Information security – Access control or authentication – Stand-alone
Reexamination Certificate
1999-05-27
2008-11-11
Kim, Jung (Department: 2132)
Information security
Access control or authentication
Stand-alone
Reexamination Certificate
active
07451484
ABSTRACT:
A program written in untrusted code (e.g., JAVA) is enabled to access a native operating system resource (e.g., supported in WINDOWS NT) through a staged login protocol. In operation, a trusted login service listens, e.g., on a named pipe, for requests for login credentials. In response to a login request, the trusted login service requests a native operating system identifier. The native operating system identifier is then sent to the program. Using this identifier, a credential object is then created within an authentication framework. The credential object is then used to login to the native operating system to enable the program to access the resource. This technique enables a JAVA program to access a WINDOWS NT operating system resource under the identity of the user running the JAVA program.
REFERENCES:
patent: 5187790 (1993-02-01), East et al.
patent: 5421011 (1995-05-01), Camillone et al.
patent: 5623601 (1997-04-01), Vu
patent: 5678041 (1997-10-01), Baker et al.
patent: 5682478 (1997-10-01), Watson et al.
patent: 5684951 (1997-11-01), Goldman et al.
patent: 5689708 (1997-11-01), Regnier et al.
patent: 5708780 (1998-01-01), Levergood et al.
patent: 5802367 (1998-09-01), Held et al.
patent: 5974566 (1999-10-01), Ault et al.
patent: 6157961 (2000-12-01), Kessler et al.
patent: 6182142 (2001-01-01), Win et al.
patent: 6275938 (2001-08-01), Bond et al.
patent: 6298370 (2001-10-01), Tang et al.
patent: 6308225 (2001-10-01), Schofield
patent: 6453362 (2002-09-01), Bittinger et al.
patent: 6529962 (2003-03-01), Azagury et al.
patent: 6553428 (2003-04-01), Ruehle et al.
patent: 9714098 (1997-04-01), None
Frisch, AEleen; Essential System Administration; 1995; O'reilly; 2nd Edition, pp. 23-66, 144-197, 273-278, 585-597.
Itoi, Naomaru; Honeyman, Peter; “Pluggable Authentication Module for Windows NT”; Apr. 10, 1998; CITI Technical Report 98-1; pp. 1-4.
Horstmann, Cay S.; Cornell, Gary; Core JAVA vol. I-Fundamentals; 1997; Sun Microsystems Press, pp. 21-78.
Stallings, William; Cryptography and Network Security; Jun. 4, 1998; Prentice-Hall, Inc.; pp. 323-353.
Author unknown; ‘Moving Unix Applications to Windows NT’; Feb. 16, 1994; http://praun.home.cern.ch/praun/public/UNIX-to-NT/overview.html; pp. 1-52.
Hunt, Craig; ‘TCP/IP Network Administration’; Mar. 1993; O'Reilly & Associates; pp. 27-50.
London Shrader Theodore Jack
Nadalin Anthony J.
Rich Bruce Arland
International Business Machines - Corporation
Kim Jung
LaBaw Jeffrey S.
Walder, Jr. Stephen J.
LandOfFree
Method for enabling a program written in untrusted code to... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method for enabling a program written in untrusted code to..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for enabling a program written in untrusted code to... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4040795