Grid mutual authorization through proxy certificate generation

Electrical computers and digital processing systems: support – System access control based on user identification by... – Using record or token

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S150000, C713S168000, C713S169000, C713S170000, C713S171000, C713S172000, C713S173000, C713S174000, C713S175000, C713S176000, C713S182000, C709S238000, C709S250000

Reexamination Certificate

active

07467303

ABSTRACT:
A method for mutual authorization of a secondary resource in a grid of resource computers is provided. When a primary resource attempts to offload a grid computing job to a secondary resource, the primary resource sends a proxy certificate request to the user machine. Responsive to a proxy certificate request, the user machine performs authorization with the secondary resource. If authorization with the secondary resource is successful, the user machine generates and returns a valid proxy certificate. The primary resource then performs mutual authentication with the secondary resource. If the authorization with the secondary resource fails, the user machine generates and returns an invalid proxy certificate. Mutual authentication between the primary resource and the secondary resource will fail due to the invalid proxy certificate. The primary resource then selects another secondary resource and repeats the process until a resource is found that passes the mutual authorization with the user machine.

REFERENCES:
patent: 4227253 (1980-10-01), Ehrsam et al.
patent: 5564016 (1996-10-01), Korenshtein
patent: 6304967 (2001-10-01), Braddy
patent: 7222187 (2007-05-01), Yeager et al.
patent: 1282289 (2003-02-01), None
Low, M.R. et al., “A Joint Authorization Scheme”, Jan. 1997, ACM SIGOPS Operation Systems Reviews, vol. 31, issue 1, pp. 88-96.
Low et al., “Self Authenticating Proxies”, Computer Journal, Oxford University Press, Surrey, GB, vol. 37, No. 5, Jan. 1994, pp. 422-428.
Gasser et al., “An Architecture for Practical Delegation in a Distributed System”, Proceedings of the Symposium on Research in Security and Privacy, Oakland, May 1990, IEEE Computer Society Press, US, vol. Symp. 11, pp. 20-30.
Ding et al., “A new approach for delegation using hierarchical delegation tokens”, Technical Report TR-95-5-E, Apr. 1995, pp. 1-14.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Grid mutual authorization through proxy certificate generation does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Grid mutual authorization through proxy certificate generation, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Grid mutual authorization through proxy certificate generation will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4052065

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.