Authentication and authorization across autonomous network...

Information security – Access control or authentication

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S001000, C726S008000, C713S170000

Reexamination Certificate

active

07617522

ABSTRACT:
An enterprise network architecture has a trust link established between two autonomous network systems that enables transitive resource access between network domains of the two network systems. The trust link is defined by data structures maintained by each of the respective network systems. The first network system maintains namespaces that correspond to the second network system and a domain controller in the first network system, or a first network system administrator, indicates whether to trust individual namespaces. An account managed by a domain in the second network system can request authentication via a domain controller in the first network system. The first network system determines from the trust link to communicate the authentication request to the second network system. The first network system also determines from the trust link where to communicate authorization requests when administrators manage group memberships and access control lists.

REFERENCES:
patent: 4873517 (1989-10-01), Baratz et al.
patent: 5261051 (1993-11-01), Masden et al.
patent: 5313630 (1994-05-01), Namioka et al.
patent: 5551027 (1996-08-01), Choy et al.
patent: 5588147 (1996-12-01), Neeman
patent: 5608903 (1997-03-01), Prasad et al.
patent: 5649194 (1997-07-01), Miller
patent: 5675787 (1997-10-01), Miller et al.
patent: 5698121 (1997-12-01), Kosaka et al.
patent: 5768519 (1998-06-01), Swift et al.
patent: 5774552 (1998-06-01), Grimmer
patent: 5787441 (1998-07-01), Beckhardt
patent: 5787442 (1998-07-01), Hacherl et al.
patent: 5806074 (1998-09-01), Souder et al.
patent: 5832225 (1998-11-01), Hacherl et al.
patent: 5832275 (1998-11-01), Olds
patent: 5832487 (1998-11-01), Olds et al.
patent: 5832506 (1998-11-01), Kuzma
patent: 5884322 (1999-03-01), Sidhu et al.
patent: 5926816 (1999-07-01), Bauer et al.
patent: 5968121 (1999-10-01), Logan et al.
patent: 5968131 (1999-10-01), Mendez et al.
patent: 6049809 (2000-04-01), Raman et al.
patent: 6052724 (2000-04-01), Willie et al.
patent: 6058401 (2000-05-01), Stamos et al.
patent: 6138124 (2000-10-01), Beckhardt
patent: 6212557 (2001-04-01), Oran
patent: 6247017 (2001-06-01), Martin
patent: 6301589 (2001-10-01), Hirashima et al.
patent: 6324571 (2001-11-01), Hacherl
patent: 6343299 (2002-01-01), Huang et al.
patent: 6377950 (2002-04-01), Peters et al.
patent: 6393482 (2002-05-01), Rai et al.
patent: 6427209 (2002-07-01), Brezak et al.
patent: 6446077 (2002-09-01), Straube et al.
patent: 6446092 (2002-09-01), Sutter
patent: 6457053 (2002-09-01), Satagopan et al.
patent: 6516327 (2003-02-01), Zondervan et al.
patent: 6529917 (2003-03-01), Zoltan
patent: 6532479 (2003-03-01), Souder et al.
patent: 6539381 (2003-03-01), Prasad et al.
patent: 6643670 (2003-11-01), Parham et al.
patent: 6647393 (2003-11-01), Dietterich et al.
patent: 6751634 (2004-06-01), Judd
patent: 6823338 (2004-11-01), Byrne et al.
patent: 6865576 (2005-03-01), Gong et al.
patent: 6879564 (2005-04-01), Parham et al.
patent: 6901433 (2005-05-01), San Andres et al.
patent: 7035922 (2006-04-01), Parham
patent: 7162499 (2007-01-01), Lees et al.
patent: 7184359 (2007-02-01), Bridgewater et al.
patent: 7185359 (2007-02-01), Schmidt et al.
patent: 7200847 (2007-04-01), Straube et al.
patent: 2002/0138735 (2002-09-01), Felt et al.
patent: 2006/0026165 (2006-02-01), Mohamed et al.
patent: 2006/0085428 (2006-04-01), Bozeman et al.
patent: 2006/0168120 (2006-07-01), Parham
patent: 2006/0184589 (2006-08-01), Lees et al.
patent: 2006/0200831 (2006-09-01), Straube et al.
patent: 2007/0162519 (2007-07-01), Straube et al.
Schmidt (Jeff Schmidt, Microsoft Windows 2000 Security Handbook, ISBN: 0-78797-1999-1, Aug. 2000), 219-220.
Hadfield (Lee Hadfield, Dave Hater, Dave Bixler, “Windows NT Server 4 Security Handbook”, 1997, ISBN: 078971213), p. 123-145). Note: p. 145 is followed by p. 144.
N. Lesert, “The distributed computing environment naming architecture”, Distrib. Syst. Engng. vol. 1 pp. 19-28 (1993), first published in the proceedings of “OpenForum '92” in Utrecht, the Netherlands.
