Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Central trusted authority provides computer authentication
Reexamination Certificate
2006-01-31
2006-01-31
Caldwell, Andrew (Department: 2134)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Central trusted authority provides computer authentication
C713S178000
Reexamination Certificate
active
06993653
ABSTRACT:
An identity vectoring method is accomplished by matching a distinguished name or partial distinguished name from a digital certificate with a distinguished name mapping record. A data field in the distinguished name mapping record includes either a variable name or a user ID. The variable name corresponds to any environmental factor. The next mapping record to be considered, the criteria mapping record, is determined by substituting the environmental factor for the variable name in the data field. A data field in the criteria mapping record includes either a variable name or a user ID. The process completes when a mapping record containing only a user ID is encountered or when no matching criteria mapping records are found.
REFERENCES:
patent: 5491817 (1996-02-01), Gopal et al.
patent: 5678045 (1997-10-01), Bettels
patent: 5745574 (1998-04-01), Muftic
patent: 5761669 (1998-06-01), Montague et al.
patent: 5774552 (1998-06-01), Grimmer
patent: 5896440 (1999-04-01), Reed et al.
patent: 5922074 (1999-07-01), Richard et al.
patent: 6013107 (2000-01-01), Blackshear et al.
patent: 6081814 (2000-06-01), Mangat et al.
patent: 6192362 (2001-02-01), Schneck et al.
patent: 6233577 (2001-05-01), Ramasubramani et al.
patent: 6292838 (2001-09-01), Nelson
patent: 6615347 (2003-09-01), de Silva et al.
patent: 2002/0062438 (2002-05-01), Asay et al.
patent: 0 862 105 (1998-02-01), None
Wahl, RFC 2256, “A Summary of the X.500(96) User Schema for use with LDAPv3”.
IBM Technical Disclosure Bulletin, vol. 31, No. 4, Sep. 1988—Method to Provide User ID/Group ID Translation in the IBM RT/PC Networks, pp. 306-307.
IBM Technical Disclosure Bulletin, vol. 32, No. 9A, Feb. 1990—Sessions-Based Secure Communication For Secure Zeniz, pp. 239-243.
IBM Technical Disclosure Bulletin, vol. 34, No. 10B, Mar. 1992—Mechanism for Supporting Multiple Authentication Servers, pp. 200-201.
IBM Technical Disclosure Bulletin, vol. 18, No. 8, Aug. 1995—Mapping of Distributed Computing Environment Identities to MVS Userids, pp. 213-214.
IBM Technical Disclosure Bulletin, vol. 38, No. 09, Sep. 1995—Partial Containment Structure for Integration of Distributed Computing Environment and Local Registries, pp. 535-538.
U.S. Appl. No. 09/332,704, filed Jun. 14, 1999, Frey et al., Abandoned Sep. 12, 2002—Mapping of Name Space Object Identitiesto Distinguished Names.
Farrell Walter B.
Guski Richard H.
Sweeny James W.
Szczygielski Thomas J.
Thompson John M.
Caldwell Andrew
Cantor & Colburn LLP
Heneghan Matthew
Kinnaman, Jr. William A.
LandOfFree
Identity vectoring via chained mapping records does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Identity vectoring via chained mapping records, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Identity vectoring via chained mapping records will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3540127