Information security – Access control or authentication – Network
Reexamination Certificate
2002-08-13
2010-06-22
Chai, Longbit (Department: 2131)
Information security
Access control or authentication
Network
C713S170000, C713S193000, C713S194000, C380S249000, C726S002000, C726S003000, C726S005000, C726S006000, C726S007000, C726S027000, C726S028000, C726S029000
Reexamination Certificate
active
07743407
ABSTRACT:
Resources to a device are granted access to an application based on privileges associated with the application. A permission list may be created by a server. The permission list may be created using information from authorities, entities, or parties and information about the device resources. The permission list indicates what device resources the application may access. During application execution when the application requests a resource, a control program executing on the device may be used to check the permission list associated with the application to determine if the application may access the resource. The control program can then grant or deny access based on the privileges defined in the permission list. Digital signatures may be used to detect modifications to the application and/or permission list. In addition, multiple permission lists may be associated with the same application.
REFERENCES:
patent: 5689708 (1997-11-01), Regnier et al.
patent: 5745879 (1998-04-01), Wyman
patent: 6105066 (2000-08-01), Hayes, Jr.
patent: 6125447 (2000-09-01), Gong
patent: 6158010 (2000-12-01), Moriconi et al.
patent: 6367019 (2002-04-01), Ansell et al.
patent: 6468160 (2002-10-01), Eliott
patent: 6857071 (2005-02-01), Nakae
patent: 6874087 (2005-03-01), Fetkovich et al.
patent: 6895503 (2005-05-01), Tadayon et al.
patent: 01018650 (2001-03-01), None
patent: WO 01/18650 (2001-03-01), None
Senn, J.A. “The Emergence of M-Commerce” (Dec. 2000) Computer vol. 33 Issue 12. pp. 148-150. IEEE DOI: 10.1109/2.889097.
K. Fujimura, Y. Nakajima, J. Sekine “XML Ticket: Generalized Digital Ticket Definition Language” (Mar. 1999) Presented at XML-DSig '99. Digital Copy available at http://www.w3.org/DSig/signed-XML99/pp/NTT—xml—ticket.html.
Gong, L.: “Java Security Architecture (JDK1.2),” Dec. 6, 1998.
International Search Report-PCT/US02/025746, International Search Authority, European Patent Office-Dec. 6, 2002.
European Search Report-EP02761353, Search Authority Munich Nov. 29, 2007.
Lundblade Laurence
Sprigg Stephen A.
Chai Longbit
Hagler James T.
O'Connell Robert J.
Qualcomm Incorporated
LandOfFree
Using permissions to allocate device resources to an... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Using permissions to allocate device resources to an..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Using permissions to allocate device resources to an... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4177387