LDAP user authentication

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

Reexamination Certificate

active

07996674

ABSTRACT:
A computer implemented method and data processing system for authenticating a user. A control module receives a user authentication request. The control module retrieves a server's parameters, and uses the server's parameters to form a customized user authentication request. The control module sends the customized user authentication request to the server, and receives an authentication response from the server.

REFERENCES:
patent: 2002/0087718 (2002-07-01), Hill et al.
patent: 2004/0019680 (2004-01-01), Chao et al.
patent: 2005/0283615 (2005-12-01), Chakravarthi et al.
patent: 2006/0092948 (2006-05-01), Katz et al.
StoneLion, “Linux LDAP authentication”, Linux.com, The Enterprise Linux resource,pp. 1-5 retrieved Sep. 20, 2006. http://enterprise.linux.com/print.pl?sid=05/09/15/1930256.
Harbaugh, “Radiant Logic, MaXware give directories a virtual twist—RadiantOne, MaXware Virtual Directory present a variety of data sources as one directory”, Sep. 3, 2004, pp. 1-3. http://www.infoworld.com/article/04/09/03/36TCvirtual—1.html.
Gnirss et al., “Advanced LDAP User Authenticaiton: Limiting Access to Linux Systems Using the Host Attribute”, Redbooks Paper, IBM Corp 2004, pp. 1-10.
Radtke, “System Authentication for AIX and Linux using the IBM Directory Server”, Technique Paper, International Business Machines Corporation 2002, Version 1.0, pp. 1-28.
Gietz, “OpenCA and LDAP Authentication and LDAP based certificate requests”, OpenCA Workshop, TU Munchen, Nov. 18, 2005, DAASI International, pp. 1-24.
“ProFTPD Virtual Users”, pp. 1-3 retrieved Oct. 17, 2006 http://www.castaglia.org/proftpd/doc/contrib/ProFTPD-mini-HOWTO-VirtualUsers.html.
“Security Guide LDAP Authentication Load Module”, pp. 1-16, retrieved Oct. 17, 2006. http://inmetsd01.boulder.ibm.com/pseries/en—US/aixbman/security/ldap—exploitation.htm.
Clark, “Practical LDAP on Linux—A practical guide to integrating LDAP directory services on Linux”, metaparadism, Aug. 23, 2002, pp. 1-28.
Klatsky, “Virtual—ldap difficulty”, Feb. 7, 2002, pp. 1-2, retrieved Oct. 17, 2006. http://www.irbs.net/internet/postfix/0202/0611.html.
Esche et al., “LDAP and Active Directory: Working Together to Manage Identity”, University of Calgary, pp. 1-39.
“Integrating Oracle9iAS with NetPoint SSO, Netpoint Identity-Based Security Solutions”, Chapter 5,Oblix Inc., Sep. 2003, pp. 193-206.
“Introduction to NetPoint”, Oracle COREid Access and Identity, 10g Release 2 (10.1.2), Part No. B19006-01, May 2005, pp. 1-88.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

LDAP user authentication does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with LDAP user authentication, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and LDAP user authentication will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2757877

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.