Trusted signature with key access permissions

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S172000, C726S001000, C726S021000, C726S027000, C380S277000

Reexamination Certificate

active

07853793

ABSTRACT:
Devices, methods, and computer code products are disclosed in which access to private keys required to create digital signatures for delimited information is controlled by permissions in the device. The permissions can be used to check the identity of an application to determine if the application has access to a digital key and permission to generate a digital signature.

REFERENCES:
patent: 5818936 (1998-10-01), Mashayekhi
patent: 6446206 (2002-09-01), Feldbaum
patent: 6470450 (2002-10-01), Langford et al.
patent: 6848048 (2005-01-01), Holmes
patent: 6983364 (2006-01-01), Gougeon
patent: 7216083 (2007-05-01), Parmelee et al.
patent: 7242768 (2007-07-01), Challener
patent: 7409552 (2008-08-01), Buttyan et al.
patent: 2003/0005289 (2003-01-01), Gougeon et al.
patent: 2003/0138105 (2003-07-01), Challener et al.
patent: WO 01/93212 (2001-12-01), None
Security and Trust Services API (SATSA) Java 2 Platform, Micro Edition, Version 1.0, Sun Microsystems, Inc., Copyright 2004, pp. 157-159.
“Security and Trust Services API (SATSA) for JavaTM 2 Platform, Micro Edition”, Oct. 2003, Sun Microsystems, Retrieved from the Internet on Oct. 26, 2008: <URL: https://cds.sun.com/is-bin/INTERSHOP.enfinity/WFS/CDS-CDS—JCP-Site/en—US/-/USD/ViewFilteredProducts-SimpleBundleDownload>.
“Trusted Computing Platform Alliance (TCPA) Main Specification”, Feb. 2002, Trusted Computing Group, Retrieved from the Internet on Oct. 26, 2008: <URL: https://www.trustedcomputinggroup.org/specs/TPM/TCPA—Main—TCG—Architecture—v1—1b.pdf>.
Microsoft Computer Dictionary, 2002, Microsoft, 5rh Edition, pp. 211, 252.
“keytool—Key and Certificate Management Tool”, 2002, Retrieved from the Internet on Nov. 8, 2009: <URL:http://java.sun.com/j2se/1.4.2/docs/tooldocs/windows/keytool.html>.
Java™ Cryptoraphy Extension (JCE) Reference Guide for the Java™ 2 SDK, Standard Edition, v 1.4, java.sun.com, May 6, 2005, 62 psgs.
Security and Trust Services API (SATSA) for Java™ 2 Platform, Micro Edition, Version 1.0, Sun Microsystems, Inc., Copyright 2004, pp. 1-200.
International Search Report and Written Opinion for PCT/IB/2005/001190 mailed on Sep. 22, 2005.
PCT International Preliminary Report on Patentability for PCT/IB/2005/001190 completed on Apr. 3, 2006.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Trusted signature with key access permissions does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Trusted signature with key access permissions, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Trusted signature with key access permissions will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4211951

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.