Cryptography – Particular algorithmic function encoding – Nbs/des algorithm
Patent
1997-03-13
1998-05-26
Cain, David C.
Cryptography
Particular algorithmic function encoding
Nbs/des algorithm
380 21, H04K 100
Patent
active
057579202
ABSTRACT:
Logon certificates are provided to support disconnected operation within the distributed system. Each logon certificate is a secure package holding credentials information sufficient to establish the identity and rights and privileges for a user/machine in a domain that is not their home domain. When a user/machine attempts to connect to the system at a domain other than the home domain of the user/machine, the user/machine presents a logon certificate that evidences his credentials. The domain where the user/machine attempts to connect to the system, decrypts and unseals the secure package as required to obtain the credentials information contained therein. If the user/machine has sufficient credentials, the user/machine is permitted to connect to the system. If the user/machine lacks sufficient credentials, the user/machine is not permitted to connect to the system.
REFERENCES:
patent: 4896319 (1990-01-01), Lidinsky et al.
patent: 4993068 (1991-02-01), Piosenka et al.
patent: 5224163 (1993-06-01), Gasser et al.
patent: 5235642 (1993-08-01), Wobber et al.
patent: 5335346 (1994-08-01), Fabbio
patent: 5534855 (1996-07-01), Shockley et al.
patent: 5557678 (1996-09-01), Ganesan
patent: 5560008 (1996-09-01), Johnson et al.
patent: 5588061 (1996-12-01), Ganesan et al.
Steiner, Jennifer G. et al., "Kerberos: An Authentication Service for Open Network Systems," in USENIX Winter Conference Proceedings, Feb. 9-12, 1988, Dallas, Texas, pp. 191-202.
Neuman, Clifford B., "Proxy-Based Authorization and Accounting for Distributed Systems," Department of Computer Science and Engineering, University of Washington, Technical Report 91-02-01, Mar., 1991, pp. 1-14.
Karger, Paul A., and Andrew J. Herbert, "An Augmented Capability Architecture to Support Lattice Security and Traceability of Access," in Proceedings of the 1984 Symposium on Security and Privacy, Apr. 29-May 2, 1984, Sponsored by the Technical Committee on Security and Privacy IEEE Computer Society, pp. 2-12.
Saltzer, Jerome H., and Michael D. Schroeder, "The Protection of Information in Computer Systems," in Proceedings of the IEEE 63(9), Sep.,1975, pp. 1278-1308.
Israel, Jay E., and Theodore A. Linden, "Authentication in Office System Internetworks," ACM Transactions on Office Information Systems 1(3), Jul., 1983, pp. 193-210.
Ciminiera, L., and A. Valenzano, "Efficient Authentication Mechanisms Using the iAPX-432," Interfaces in Computer 3, 1985, pp. 111-124.
Pinkas, Denis, "An Access Control Model for Distributed Systems Based on the Use of Trusted Authorities," in SECURICOM. 7th Worldwide Congress on Computer and Communications Security and Protection, 1989, pp. 257-270.
Kohl, John, and Clifford Neuman, Kerberos Version 5 RFC, Revision #5, Memorandum of Apr. 9, 1992, pp. 1-68.
Muftic, Sead, and Morris Sloman, "Security architecture for distributed systems," Computer Communications, 17(7); 492-500; Jul., 1994.
Bacon et al., "Extensible Access Control for a Hierarchy of Servers," Operating Systems Review 28(3); 4-15; 1994.
Miller Arnold S.
Misra Pradyumna K.
Ward Richard B.
Cain David C.
Microsoft Corporation
LandOfFree
Logon certification does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Logon certification, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Logon certification will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-1973288