×

Specifying security protocols and policy constraints in distributed systems

  • US 6,216,231 B1
  • Filed: 04/25/1997
  • Issued: 04/10/2001
  • Est. Priority Date: 04/30/1996
  • Status: Expired due to Term
First Claim
Patent Images

1. A method for system security in distributed systems, said method comprising the steps of:

  • a) making authentic statements by trusted intermediaries;

    b) deriving freshness constraints from initial policy assumptions and the authentic statements; and

    c) imposing freshness constraints by employing recent-secure authenticating principals to effect revocation;

    wherein said step b) comprises the substep I) of normalizing suffix constraints of the freshness constraint prior to applying other rules; and

    wherein said substep I) comprises applying the following axiom, (A→

    B notbefore t1 notafter t2)⊃

    (((t1

    t3

    (t4

    t2))⊃

    A→

    B notbefore t3 notafter t4).

View all claims
  • 7 Assignments
Timeline View
Assignment View
    ×
    ×