Using permissions to allocate device resources to an...

Information security – Access control or authentication – Network

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S170000, C713S193000, C713S194000, C380S249000, C726S002000, C726S003000, C726S005000, C726S006000, C726S007000, C726S027000, C726S028000, C726S029000

Reexamination Certificate

active

07743407

ABSTRACT:
Resources to a device are granted access to an application based on privileges associated with the application. A permission list may be created by a server. The permission list may be created using information from authorities, entities, or parties and information about the device resources. The permission list indicates what device resources the application may access. During application execution when the application requests a resource, a control program executing on the device may be used to check the permission list associated with the application to determine if the application may access the resource. The control program can then grant or deny access based on the privileges defined in the permission list. Digital signatures may be used to detect modifications to the application and/or permission list. In addition, multiple permission lists may be associated with the same application.

REFERENCES:
patent: 5689708 (1997-11-01), Regnier et al.
patent: 5745879 (1998-04-01), Wyman
patent: 6105066 (2000-08-01), Hayes, Jr.
patent: 6125447 (2000-09-01), Gong
patent: 6158010 (2000-12-01), Moriconi et al.
patent: 6367019 (2002-04-01), Ansell et al.
patent: 6468160 (2002-10-01), Eliott
patent: 6857071 (2005-02-01), Nakae
patent: 6874087 (2005-03-01), Fetkovich et al.
patent: 6895503 (2005-05-01), Tadayon et al.
patent: 01018650 (2001-03-01), None
patent: WO 01/18650 (2001-03-01), None
Senn, J.A. “The Emergence of M-Commerce” (Dec. 2000) Computer vol. 33 Issue 12. pp. 148-150. IEEE DOI: 10.1109/2.889097.
K. Fujimura, Y. Nakajima, J. Sekine “XML Ticket: Generalized Digital Ticket Definition Language” (Mar. 1999) Presented at XML-DSig '99. Digital Copy available at http://www.w3.org/DSig/signed-XML99/pp/NTT—xml—ticket.html.
Gong, L.: “Java Security Architecture (JDK1.2),” Dec. 6, 1998.
International Search Report-PCT/US02/025746, International Search Authority, European Patent Office-Dec. 6, 2002.
European Search Report-EP02761353, Search Authority Munich Nov. 29, 2007.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Using permissions to allocate device resources to an... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Using permissions to allocate device resources to an..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Using permissions to allocate device resources to an... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4177387

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.