Interoperable credential gathering and access modularity

Data processing: database and file management or data structures – Database design – Data structure types

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C707S793000, C713S185000, C713S183000, C713S155000, C713S167000

Reexamination Certificate

active

07577659

ABSTRACT:
A credential is translated with one of different credential provider modules each translating a corresponding different type of credential into a common protocol. The translated credential is communicated through an API to a logon UI module to an operating system (OS) of a local machine. An OS logon module is called by the logon UI module to authenticate the translated credential against a credential database. A user identified by the translated credential is logged on to access the local machine when the authentication is successful. The credential can also be used with a selection received from the logon UI module via a corresponding one of different pre-log access provider (PLAP) modules that each communicate with the API. The API establishes a network session with an access service specified by the selected PLAP module when the credential is authenticated with the credential database.

REFERENCES:
patent: 5655077 (1997-08-01), Jones et al.
patent: 5774551 (1998-06-01), Wu et al.
patent: 5864665 (1999-01-01), Tran
patent: 6609198 (2003-08-01), Wood et al.
patent: 6651168 (2003-11-01), Kao et al.
patent: 6799178 (2004-09-01), Iwase et al.
patent: 6807636 (2004-10-01), Hartman et al.
patent: 6982962 (2006-01-01), Lunsford et al.
patent: 7065360 (2006-06-01), Yahagi
patent: 7178025 (2007-02-01), Scheidt et al.
patent: 2002/0031230 (2002-03-01), Sweet et al.
patent: 2002/0038333 (2002-03-01), Evans et al.
patent: 2002/0112155 (2002-08-01), Martherus et al.
patent: 2003/0046392 (2003-03-01), Wen et al.
patent: 2003/0065626 (2003-04-01), Allen
patent: 2003/0097574 (2003-05-01), Upton
patent: 2003/0177388 (2003-09-01), Botz et al.
patent: 2003/0212904 (2003-11-01), Randle et al.
patent: 2004/0039909 (2004-02-01), Cheng
patent: 2004/0139355 (2004-07-01), Axel et al.
patent: 2004/0243824 (2004-12-01), Jones
patent: 2005/0091213 (2005-04-01), Schutz et al.
patent: 2005/0188313 (2005-08-01), Matthews et al.
patent: 2005/0188314 (2005-08-01), Matthews et al.
patent: 2005/0188317 (2005-08-01), Matthews et al.
patent: 2005/0235148 (2005-10-01), Scheidt et al.
patent: 2005/0268107 (2005-12-01), Harris et al.
patent: 2006/0075475 (2006-04-01), Boulos et al.
patent: 2006/0085752 (2006-04-01), Beadle et al.
patent: 2006/0174308 (2006-08-01), Fuller et al.
patent: 2006/0174323 (2006-08-01), Brown et al.
patent: 2006/0242427 (2006-10-01), Ruzyski et al.
patent: 2007/0106892 (2007-05-01), Engberg
patent: 2007/0186106 (2007-08-01), Ting et al.
patent: 2158444 (2000-10-01), None
Rathbone, “Windows XP for Dummies”, Wiley Publishing Inc, 2001, pp. 62-64, 66, 106-107, 128 and 314.
Debian Admin, “Enable and Disable Ubuntu Root Password”, Sep. 28, 2006, <<http://www.debianadmin.com/enable-and-disable-ubuntu-root-password.html>>.
Debian Administration, “Giving ordinary user root privileges, selectively.”, Oct. 16, 2004, retrived at <<http://www.debian-administration.org/articles/33/print>>.
Direct User Switching Task for Windows XP, Aug. 24, 2003, retrived at <<http://web.archive.org/web/20030824072430/www.waybeyonduk.com/DUST/>>.
“GKSU: A gtk+ su front end Linux Man Page” retrived at <<http://www.penguin-soft.com/peguin/man/1/gksu.html>>.