R. Khare et al., “Trust management on the world wide web”, Computer networks and ISDN Systems vol. 30 pp. 651-653 (1998).
J. Pato, “Hierarchical trust relationships for inter-cell authentication” http://www.opengroup.org/tech/rfc/mirror-rfc/rfc7.0.txt, Jul. 1992.
Active Directory LDAP Compliance—White Paper. Microsoft Corporation, Oct. 2003. pp. 1-16.
Aharoni, Ehud et al.Restricted Dynamic Steiner Trees for Scalable Multicast in Datagram Networks. IEEE/ACM Transactions on Networking, vol. 6, No. 3, Jun. 1998, pp. 286-297.
Ajtai, M. et al.Compactly Encoding Unstructured Inputs with Differential Compression. Journal of the ACM, vol. 49, No. 3, May 2002, pp. 318-367.
AMD64 Technology.AMD64 Architecture Programmer's Manual vol. 3: General-Purpose and System Instructions. Advanced Micro Devices, Sep. 2006, pp. 1-466.
Anderson, Anne.DCE 1.1 Hierarchical Cells Security Functional Specification, Draft. Oct. 5, 1993, [15 pages].
Anderson, D and Shanley, T.Pentium Processor System Architecture. MindShare, Inc.; chapters 7, 8, 11, 14-16; Appx. A, D (2d ed., 1995).
Aphelion Directory 2003.2 Administration Guide With: Common DUA Service Module (CDSM) Distributed LDAP Service Module (DLSM), Chapter 10.2 “Multi-master Replication Topology” [online] 2003 [retrieved on Dec. 27, 2007]. Retrieved from the internet: <URL: <http://websolver.us.syntegra.com/support/sw/docs/aphelion2003.2/admin/> (click on “Multi-master Replication Topology”).
Bernstein, Philip.Review: A Majority Consensus Approach to Concurrency Control for Multiple Copy Databases. [online]. ACM SIGMOD Digital Review 1, 1999 [retrieved on Dec. 20, 2007]. Retrieved from internet: <URL: http://www.informatik.uni-trier.de/˜ley/db/journals/dr/Bernstein99.html>.
Bharath-Kumar, Kadaba et al.Routing to Multiple Destinations in Computer Networks. IEEE Transactions on Communication, vol. COM-31, No. 3, Mar. 1983, pp. 343-351.
Birrell, Andrew D.; Hisgen, Andy; Jerian, Chuck, Mann, Timothy and Swart, Garret.The Echo Distributed File System. Technical Report 111, Digital Equipment Carp. Systems Research Center, Sep. 1993, [26 pages].
Bjøorner, N. et al.Content Dependent Chunking for Differential Compression, The Local Maximum Approach. MSR Technical Report, Dec. 2006, pp. 1-90.
Broder, A.Z. et al.Syntactic clustering of the Web[online]. [Retrieved on Sep. 21, 2007] Proceedings of the 6th International Conference on WWW, Sep. 1997, pp. 1-16. Retrieved from: http://www.std.org/msm/common/clustering.html.
Broder, A.Z.On the resemblance and containment of documents. Proceedings of the Compression and Complexity of Sequences, Jul. 11-13, 1997, pp. 21-29.
Byte.com.New Replication Options in Access, Oracle and Notes. Byte Magazine Article, Oct. 1995, pp. 1-4.
Byte.com.Notes Replication: Outstanding in Its Field. Byte Magazine Article, Apr. 1996, pp. 1-3.
Calvert, Kenneth L.; Doar, Matthew B. and Zegura, Ellen W.Modeling Internet Topology. IEEE Communications Magazine, 1997, vol. 35, No. 6, pp. 160-163.
Can I Rename my Windows 2000 Domain. Petri IT Knowledgebase. [online], [retrieved on Aug. 1, 2007]. Retrieved from the internet: <URL: http://www.petri.co.il/w2k—domain—rename.htm>.
Carter, Robert et al.Server Selection Using Dynamic Path Characterization in Wide-Area Networks. IEEE Infocom '97, vol. 3, Apr. 7-12, 1997, pp. 1014-1021.
Chan, M.C. and Woo, T.Y.C.Cache-based Compaction: A New Technique for Optimizing Web Transfer. Proc. of the IEEE Infocom Conference, 1999, pp. 117-125.
Colt 1.2.0. [online], [retrieved on Dec. 12, 2007]. Retrieved from the internet: <URL: http://dsd.lbl.gov/˜hoschek/colt/index.html>.
Commons Collections[online], [retrieved on Dec. 14, 2007]. Retrieved from the internet: <URL: http://commons.apache.org/collections/>.
Concurrency Control [online], [retrieved on Dec. 27, 2007]. Retrieved from the internet: <URL: http://ftp.research.microsoft.com/users/ccontrol/chapter8.pd

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Authentication and authorization across autonomous network... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Authentication and authorization across autonomous network..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Authentication and authorization across autonomous network... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4078427

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.