Electrical computers and digital processing systems: multicomput – Computer-to-computer session/connection establishing – Session/connection parameter setting
Reexamination Certificate
2005-12-13
2005-12-13
El-Hady, Nabil (Department: 2152)
Electrical computers and digital processing systems: multicomput
Computer-to-computer session/connection establishing
Session/connection parameter setting
C709S227000, C709S229000
Reexamination Certificate
active
06976076
ABSTRACT:
An analysis of at least one authentication token for an application is provided. At least one login module within the application is identified. Responsive to a failure to access the application, principal information is retrieved associated with the at least one login module. A recovery action is then generated. The recovery action corresponds to the failure and the principal information.
REFERENCES:
patent: 5774551 (1998-06-01), Wu et al.
patent: 5781724 (1998-07-01), Nevarez et al.
patent: 5950006 (1999-09-01), Crater et al.
patent: 5950199 (1999-09-01), Schmuck et al.
patent: 5997167 (1999-12-01), Crater et al.
patent: 6018567 (2000-01-01), Dulman
patent: 6065057 (2000-05-01), Rosen et al.
patent: 6118449 (2000-09-01), Rosen et al.
patent: 6122575 (2000-09-01), Schmidt et al.
patent: 6201996 (2001-03-01), Crater et al.
patent: 6651168 (2003-11-01), Kao et al.
patent: 2003/0232176 (2003-12-01), Polk et al.
patent: 7200479 (1995-08-01), None
patent: 103453 (1998-01-01), None
patent: 10187490 (1998-07-01), None
patent: 11096120 (1999-04-01), None
patent: 11134294 (1999-05-01), None
patent: 11134298 (1999-05-01), None
patent: 11175474 (1999-07-01), None
patent: 200035929 (2000-02-01), None
IBM Research Disclosure 432178, “Network Configuration and Test Tool”, Apr. 2000, p. 783.
DeMeester, “C2 Auditing in the X Display Manager”, Proceedings. Ninth Annual Computer Security Applications Conference (Cat. No. 93TH0581-9), pp. 265-271, Published: Los Alamitos, CA, USA, 1993.
Calitz, M. et al., “Security Management in a Distributed Open Environment”, Information Security—the Next Decade. Proceedings of the IFIP TC11 Eleventh International Conference on Information Security, IFIP/Sec '95, pp. 396-406, Published: London, UK, 1995.
Humphrey Randy Scott
London Shrader Theodore Jack
Soper Davis Kent
Zhang Xiaoyan
El-Hady Nabil
LaBaw Jeffrey S.
Lammes Francis
Yee Duke W.
LandOfFree
Architecture for the graphical management and analysis of... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Architecture for the graphical management and analysis of..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Architecture for the graphical management and analysis of... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3515627