Electrical computers and digital processing systems: support – System access control based on user identification by... – Using record or token
Reexamination Certificate
2008-01-29
2008-01-29
Moise, Emmanuel L. (Department: 2137)
Electrical computers and digital processing systems: support
System access control based on user identification by...
Using record or token
C713S155000, C726S005000
Reexamination Certificate
active
10270984
ABSTRACT:
A system is disclosed to provide service authorization. The system provides authorized access to services using various identity tokens that represent authorized users, services, servers or other devices, as well as specific instances of users authorized for a service and specific instances of users authorized for a service on a particular server or other device.
REFERENCES:
patent: 5343527 (1994-08-01), Moore
patent: 5754659 (1998-05-01), Sprunk et al.
patent: 5825884 (1998-10-01), Zdepski et al.
patent: 6012090 (2000-01-01), Chung et al.
patent: 6032260 (2000-02-01), Sasmazel et al.
patent: 6044388 (2000-03-01), DeBellis et al.
patent: 6185682 (2001-02-01), Tang
patent: 6266771 (2001-07-01), Bellare et al.
patent: 6505244 (2003-01-01), Natarajan et al.
patent: 6516412 (2003-02-01), Wasilewski et al.
patent: 6721886 (2004-04-01), Uskela
patent: 7080077 (2006-07-01), Ramamurthy et al.
patent: 2002/0126846 (2002-09-01), Multerer et al.
patent: 2003/0061487 (2003-03-01), Angelo et al.
patent: 2003/0065749 (2003-04-01), Gailey et al.
Menezes et al, “Handbook of Applied Cryptography,” 1997, p. 355.
Brain, Marshall “How Web Servers and the Internet Work” Nov. 27, 1999, pp. 1-3. <http://web.archive.org/web/19991127121729/www.howstuffworks.com/web-server4.htm>.
G. W. Wettstein, Johannes Grosen, “Gaining the Middleground: A Linux-based Open Souce Middleware Initiative,” Atlanta Linux Symposium; Oct. 2000, available at http://www.usenix.org/publications/library/proceedings/als2000/wettstein.html (13 pages).
R. Rivest, “the MD5 Message-Digest Algorithm,” RFC1321, MIT Laboratory for Computer Science, Apr. 1992 (21 pages).
“Secure Hash Standard,” FIPS PUB 180-1, May 11, 1993, (13 pages) available at http://www.itl.nist.gov/fipspubs/fip180-1.htm (13 pages).
H. Krawcyk, M. Bellare, R. Canetti, “HMAC: Keyed-Hashing for Message Authentication,” RFC2104, Feb. 1997 (11 pages).
Linux Foundation
Moise Emmanuel L.
Pyzocha Michael
LandOfFree
Digital identity creation and coalescence for service... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Digital identity creation and coalescence for service..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Digital identity creation and coalescence for service... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3913602