 (2001-10-01), Wilkinson et al.
patent: 6339829 (2002-01-01), Beadle et al.
patent: 6349336 (2002-02-01), Sit et al.
patent: 6373950 (2002-04-01), Rowney
patent: 6633984 (2003-10-01), Susser et al.
patent: 6823520 (2004-11-01), Susser et al.
patent: 6907608 (2005-06-01), Susser et al.
patent: 6922835 (2005-07-01), Susser et al.
patent: 7093122 (2006-08-01), Susser et al.
patent: 4126213 (1993-02-01), None
patent: 190733 (1986-08-01), None
patent: 0466969 (1992-01-01), None
patent: 0666550 (1995-08-01), None
patent: 01-277993 (1989-11-01), None
patent: 02-156357 (1990-06-01), None
patent: 05-089303 (1993-04-01), None
patent: WO 87/07062 (1987-11-01), None
patent: WO 94/10657 (1994-05-01), None
patent: WO 9706516 (1997-02-01), None
patent: 98/37526 (1998-02-01), None
patent: WO 98/19237 (1998-05-01), None
patent: WO 9832073 (1998-07-01), None
patent: 99/16030 (1998-09-01), None
Gong, L. et al. “Going beyond the sandbox: an overview of the new security architecture in the JavaDevelopment Kit 1.2”Proc. Usenix Sym. Internet Technologies and Systems, Dec. 8, 1997.
Islam, et al. “A Flexible Security Model for Using Internet Content” IBM Thomas J. Watson Research Center Papers, ‘Online!’, Jun. 28, 1997, from http://www.ibm.com/java/education/flexsecurity.
Daniels, John et al., “Strategies For Sharing Objects In Distributed Systems”, JOOP,Object Designers Ltd., UK, pp. 27-36.
Chan, “Infrastructure of Multi-Application Smart Card”, http://home.hkstar.com/˜alanchan/papers/multiApplicationSmartCard/, Jul. 25, 2002.
Cordonnier, et al., “The concept of suspicion: a new security model for identification management in smart cards”, http://inforge.unil.ch/isdss97/papers/48.htm, (1997).
Lee, Chan Y., “Detecting Out-Of-Range References”, http://127.0.0.1:8080/vtopic.isapi?action+View&VdkVgwKev=%2E@2E%2Fdata%2F1—993%2F, Jul. 24, 2002.
Philips Semiconductor, “Designers offered first 16-bit smart card IC architecture with development tools”, Press Release, Jul. 25, 2002.
Ritchey, Tim, “Advanced Topics: The Java Virtual Machine”,Java!, Chapter 14, pp. 25-346, Sep. 22, 1995.
Sun Microsystems, “Java Card 2.0 Language Subset and Virtual Machine Specification”, Revision 1.0 Final, Oct. 13, 1997.
Sun Microsystems, “Java Card 2.0 Programming Concepts”, Revision 1.0 Final, Oct. 15, 1997.
“Sun Microsystems Announces Javacard API”, Business Wire, Oct. 1996.
EPO, Interlocutory decision in Opposition proceedings (Articles 102(3) and 106(3) EPC), Nov. 5, 2007.
Frey, “Java Card—The Java Standard for Smart Cards”,Java Days '98, Nov. 13, 1998, pp. 1-53.
Butler Mitchel B.
Streich Andy
Susser Joshua
Gunnison Forrest
Gunnison McKay & Hodgson, L.L.P.
Poltorak Peter
Sun Microsystems Inc.
Zand Kambiz
LandOfFree
Techniques for permitting access across a context barrier on... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Techniques for permitting access across a context barrier on..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Techniques for permitting access across a context barrier on... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4082636