Ha, “Red Hat Linux Getting Started Guide”, Apr. 8, 2003, Red Hat, Incorporated, retrived at <<http://web.archive.org/web/20030418075045/http://www.redhat.com/docs/manuals/linux/RHL-p-Manual/getting-started-guide/.>> pp. 35, pp. 74-75, pp. 105, pp. 146.
Ha, “Red Hat Linux Security Guide”, Red Hat Docs, Apr. 8, 2003, retrived at <<http://web.archive.org/web/20030418075045/http://www.redhat.com/docs/manuals/linux/RHL-9-Manual/getting-started-guide/.>> pp. 26-pp. 28.
Lawrence, “Using Sudo”, Linus Tutorials, May 12, 2005, retrieved at <<http://web.archive.org/web/20050530041932/www.developertutorials.com/tutorials/linux/using-sudo-050511/page1.html>>.
Learning the shell, “Permissions”, retrived at <<http://www.linuxcommand.org/Its0070.php>>.
Linuxtopia, “Ubuntu FAQ Guide: Chapter 6- Users Administration”, May 31, 2005, retrieved on <<http://web.archive.org/web/20060523005037/http://linuxtopia.org?online—books/system—administration—books/ubuntu—starter—guide/index.html>>.
Man Pages, “Ls.”, retrived at <<http://www.linuxcommand.org/man—pages/ls1.html>> on Apr. 9, 2009.
Microsoft help and Support, “How to make files and folders private in Windows XP so that only you have access to them”, retrived at <<http://support.microsoft.com/kb/930987/en-us>>.
Miller, “Sudo Manual”, Jul. 11, 2004 retrived at <<http://web.archive.org/web/20040711020526/http://www.gratisoft.us/sudo/man/sudo.html>>.
Miller, “Sudoers Manual”, Jul. 11, 2004, retrived at <<http://web.archive.org/web/20040711020555/www.gratisoft.us/sudo/man/sudoers.html>>.
Quick HOWTO: Ch09 : Linxus Users and Sudo, Dec. 23, 2005, retrived at <<http:web.archive.org/web/20060203023004/http://www.linuxhomenetworking.com/wiki/index.php/Quick—HOWTO—:—Ch09—:—Linux—Users—and Sudo>>.
Sweet et al., “KDE 2.0 Development: 5.3. STandard Dialog Boxes”, 2000, retrived at <<http://developer.kde.org/documentation/books/kde-2.0-development/index.html>>.
The Elder Geek on Windows XP, “Switch User in Windows XP”, retrived at <<http://web.archive.org/web/20041215071735/theeldergeek.com?HT0—005.htm>>.
“The KDE su Command”, Nov. 20, 2004, retrived on <<http://www.lino.org/kdesu.html>>.
“The Ubuntu Quick Guide. Chapter 3. Applications Menu: System Tools.”, retrieved on <<http://people.ubuntu.com/˜mako/docteam/quickguide/ch03s07.html>>.
Ubuntu Documentation RootSudo, Dec. 31, 2005, retrived at <<https://help.ubuntu.com/community/RootSudo>>.
Using Windows XP, Computer Setup and Maintenance, “How to switch between users” Sep. 7, 2006, retrived at <<http://www.microsoft.com/windowsxp/using/setup/winxp/switchusers.mspx>>.
Gamma, et al., “Design Patterns”, 1995, Addison-Wesley, Reading, MA, USA, pp. 139-143, 148-150.
Pittaway, “Distributed security services in Microsoft Windows NT 5.0—Kerberos and the active directory”, Information Security Technical Report, Elsevier Advanced Technology, vol. 4, 1999, pp. 20-21.
Wiseman, “Adding Security Labelling to Windows NT”, Information Security Technical Report, Elsevier Advanced Technology, vol. 4, 1999, p. 20-21.
Lai, et al., “User Authentication and Authorization in the Java Platform”, INSPEC, 1999, pp. 285-290.
Andress et al., “Test Center-New Products Test In Real-World Enviroments”, Trinity 3.3, Information Security Magazine, Jan. 2002. Retrieved from the Internet.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Interoperable credential gathering and access modularity does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Interoperable credential gathering and access modularity, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Interoperable credential gathering and access modularity will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4065657

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.