Information security – Access control or authentication
Reexamination Certificate
2005-12-09
2011-11-08
Reza, Mohammad W (Department: 2436)
Information security
Access control or authentication
C726S004000, C713S155000, C380S229000
Reexamination Certificate
active
08056116
ABSTRACT:
This invention is to appropriately cope with abnormal states. A control method according to the present invention includes: identifying an abnormal level according to abnormal level reference data stored in advance in an abnormal level reference data storage, from context relating to abnormalities, which has been collected in advance and stored in a context storage; and converting the identified abnormal level to an authentication strength level according to a predetermined authentication strength level setting rule, and causing an authentication server to carry out an authentication processing according to the authentication strength level. By carrying out such a processing, it becomes possible to cause the authentication server to carry out an authentication having an authentication strength level corresponding to an abnormal state.
REFERENCES:
patent: 5706422 (1998-01-01), Maruyama et al.
patent: 5796990 (1998-08-01), Erle et al.
patent: 6597920 (2003-07-01), Yegani et al.
patent: 7103151 (2006-09-01), Lass et al.
patent: 7123739 (2006-10-01), Staring et al.
patent: 7158803 (2007-01-01), Elliott
patent: 7200779 (2007-04-01), Coss et al.
patent: 7308246 (2007-12-01), Yamazaki et al.
patent: 7337146 (2008-02-01), Heelan et al.
patent: 7613929 (2009-11-01), Cohen et al.
patent: 2001/0052082 (2001-12-01), Kinoshita
patent: 2004/0139316 (2004-07-01), Kotani
patent: 2005/0125674 (2005-06-01), Nishiki et al.
patent: 1 011 285 (2000-06-01), None
patent: 2000-184448 (2000-06-01), None
patent: 2002-183734 (2002-06-01), None
patent: 2003-248661 (2003-09-01), None
patent: 2004-318372 (2004-11-01), None
patent: 2005-173805 (2005-06-01), None
patent: 2005-2279934 (2005-08-01), None
patent: 2004/051437 (2004-06-01), None
Yoichiro Morita, et al., “Dynamic Security Provisioning Based on the Existence of Attendants,” Proceedings of the 67thNational Convention of IPSJ, Information Processing Society of Japan, Mar. 2, 2005, pp. 335-336.
Daisuke Nakamura, et al., “A Consideration of the Resource Management System for Supporting Offer of Disaster Information,” The Special Interest Group Technical Reports of IPSJ, Information Processing Society of Japan, Mar. 29, 2002, vol. 2002, No. 32, pp. 55-60.
Japanese Office Action mailed Jan. 4, 2011 in corresponding Japanese Application No. 2005-248809.
Japanese Office Action mailed Mar. 22, 2011 in corresponding Japenese Application No. 2005-248809.
Japanese Office Action mailed Jul. 23, 2011 in corresponding Japenese Application No. 2005-248809.
Ramkumar M. Venkatesan et al., “Threat-Adaptive Security Policy,” IPCCC, Jul. 2, 1997, pp. 525-531.
Inomata Akihiro
Katoh Masafumi
Fujitsu Limited
Reza Mohammad W
Staas & Halsey , LLP
LandOfFree
Control method, control program, and control system does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Control method, control program, and control system, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Control method, control program, and control system will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4293385