Logon certification

Cryptography – Particular algorithmic function encoding – Nbs/des algorithm

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

380 21, H04K 100

Patent

active

057579202

ABSTRACT:
Logon certificates are provided to support disconnected operation within the distributed system. Each logon certificate is a secure package holding credentials information sufficient to establish the identity and rights and privileges for a user/machine in a domain that is not their home domain. When a user/machine attempts to connect to the system at a domain other than the home domain of the user/machine, the user/machine presents a logon certificate that evidences his credentials. The domain where the user/machine attempts to connect to the system, decrypts and unseals the secure package as required to obtain the credentials information contained therein. If the user/machine has sufficient credentials, the user/machine is permitted to connect to the system. If the user/machine lacks sufficient credentials, the user/machine is not permitted to connect to the system.

REFERENCES:
patent: 4896319 (1990-01-01), Lidinsky et al.
patent: 4993068 (1991-02-01), Piosenka et al.
patent: 5224163 (1993-06-01), Gasser et al.
patent: 5235642 (1993-08-01), Wobber et al.
patent: 5335346 (1994-08-01), Fabbio
patent: 5534855 (1996-07-01), Shockley et al.
patent: 5557678 (1996-09-01), Ganesan
patent: 5560008 (1996-09-01), Johnson et al.
patent: 5588061 (1996-12-01), Ganesan et al.
Steiner, Jennifer G. et al., "Kerberos: An Authentication Service for Open Network Systems," in USENIX Winter Conference Proceedings, Feb. 9-12, 1988, Dallas, Texas, pp. 191-202.
Neuman, Clifford B., "Proxy-Based Authorization and Accounting for Distributed Systems," Department of Computer Science and Engineering, University of Washington, Technical Report 91-02-01, Mar., 1991, pp. 1-14.
Karger, Paul A., and Andrew J. Herbert, "An Augmented Capability Architecture to Support Lattice Security and Traceability of Access," in Proceedings of the 1984 Symposium on Security and Privacy, Apr. 29-May 2, 1984, Sponsored by the Technical Committee on Security and Privacy IEEE Computer Society, pp. 2-12.
Saltzer, Jerome H., and Michael D. Schroeder, "The Protection of Information in Computer Systems," in Proceedings of the IEEE 63(9), Sep.,1975, pp. 1278-1308.
Israel, Jay E., and Theodore A. Linden, "Authentication in Office System Internetworks," ACM Transactions on Office Information Systems 1(3), Jul., 1983, pp. 193-210.
Ciminiera, L., and A. Valenzano, "Efficient Authentication Mechanisms Using the iAPX-432," Interfaces in Computer 3, 1985, pp. 111-124.
Pinkas, Denis, "An Access Control Model for Distributed Systems Based on the Use of Trusted Authorities," in SECURICOM. 7th Worldwide Congress on Computer and Communications Security and Protection, 1989, pp. 257-270.
Kohl, John, and Clifford Neuman, Kerberos Version 5 RFC, Revision #5, Memorandum of Apr. 9, 1992, pp. 1-68.
Muftic, Sead, and Morris Sloman, "Security architecture for distributed systems," Computer Communications, 17(7); 492-500; Jul., 1994.
Bacon et al., "Extensible Access Control for a Hierarchy of Servers," Operating Systems Review 28(3); 4-15; 1994.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Logon certification does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Logon certification, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Logon certification will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-1973288

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.