Information security – Access control or authentication – Network
Reexamination Certificate
2008-01-14
2011-12-27
Poltorak, Peter (Department: 2434)
Information security
Access control or authentication
Network
C726S001000
Reexamination Certificate
active
08087073
ABSTRACT:
A system enabling an application desiring access to a resource addressable by a URI to produce a response to an authentication challenge to a request to access the URI without including code specific to an authentication system and/or method is provided. The system includes an authentication manager that can pass an authentication challenge to authentication modules and/or objects operable to produce a response to the authentication challenge. The system may also include a cache adapted to store one or more responses to the authentication challenge communicated from the authentication modules, with such cache also being employed to facilitate pre-authenticating test challenges and/or pseudo-challenges.
REFERENCES:
patent: 5369766 (1994-11-01), Nakano et al.
patent: 5613122 (1997-03-01), Burnard et al.
patent: 5655077 (1997-08-01), Jones et al.
patent: 5774551 (1998-06-01), Wu et al.
patent: 5822539 (1998-10-01), van Hoff
patent: 5878411 (1999-03-01), Burroughs et al.
patent: 6058423 (2000-05-01), Factor
patent: 6067623 (2000-05-01), Blakley, III et al.
patent: 6192382 (2001-02-01), Lafer et al.
patent: 6198824 (2001-03-01), Shambroom
patent: 6219790 (2001-04-01), Lloyd et al.
patent: 6269367 (2001-07-01), Travis et al.
patent: 6279111 (2001-08-01), Jensenworth et al.
patent: 6343287 (2002-01-01), Kumar et al.
patent: 6687823 (2004-02-01), Al-Salqan et al.
patent: 6691232 (2004-02-01), Wood et al.
patent: 7322040 (2008-01-01), Olson
patent: 2002/0133570 (2002-09-01), Michel
Itoi (Itoi et al., “Pluggable Authentication Modules for Windows NT”, Proceedings of the 2nd USENIX Windows NT Symposium, Aug. 3, 1998).
Amir, Y., Nita-Rotaru, C., and Stanton, J., “Framework for authentication and access control of client-server group communication systems”. In 3rd InternationalWorkshop on Networked Group Communication (Nov. 2001).
Office Action dated Feb. 10, 2005 cited in U.S. Appl. No. 09/818,358.
Office Action dated Oct. 18, 2005 cited in U.S. Appl. No. 09/818,358.
Office Action dated Feb. 3, 2006 cited in U.S. Appl. No. 09/818,358.
Office Action dated Jul. 31, 2006 cited in U.S. Appl. No. 09/818,358.
Office Action dated Nov. 28, 2006 cited in U.S. Appl. No. 09/818,358.
Office Action dated Apr. 27, 2007 cited in U.S. Appl. No. 09/818,358.
Notice of Allowance dated Oct. 17, 2007 cited in U.S. Appl. No. 09/818,358.
U.S. Appl. No. 11/094,925, filed Mar. 31, 2005.
U.S. Appl. No. 11/094,925, filed Mar. 31, 2005, Olson.
U.S. Appl. No. 09/818,358, filed Feb. 10, 2005, Office Action.
U.S. Appl. No. 09/818,358, filed Oct. 18, 2005, Office Action.
U.S. Appl. No. 09/818,358, filed Feb. 3, 2006, Office Action.
U.S. Appl. No. 09/818,358, filed Jul. 31, 2006, Office Action.
U.S. Appl. No. 09/818,358, filed Nov. 28, 2006, Office Action.
U.S. Appl. No. 09/818,358, filed Apr. 27, 2007, Office Action.
U.S. Appl. No. 09/818,358, filed Oct. 17, 2007, Notice of Allowance.
Oppliger, et al., “A Security Architecture for Tenet Scheme 2,” 1996.
Gary Kessler, “Security in Windows NT”, 1997, http://www.garykessler.net/library
tsecurity.html.
Kaeo, “Designing Network Security”, 1999, ISBN: 1578700434.
Itoi, et al., “Pluggable Authentication Modules for Windows NT”, Proceedings of the 2nd USENIX Windows NT Symposium, Aug. 1998.
Brett Hill, “IIS 101: The Basics of IIS Authentication”, http://www.windowsitpro.com/Web/Article/ArticleID/15843/15843.html, Oct. 2000.
Microsoft, “Windows 2000 Server TCP/IP core networking guide,” 2000, ISBN: 1572318058.
Hamilton (Caching, http://www.net.lut.ac.uk/eval
ode6.html), Sep. 1995.
Kaeo, “Designing network security”, 1999, ISBN: 1578700434, p. 55-57.
Hadfield, et al., “Windows NT Server 4 Security Handbook”, 1997, ISBN: 078971213. p. 64-70.
Microsoft Press, Computer Dictionary, 3rd edition, ISBN: 157231446X, 1997, p. 166.
New Rider “Windows 98 Professional Reference”, http://cma.zdnet.com/book/win98prfref/ch15/ch15.htm, Feb. 2001.
Samar, et al., Making Login Services Independent of Authentication Technologies, ACM Conference on Computer and Communications Security, Mar. 1996.
Nielsen Henrik Frystyk
Olson Lance E.
Paya Cem
Microsoft Corporation
Poltorak Peter
Workman Nydegger
LandOfFree
Authentication architecture does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Authentication architecture, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Authentication architecture will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4302442