Authentication architecture

Information security – Access control or authentication – Network

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S001000

Reexamination Certificate

active

08087073

ABSTRACT:
A system enabling an application desiring access to a resource addressable by a URI to produce a response to an authentication challenge to a request to access the URI without including code specific to an authentication system and/or method is provided. The system includes an authentication manager that can pass an authentication challenge to authentication modules and/or objects operable to produce a response to the authentication challenge. The system may also include a cache adapted to store one or more responses to the authentication challenge communicated from the authentication modules, with such cache also being employed to facilitate pre-authenticating test challenges and/or pseudo-challenges.

REFERENCES:
patent: 5369766 (1994-11-01), Nakano et al.
patent: 5613122 (1997-03-01), Burnard et al.
patent: 5655077 (1997-08-01), Jones et al.
patent: 5774551 (1998-06-01), Wu et al.
patent: 5822539 (1998-10-01), van Hoff
patent: 5878411 (1999-03-01), Burroughs et al.
patent: 6058423 (2000-05-01), Factor
patent: 6067623 (2000-05-01), Blakley, III et al.
patent: 6192382 (2001-02-01), Lafer et al.
patent: 6198824 (2001-03-01), Shambroom
patent: 6219790 (2001-04-01), Lloyd et al.
patent: 6269367 (2001-07-01), Travis et al.
patent: 6279111 (2001-08-01), Jensenworth et al.
patent: 6343287 (2002-01-01), Kumar et al.
patent: 6687823 (2004-02-01), Al-Salqan et al.
patent: 6691232 (2004-02-01), Wood et al.
patent: 7322040 (2008-01-01), Olson
patent: 2002/0133570 (2002-09-01), Michel
Itoi (Itoi et al., “Pluggable Authentication Modules for Windows NT”, Proceedings of the 2nd USENIX Windows NT Symposium, Aug. 3, 1998).
Amir, Y., Nita-Rotaru, C., and Stanton, J., “Framework for authentication and access control of client-server group communication systems”. In 3rd InternationalWorkshop on Networked Group Communication (Nov. 2001).
Office Action dated Feb. 10, 2005 cited in U.S. Appl. No. 09/818,358.
Office Action dated Oct. 18, 2005 cited in U.S. Appl. No. 09/818,358.
Office Action dated Feb. 3, 2006 cited in U.S. Appl. No. 09/818,358.
Office Action dated Jul. 31, 2006 cited in U.S. Appl. No. 09/818,358.
Office Action dated Nov. 28, 2006 cited in U.S. Appl. No. 09/818,358.
Office Action dated Apr. 27, 2007 cited in U.S. Appl. No. 09/818,358.
Notice of Allowance dated Oct. 17, 2007 cited in U.S. Appl. No. 09/818,358.
U.S. Appl. No. 11/094,925, filed Mar. 31, 2005.
U.S. Appl. No. 11/094,925, filed Mar. 31, 2005, Olson.
U.S. Appl. No. 09/818,358, filed Feb. 10, 2005, Office Action.
U.S. Appl. No. 09/818,358, filed Oct. 18, 2005, Office Action.
U.S. Appl. No. 09/818,358, filed Feb. 3, 2006, Office Action.
U.S. Appl. No. 09/818,358, filed Jul. 31, 2006, Office Action.
U.S. Appl. No. 09/818,358, filed Nov. 28, 2006, Office Action.
U.S. Appl. No. 09/818,358, filed Apr. 27, 2007, Office Action.
U.S. Appl. No. 09/818,358, filed Oct. 17, 2007, Notice of Allowance.
Oppliger, et al., “A Security Architecture for Tenet Scheme 2,” 1996.
Gary Kessler, “Security in Windows NT”, 1997, http://www.garykessler.net/library
tsecurity.html.
Kaeo, “Designing Network Security”, 1999, ISBN: 1578700434.
Itoi, et al., “Pluggable Authentication Modules for Windows NT”, Proceedings of the 2nd USENIX Windows NT Symposium, Aug. 1998.
Brett Hill, “IIS 101: The Basics of IIS Authentication”, http://www.windowsitpro.com/Web/Article/ArticleID/15843/15843.html, Oct. 2000.
Microsoft, “Windows 2000 Server TCP/IP core networking guide,” 2000, ISBN: 1572318058.
Hamilton (Caching, http://www.net.lut.ac.uk/eval
ode6.html), Sep. 1995.
Kaeo, “Designing network security”, 1999, ISBN: 1578700434, p. 55-57.
Hadfield, et al., “Windows NT Server 4 Security Handbook”, 1997, ISBN: 078971213. p. 64-70.
Microsoft Press, Computer Dictionary, 3rd edition, ISBN: 157231446X, 1997, p. 166.
New Rider “Windows 98 Professional Reference”, http://cma.zdnet.com/book/win98prfref/ch15/ch15.htm, Feb. 2001.
Samar, et al., Making Login Services Independent of Authentication Technologies, ACM Conference on Computer and Communications Security, Mar. 1996.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Authentication architecture does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Authentication architecture, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Authentication architecture will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4302442

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.