Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique
Reexamination Certificate
2011-08-09
2011-08-09
Orgad, Edan (Department: 2439)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Particular communication authentication technique
Reexamination Certificate
active
07996674
ABSTRACT:
A computer implemented method and data processing system for authenticating a user. A control module receives a user authentication request. The control module retrieves a server's parameters, and uses the server's parameters to form a customized user authentication request. The control module sends the customized user authentication request to the server, and receives an authentication response from the server.
REFERENCES:
patent: 2002/0087718 (2002-07-01), Hill et al.
patent: 2004/0019680 (2004-01-01), Chao et al.
patent: 2005/0283615 (2005-12-01), Chakravarthi et al.
patent: 2006/0092948 (2006-05-01), Katz et al.
StoneLion, “Linux LDAP authentication”, Linux.com, The Enterprise Linux resource,pp. 1-5 retrieved Sep. 20, 2006. http://enterprise.linux.com/print.pl?sid=05/09/15/1930256.
Harbaugh, “Radiant Logic, MaXware give directories a virtual twist—RadiantOne, MaXware Virtual Directory present a variety of data sources as one directory”, Sep. 3, 2004, pp. 1-3. http://www.infoworld.com/article/04/09/03/36TCvirtual—1.html.
Gnirss et al., “Advanced LDAP User Authenticaiton: Limiting Access to Linux Systems Using the Host Attribute”, Redbooks Paper, IBM Corp 2004, pp. 1-10.
Radtke, “System Authentication for AIX and Linux using the IBM Directory Server”, Technique Paper, International Business Machines Corporation 2002, Version 1.0, pp. 1-28.
Gietz, “OpenCA and LDAP Authentication and LDAP based certificate requests”, OpenCA Workshop, TU Munchen, Nov. 18, 2005, DAASI International, pp. 1-24.
“ProFTPD Virtual Users”, pp. 1-3 retrieved Oct. 17, 2006 http://www.castaglia.org/proftpd/doc/contrib/ProFTPD-mini-HOWTO-VirtualUsers.html.
“Security Guide LDAP Authentication Load Module”, pp. 1-16, retrieved Oct. 17, 2006. http://inmetsd01.boulder.ibm.com/pseries/en—US/aixbman/security/ldap—exploitation.htm.
Clark, “Practical LDAP on Linux—A practical guide to integrating LDAP directory services on Linux”, metaparadism, Aug. 23, 2002, pp. 1-28.
Klatsky, “Virtual—ldap difficulty”, Feb. 7, 2002, pp. 1-2, retrieved Oct. 17, 2006. http://www.irbs.net/internet/postfix/0202/0611.html.
Esche et al., “LDAP and Active Directory: Working Together to Manage Identity”, University of Calgary, pp. 1-39.
“Integrating Oracle9iAS with NetPoint SSO, Netpoint Identity-Based Security Solutions”, Chapter 5,Oblix Inc., Sep. 2003, pp. 193-206.
“Introduction to NetPoint”, Oracle COREid Access and Identity, 10g Release 2 (10.1.2), Part No. B19006-01, May 2005, pp. 1-88.
International Business Machines - Corporation
Mims Jr. David A.
Orgad Edan
Wang Harris C
Yee & Associates P.C.
LandOfFree
LDAP user authentication does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with LDAP user authentication, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and LDAP user authentication will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2757877