Method and apparatus for revocation list management
First Claim
1. A method for controlling access to information, the method comprising the steps of:
- maintaining, for a given entity controlling access to the information, a contact list comprising information identifying one or more other entities which have attempted to communicate with the given entity; and
utilizing the contact list in conjunction with a revocation list associated with the given entity to determine which of at least a subset of the one or more other entities are authorized to communicate with the given entity.
2 Assignments
0 Petitions
Accused Products
Abstract
Access to information is controlled by maintaining, for a given device or other entity through which information may be accessed, a contact list that includes information identifying one or more other entities which have attempted to communicate with the given entity. In accordance with the invention, the contact list is utilized in conjunction with a revocation list stored in a memory associated with the given entity in order to determine which of the other entities are authorized to communicate with the given entity. The contact list includes a number of entries, each entry having at least an identifier of a particular one of the other entities and a corresponding revocation flag indicating whether the particular entity has been revoked. The contact list is updated after a modification of the revocation list, or if a new entity not already included in the contact list attempts to communicate with the given entity.
74 Citations
20 Claims
-
1. A method for controlling access to information, the method comprising the steps of:
-
maintaining, for a given entity controlling access to the information, a contact list comprising information identifying one or more other entities which have attempted to communicate with the given entity; and utilizing the contact list in conjunction with a revocation list associated with the given entity to determine which of at least a subset of the one or more other entities are authorized to communicate with the given entity. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. An apparatus for controlling access to information, the apparatus comprising:
a processor-based device for controlling access to the information, wherein the processor-based device is operative to maintain a contact list comprising information identifying one or more other entities which have attempted to communicate with the processor-based device, and to utilize the contact list in conjunction with a revocation list associated with the given entity to determine which of at least a subset of the one or more other entities are authorized to communicate with the processor-based device. - View Dependent Claims (17)
-
18. An article of manufacture comprising a machine-readable storage medium containing one or more software programs for use in controlling access to information, wherein the programs when executed implement the steps of:
-
maintaining, for a given entity controlling access to the information, a contact list comprising information identifying one or more other entities which have attempted to communicate with the given entity; and utilizing the contact list in conjunction with a revocation list associated with the given entity to determine which of at least a subset of the one or more other entities are authorized to communicate with the given entity. - View Dependent Claims (19, 20)
-
Specification