Digital identity creation and coalescence for service...

Electrical computers and digital processing systems: support – System access control based on user identification by... – Using record or token

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S155000, C726S005000

Reexamination Certificate

active

10270984

ABSTRACT:
A system is disclosed to provide service authorization. The system provides authorized access to services using various identity tokens that represent authorized users, services, servers or other devices, as well as specific instances of users authorized for a service and specific instances of users authorized for a service on a particular server or other device.

REFERENCES:
patent: 5343527 (1994-08-01), Moore
patent: 5754659 (1998-05-01), Sprunk et al.
patent: 5825884 (1998-10-01), Zdepski et al.
patent: 6012090 (2000-01-01), Chung et al.
patent: 6032260 (2000-02-01), Sasmazel et al.
patent: 6044388 (2000-03-01), DeBellis et al.
patent: 6185682 (2001-02-01), Tang
patent: 6266771 (2001-07-01), Bellare et al.
patent: 6505244 (2003-01-01), Natarajan et al.
patent: 6516412 (2003-02-01), Wasilewski et al.
patent: 6721886 (2004-04-01), Uskela
patent: 7080077 (2006-07-01), Ramamurthy et al.
patent: 2002/0126846 (2002-09-01), Multerer et al.
patent: 2003/0061487 (2003-03-01), Angelo et al.
patent: 2003/0065749 (2003-04-01), Gailey et al.
Menezes et al, “Handbook of Applied Cryptography,” 1997, p. 355.
Brain, Marshall “How Web Servers and the Internet Work” Nov. 27, 1999, pp. 1-3. <http://web.archive.org/web/19991127121729/www.howstuffworks.com/web-server4.htm>.
G. W. Wettstein, Johannes Grosen, “Gaining the Middleground: A Linux-based Open Souce Middleware Initiative,” Atlanta Linux Symposium; Oct. 2000, available at http://www.usenix.org/publications/library/proceedings/als2000/wettstein.html (13 pages).
R. Rivest, “the MD5 Message-Digest Algorithm,” RFC1321, MIT Laboratory for Computer Science, Apr. 1992 (21 pages).
“Secure Hash Standard,” FIPS PUB 180-1, May 11, 1993, (13 pages) available at http://www.itl.nist.gov/fipspubs/fip180-1.htm (13 pages).
H. Krawcyk, M. Bellare, R. Canetti, “HMAC: Keyed-Hashing for Message Authentication,” RFC2104, Feb. 1997 (11 pages).

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Digital identity creation and coalescence for service... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Digital identity creation and coalescence for service..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Digital identity creation and coalescence for service... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3913602

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.