Credential vault encryption

Information security – Access control or authentication – Network

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S150000, C713S155000, C713S168000

Reexamination Certificate

active

07865943

ABSTRACT:
A number of secondary passwords can be encrypted with a primary password and stored in a credential vault. An encrypted secondary password from the credential vault can be decrypted using the primary password and provided the secondary password to an application. Encrypted secondary passwords can be updated when the primary password changes.

REFERENCES:
patent: 5335345 (1994-08-01), Frieder et al.
patent: 5594793 (1997-01-01), Bahout
patent: 5797128 (1998-08-01), Birnbaum
patent: 5872928 (1999-02-01), Lewis et al.
patent: 5941947 (1999-08-01), Brown et al.
patent: 6029196 (2000-02-01), Lenz
patent: 6055637 (2000-04-01), Hudson et al.
patent: 6073242 (2000-06-01), Hardy et al.
patent: 6088679 (2000-07-01), Barkley
patent: 6158010 (2000-12-01), Moriconi et al.
patent: 6178511 (2001-01-01), Cohen et al.
patent: 6202066 (2001-03-01), Barkley et al.
patent: 6240512 (2001-05-01), Fang et al.
patent: 6243747 (2001-06-01), Lewis et al.
patent: 6256741 (2001-07-01), Stubblebine
patent: 6285366 (2001-09-01), Ng et al.
patent: 6304881 (2001-10-01), Halim et al.
patent: 6321336 (2001-11-01), Applegate et al.
patent: 6327594 (2001-12-01), Van Huben et al.
patent: 6327628 (2001-12-01), Anuff et al.
patent: 6339826 (2002-01-01), Hayes et al.
patent: 6360363 (2002-03-01), Moser et al.
patent: 6385627 (2002-05-01), Cragun
patent: 6397222 (2002-05-01), Zellweger
patent: 6460141 (2002-10-01), Olden
patent: 6477543 (2002-11-01), Huang et al.
patent: 6484261 (2002-11-01), Wiegel
patent: 6542993 (2003-04-01), Erfani
patent: 6574736 (2003-06-01), Andrews
patent: 6581054 (2003-06-01), Bogrett
patent: 6662300 (2003-12-01), Peters
patent: 6697805 (2004-02-01), Choquier et al.
patent: 6738789 (2004-05-01), Multer et al.
patent: 6757822 (2004-06-01), Feiertag et al.
patent: 6769095 (2004-07-01), Brassard et al.
patent: 6772332 (2004-08-01), Boebert et al.
patent: 6832313 (2004-12-01), Parker
patent: 6854035 (2005-02-01), Dunham et al.
patent: 6857012 (2005-02-01), Sim et al.
patent: 6859878 (2005-02-01), Kerr et al.
patent: 6873988 (2005-03-01), Herrmann et al.
patent: 6931549 (2005-08-01), Ananda
patent: 6934934 (2005-08-01), Osborne et al.
patent: 6978379 (2005-12-01), Goh et al.
patent: 7003578 (2006-02-01), Kanada et al.
patent: 7047522 (2006-05-01), Dixon, III et al.
patent: 7093261 (2006-08-01), Harper et al.
patent: 7093283 (2006-08-01), Chen et al.
patent: 7124413 (2006-10-01), Klemm et al.
patent: 7185192 (2007-02-01), Kahn
patent: 7219140 (2007-05-01), Marl et al.
patent: 7272625 (2007-09-01), Hannel et al.
patent: 2001/0039586 (2001-11-01), Primak et al.
patent: 2001/0044893 (2001-11-01), Skemer
patent: 2001/0047485 (2001-11-01), Brown et al.
patent: 2002/0107920 (2002-08-01), Hotti
patent: 2002/0169893 (2002-11-01), Chen et al.
patent: 2002/0178119 (2002-11-01), Griffin et al.
patent: 2002/0188869 (2002-12-01), Patrick
patent: 2003/0046576 (2003-03-01), High et al.
patent: 2003/0069874 (2003-04-01), Hertzog et al.
patent: 2003/0078959 (2003-04-01), Yeung et al.
patent: 2003/0110448 (2003-06-01), Haut et al.
patent: 2003/0126464 (2003-07-01), McDaniel et al.
patent: 2003/0146937 (2003-08-01), Lee
patent: 2003/0167455 (2003-09-01), Iborra et al.
patent: 2003/0200350 (2003-10-01), Kumar et al.
patent: 2004/0024812 (2004-02-01), Park et al.
patent: 2004/0117493 (2004-06-01), Bazot
patent: 2004/0162905 (2004-08-01), Griffin et al.
patent: 2004/0215650 (2004-10-01), Shaji et al.
patent: 2005/0021656 (2005-01-01), Callegari
patent: 2005/0256894 (2005-11-01), Talanis et al.
patent: 2005/0257267 (2005-11-01), Williams et al.
patent: 2006/0167858 (2006-07-01), Dennis et al.
patent: 2006/0280191 (2006-12-01), Nishida et al.
patent: 2007/0240063 (2007-10-01), Cheng
International Search Report for PCT/US07/79236, dated Jun. 16, 2008, 9 pages.
L. Koved, et al.,“Security Challenges for Enterprise Java in an E-Business Environment”, IBM Systems Journal, Jan. 2001. retrieved from: http://portal.acm.org/citation.cfm?id=1011436, p. 1, last visited: Oct. 24, 2007.
L. Koved, et al., “Security Challenges for Enterprise Java in an E-Business Environment”, IBM Systems Journal, Jan. 2001, pp. 130-152, vol. 40, Issue 1.
Hayton, et al. “Access Control in an Open Distributed Environment”, 12 pages, 1998.
Bertino et al., “TRBAC: A Temporal Role-Based Access Control Model”, ACM Transactions on Information and System Security, Aug. 2001, pp. 191-223, vol. 4, No. 3.
Sandhu, et al., “Role-Based Access Control Models”, IEEE Computer, Feb. 1996, pp. 38-47, vol. 29, No. 2.
Covington, et al., “Securing Context-Aware Applications Using Environment Roles”, ACM workshop on Role Based Access Control, Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies, 11 pages, 2001.
Yao, et al., “A Model of OASIS Role-Based Access Control and its Support for Active Security”, ACM workshop on Role Based Access Control, Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies, 11 pages, 2001.
Georgiadis, et al., “Flexible Team-Based Access Control Using Contexts”, ACM workshop on Role Based Access Control, Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies, 7 pages, 2001.
Tzelepi, et al., “A Flexible Content and Context-Based Access Control Model for Multimedia Medical Image Database Systems”, International Multimedia Conference, Proceedings of the 2001 workshop on Multimedia and security: new challeneges, 4 pages, 2001.
Goh, “Towards a More Complete Model of Role”, Symposium on Access Control Models and Technologies, Proceedings of the third ACM workshop on Role-Based Access Control, 7 pages, 1998.
“USData Centers Chooses Baltimore SelectAccess to Enable Next Generation Security Solutions for eBusiness”, Business Wire, Apr. 4, 2001, 2 pages.
Microsoft, “Microsoft Windows XP Professional”, copyright 1981-2001, 3 pages.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Credential vault encryption does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Credential vault encryption, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Credential vault encryption will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2718664

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.