Information security – Monitoring or scanning of software or data including attack...
Reexamination Certificate
2006-11-28
2006-11-28
Louis-Jacques, Jacques (Department: 2134)
Information security
Monitoring or scanning of software or data including attack...
C380S270000, C713S161000, C713S168000, C713S169000, C713S170000, C455S410000
Reexamination Certificate
active
07143441
ABSTRACT:
A mobile application security system and method, in the preferred embodiment, permits authentication of a user of a sensitive mobile application dispatched from a vulnerable host to occur, but does not perform user authentication for non-sensitive mobile applications or for sensitive mobile applications dispatched from non-vulnerable hosts. A hub and spoke architecture and a peer-to-peer architecture are described.
REFERENCES:
patent: 5633932 (1997-05-01), Davis et al.
patent: 5850516 (1998-12-01), Schneier
patent: 5850517 (1998-12-01), Verkler et al.
patent: 5963731 (1999-10-01), Sagawa et al.
patent: 5968176 (1999-10-01), Nessett
patent: 5974549 (1999-10-01), Golan
patent: 6009456 (1999-12-01), Frew et al.
patent: 6065118 (2000-05-01), Bull et al.
patent: 6148327 (2000-11-01), Whitebread et al.
patent: 6173405 (2001-01-01), Nagel
patent: 6192354 (2001-02-01), Bigus et al.
patent: 6233601 (2001-05-01), Walsh
patent: 6272528 (2001-08-01), Cullen et al.
patent: 6539416 (2003-03-01), Takewaki et al.
patent: 6615232 (2003-09-01), Suzuki et al.
patent: 6622157 (2003-09-01), Heddaya et al.
patent: 0942370 (1999-09-01), None
patent: 1 067 457 (2000-01-01), None
Wayne Jansen and Tom Karygiannis, “NIST Special Publication 800-19-Mobile Agent Security”, Oct. 1999.
Intrusion Detection with Mobile Agents, Computer Communications Journal, Special Issue on Intrusion Detection, Jansen.
Determining Privileges of Mobile Agents, Proceedings of the Computer Security Applications Conference, Dec. 2001. Jansen.
A Privilege Management Scheme for Mobile Agent Systems, First International Workshop on Security of Mobile Multiagent Systems, Autonomous Agents Conference, May 2001. Jansen.
Countermeasures for Mobile Agent Security, Computer Communications, Special Issue on Advanced Security Techniques for Network Protection, Elsevier Science BV, Nov. 2000. Jansen.
Privilege Management of Mobile Agents, National Information System Security Conference, Oct. 2000. Jansen et al.
Applying Mobile Agents to Intrusion Detection and ResponseNISTIR 6416, Sep. 1999. Jansen et al.
Mobile Agent Security, NIST Special Publication 800-19, Aug. 1999. Jansen et al.
Agents for the Masses: Is is Possible To Make Development of Sophisticated Agents Simple Enought To Be Practical?IEEE Intelligent Systems, Special Issue on Agents, May-Jun. 1999. Bradshaw et al.
Network Security Testing Using Mobile AgentsThird International Conference and Exhibition on the Practical Application of Intelligent Agents and multi-Agent Technology. London, UK Mar. 1998. Karygiannis.
A Framework For Multi-Mode Authentication: Overview and Implementation Guide. NISTIR 7046 Aug. 2003. Jansen et al.
Picture Password: A Visual Login Technique for Mobile Devices. NISTIR 7030, Jul. 2003. Jansen et al.
Security Policy Management for Handheld Devices. The Int'l. Conference on Security and Management (SAM'03), Jun. 2003. Jansen et al.
Authenticating Users on Handheld Devices, Proceedings of the Canadian Information Technology Security Symposium, May 2003. Jansen.
Policy Expression and Enforcement for Handheld Devices, NISTIR 6981, May 2003. Jansen et al.
Assigning and Enforcing Security Policies on Handheld Devices, Proceedings of the Canadian Information Technology Security Symposium, May 2002. Jansen et al.
PCT International Search Report dated Jan. 2, 2003 corresponding to PCT US02/21186.
Office Action dated Dec. 18, 2003 for U.S. Appl. No. 09/764,548, filed Jan. 18, 2001.
Office Action dated Dec. 22, 2003 for U.S. Appl. No. 09/591,034, filed Jun. 9, 2000.
Office Action dated Dec. 31, 2003 for U.S. Appl. No. 09/758,941, filed Jan. 10, 2001.
Office Action dated Dec. 31, 2003 for U.S. Appl. No. 09/645,028, filed Aug. 23, 2000.
W.A. Jansen, “A Privilege Management Scheme for Mobile Agent Systems” NIST May 2001.
Wayne Jansen, “Countermeasures for Mobile Agent Security”, NIST Nov. 2000.
Wayne Jansen et al., “Privilege Management of Mobile Agents”, NIST Oct. 2000.
W. Jansen, “Intrusion Detection with Mobile Agents” Computer Communications Journal, Special Issue On Intrusion Detection Oct. 2, 2001.
“Jumping Beans™ White Paper” Ad Astra Engineering, Incorporated Dec. 1998.
Holger Peine, “Security Concepts and Implementation in the Ara Mobile Agent System”, Jun. 1998, (Wet Ice '98), Proceedings, Seventh IEEE International Workshops, Stanford, CA & Los Alamitos, CA, IEEE Comput. Soc., pp. 236-242.
Varadharajan V. et al., “An Approach to Designing Security Model for Mobile Agent Based Systems”, Nov. 1998, Globecom '98, The Bridge to Global Integration, Sydney, Australia and Telecommunications Conference, New York, NY, IEEE, US, vol. 3, pp. 1600-1606.
Joan J. Ordille, “When agents roam, who can you trust?”, 1996, Proceedings of the Annual Conference on Emerging Technologies and Applications in Communications, pp. 188-191.
Supplementary European Search Report, EP Application Serial No. 02 72 9170, Dec. 12, 2005, 4 pp.
Peter Mell et al., “A Denial of Service Resistant Intrusion Detection Architecture”, NIST, 2000.
Peter Mell et al., “Mobile Agent Attach Resistant Distributed Hierarchical Intrusion Detection” NIST, 1999.
W.A. Jansen, “A Privilege Management Scheme for Mobile Agent Systems”, NIST.
Wayne Jansen, “Countermeasures for Mobile Agent Security”, NIST.
Wayne Janson et al., “Applying Mobile Agents to Intrusion Detection and Response” NIST Interim Report, Oct. 1999.
Wayne Janson et al., “Privilege Management of Mobile Agents”, NIST.
Wayne Jansen et al., “NIST Special Publication 800-19—Mobile Agent Security”, NIST.
Aramira Corporation
Fish & Richardson P.C.
Louis-Jacques Jacques
Poltorak Piotr
LandOfFree
Wireless device mobile application security system does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Wireless device mobile application security system, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Wireless device mobile application security system will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3671122