Method and apparatus for securing information access

Electrical computers and digital processing systems: multicomput – Computer-to-computer session/connection establishing – Network resources access controlling

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C709S216000, C709S225000, C709S246000, C707S793000, C707S793000, C707S793000, C710S036000, C711S147000, C711S164000, C713S165000, C713S166000, C713S152000

Reexamination Certificate

active

07043553

ABSTRACT:
A method and apparatus for protecting secured files stored on a file system employs a file security status associated with each file to signal whether or not access to the file is allowed. The file security status is stored in a fixed location in memory. Upon opening the associated file, the file security status is copied to a second location in memory. Depending upon the file security status stored in the second location, operations on the file by a client are either allowed or denied. Operations on non-secure files are always allowed. Operations on secured files are allowed only after verification of the client's authorization to access the file and the subsequent modification of the file security status stored in the second memory location. The method protects secured files from deletion by unauthorized clients. This is accomplished by, upon opening a secure file, initializing a third memory location to a value indicating that the file will not be deleted upon closing. This value may be changed by an authorized client only after going through the above-described verification process. Once the value has been changed to reflect that the file should be deleted when closed, the file will be deleted when closed. A method for creating a new secure file is also provided.

REFERENCES:
patent: 4776038 (1988-10-01), Testin et al.
patent: 4962532 (1990-10-01), Kasiraj et al.
patent: 4984272 (1991-01-01), McIlroy et al.
patent: 5003595 (1991-03-01), Collins et al.
patent: 5033076 (1991-07-01), Jones et al.
patent: 5144659 (1992-09-01), Jones
patent: 5163147 (1992-11-01), Orita
patent: 5241594 (1993-08-01), Kung
patent: 5241599 (1993-08-01), Bellovin et al.
patent: 5351136 (1994-09-01), Wu et al.
patent: 5416842 (1995-05-01), Aziz
patent: 5421006 (1995-05-01), Jablon et al.
patent: 5440635 (1995-08-01), Bellovin et al.
patent: 5519507 (1996-05-01), Subramaniam et al.
patent: 5655077 (1997-08-01), Jones et al.
patent: 5671354 (1997-09-01), Ito et al.
patent: 5680461 (1997-10-01), McManis
patent: 5684950 (1997-11-01), Dare et al.
patent: 5708780 (1998-01-01), Levergood et al.
patent: 5764772 (1998-06-01), Kaufman et al.
patent: 5793763 (1998-08-01), Mayes et al.
patent: 5815665 (1998-09-01), Teper et al.
patent: 5835727 (1998-11-01), Wong et al.
patent: 5845070 (1998-12-01), Ikudome
patent: 5862346 (1999-01-01), Kley et al.
patent: 5898780 (1999-04-01), Liu et al.
patent: 5933625 (1999-08-01), Sugiyama
patent: 5944824 (1999-08-01), He
patent: 5958016 (1999-09-01), Chang et al.
patent: 5987123 (1999-11-01), Scott et al.
patent: 5987232 (1999-11-01), Tabuki
patent: 5991810 (1999-11-01), Shapiro et al.
patent: 5999978 (1999-12-01), Angal et al.
patent: 6006334 (1999-12-01), Nguyen et al.
patent: 6011910 (2000-01-01), Chau et al.
patent: 6021496 (2000-02-01), Dutcher et al.
patent: 6044155 (2000-03-01), Thomlinson et al.
patent: 6047376 (2000-04-01), Hosoe
patent: 6092196 (2000-07-01), Reiche
patent: 6141687 (2000-10-01), Blair
patent: 6324584 (2001-11-01), Mandalia
patent: 6516351 (2003-02-01), Borr
patent: 6625603 (2003-09-01), Garg et al.
patent: 99/53408 (1999-04-01), None
Alexander, S., “DHCP Options and BOOTP Vendor Extensions,” Network Working Group, RFC 1533. Oct. 1993.
Bellare et al., “Keying Hash Functions for Message Authentication”, 1996, Advances in Cryptology-Crypto 96 Proceedings, Lecture Notes in Computer Science, vol. 1109, N. Koblitz ed., Springer-Verlag.
Bellovin, Steven M., “Problem Areas for the IP Security Protocols”, Jul. 22-25, 1996, Proceedings of the Sixth Usenix UNIX Security Symposium, San Jose, CA.
Cisco User Contol Point, pp. 1-4, printed from http://www.cisco.com/warp.public/728/ucp/ucp ds.htm on Sep. 10, 1998.
IPSec Network Security, pp. 1-69, printed from http://www.cisco.com/univercd/cc/td/doc/products/software/ios113ed/113t/113t 3/ipsec.
Krawczyk, Hugo, “SKEME: A Versalite Secure Key Exchange Mechanism for Internet”, 1996, IEEE, Proceedings of the 1996 Symposium on Network and Distributed Systems Secutrity.
Patel, B., et al., “Securing L2TP using IPSEC”, May 1998, PPPEXT Working Group, pp. 1-10, printed from http://www.masinter.net/˜12tp/ftp/draft-ietf-pppext-12tp-security-02.txt. on Sep. 21, 1998.
“Remote Access Network Security”, Ascend Communications, Inc., printed from http://www.ascend.com/1103.html, on Jul. 24, 1998, pp. 1-8.
Rigney, et al., “Remote Authentication Dial In User Service (RADIUS)”, Network Working Group, RFC 2138, Apr. 1997, pp. 1-57.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and apparatus for securing information access does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and apparatus for securing information access, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for securing information access will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3539196

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.