×

Specifying security protocols and policy constraints in distributed systems

  • US 6,256,741 B1
  • Filed: 10/13/2000
  • Issued: 07/03/2001
  • Est. Priority Date: 04/30/1996
  • Status: Expired due to Term
First Claim
Patent Images

1. A method for system security in distributed systems, said method comprising the steps of:

  • a) making authentic statements by trusted intermediaries;

    b) deriving freshness constraints from initial policy assumptions and the authentic statements;

    c) imposing freshness constraints by employing recent-secure authenticating principals to effect revocation; and

    d) verifying that a relation |tnow

    ttime stamp|≦

    δ

    is satisfied for verification of a secure channel, where ttime stamp being a time of a time stamp pertaining to a validity assertion of a particular assertion, δ

    being a minimum necessary freshness constraint pertaining to the particular assertion and tnow being the time of verification.

View all claims
  • 7 Assignments
Timeline View
Assignment View
    ×
    ×