Method for enabling a program written in untrusted code to...

Information security – Access control or authentication – Stand-alone

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

Reexamination Certificate

active

07451484

ABSTRACT:
A program written in untrusted code (e.g., JAVA) is enabled to access a native operating system resource (e.g., supported in WINDOWS NT) through a staged login protocol. In operation, a trusted login service listens, e.g., on a named pipe, for requests for login credentials. In response to a login request, the trusted login service requests a native operating system identifier. The native operating system identifier is then sent to the program. Using this identifier, a credential object is then created within an authentication framework. The credential object is then used to login to the native operating system to enable the program to access the resource. This technique enables a JAVA program to access a WINDOWS NT operating system resource under the identity of the user running the JAVA program.

REFERENCES:
patent: 5187790 (1993-02-01), East et al.
patent: 5421011 (1995-05-01), Camillone et al.
patent: 5623601 (1997-04-01), Vu
patent: 5678041 (1997-10-01), Baker et al.
patent: 5682478 (1997-10-01), Watson et al.
patent: 5684951 (1997-11-01), Goldman et al.
patent: 5689708 (1997-11-01), Regnier et al.
patent: 5708780 (1998-01-01), Levergood et al.
patent: 5802367 (1998-09-01), Held et al.
patent: 5974566 (1999-10-01), Ault et al.
patent: 6157961 (2000-12-01), Kessler et al.
patent: 6182142 (2001-01-01), Win et al.
patent: 6275938 (2001-08-01), Bond et al.
patent: 6298370 (2001-10-01), Tang et al.
patent: 6308225 (2001-10-01), Schofield
patent: 6453362 (2002-09-01), Bittinger et al.
patent: 6529962 (2003-03-01), Azagury et al.
patent: 6553428 (2003-04-01), Ruehle et al.
patent: 9714098 (1997-04-01), None
Frisch, AEleen; Essential System Administration; 1995; O'reilly; 2nd Edition, pp. 23-66, 144-197, 273-278, 585-597.
Itoi, Naomaru; Honeyman, Peter; “Pluggable Authentication Module for Windows NT”; Apr. 10, 1998; CITI Technical Report 98-1; pp. 1-4.
Horstmann, Cay S.; Cornell, Gary; Core JAVA vol. I-Fundamentals; 1997; Sun Microsystems Press, pp. 21-78.
Stallings, William; Cryptography and Network Security; Jun. 4, 1998; Prentice-Hall, Inc.; pp. 323-353.
Author unknown; ‘Moving Unix Applications to Windows NT’; Feb. 16, 1994; http://praun.home.cern.ch/praun/public/UNIX-to-NT/overview.html; pp. 1-52.
Hunt, Craig; ‘TCP/IP Network Administration’; Mar. 1993; O'Reilly & Associates; pp. 27-50.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method for enabling a program written in untrusted code to... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method for enabling a program written in untrusted code to..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for enabling a program written in untrusted code to... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4040795

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.