Method and apparatus for proxy authentication

Data processing: database and file management or data structures – Database design – Data structure types

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

707 9, G06F 1100

Patent

active

059130253

ABSTRACT:
A method for a source to obtain the rights of a target object is disclosed. The source first obtains the rights of a source object, which rights include authorization to access a target object and to modify authentication data of the target object. Next, the source object generates new authentication data. After accessing the target object using the rights of the source object, the source modifies the authentication data of the target object to include the new authentication data. Using the new authentication data, the source obtains the rights of the target object, whereby the source becomes a proxy for the target object. As a proxy, the source uses the rights of the target object. Alternative processes for proxy authentication, as well as apparatus for proxy authentication, are also disclosed.

REFERENCES:
patent: 5032979 (1991-07-01), Hecht et al.
patent: 5276901 (1994-01-01), Howell et al.
patent: 5321841 (1994-06-01), East et al.
patent: 5481721 (1996-01-01), Serlet et al.
patent: 5511197 (1996-04-01), Hill et al.
patent: 5586260 (1996-12-01), Hu
patent: 5594921 (1997-01-01), Pettus
patent: 5608903 (1997-03-01), Prasad et al.
patent: 5613148 (1997-03-01), Bezviner et la.
patent: 5623601 (1997-04-01), Vu
patent: 5642511 (1997-06-01), Chow et al.
patent: 5677851 (1997-10-01), Kingdon et al.
Neumann et al., "Proxy Based Authorization and Accounting for Distributed Systems", IEEE, pp. 283-291, 1993.
Shapiro, "A Binding Protocol for Distributed Shared Objects", Distributed Computig Systems, Int'l Conf., IEEE, pp. 134-141, 1994.
Dave et al., "Proxies, Application Interfaces, and Distributed Systems", Object Orientation in Oerating Systems, Int'l Workshop, IEEE, pp. 212-220, 1992.
Russo et al., "Distributed Objhect Interoperability Via a Nteowrk Type System", Object Orientation in Operating Systems, Int'l Workshop, IEEE, pp. 319-327, 1992.
Trostle et al., "A Flexible Distributed Authroization Protocol", Network and Distributed System Security Symposium, IEEE, pp. 43-52, 1996.
Schmidt et al., "Using Shared Memory for Read Mostly RPC Services", System Sciences, Annual Int'l Conf., IEEE, pp. 141-149, 1996.
Novell's Guide to NetWare 4.1 Networks, table of contents and Chapters 12 and 13, Hughes and Thomas,ISBN: 1-56884-736-X, 1996.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and apparatus for proxy authentication does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and apparatus for proxy authentication, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for proxy authentication will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-408279

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.