Data processing: database and file management or data structures – Database design – Data structure types
Patent
1996-11-14
1999-06-15
Palys, Joseph E.
Data processing: database and file management or data structures
Database design
Data structure types
707 9, G06F 1100
Patent
active
059130253
ABSTRACT:
A method for a source to obtain the rights of a target object is disclosed. The source first obtains the rights of a source object, which rights include authorization to access a target object and to modify authentication data of the target object. Next, the source object generates new authentication data. After accessing the target object using the rights of the source object, the source modifies the authentication data of the target object to include the new authentication data. Using the new authentication data, the source obtains the rights of the target object, whereby the source becomes a proxy for the target object. As a proxy, the source uses the rights of the target object. Alternative processes for proxy authentication, as well as apparatus for proxy authentication, are also disclosed.
REFERENCES:
patent: 5032979 (1991-07-01), Hecht et al.
patent: 5276901 (1994-01-01), Howell et al.
patent: 5321841 (1994-06-01), East et al.
patent: 5481721 (1996-01-01), Serlet et al.
patent: 5511197 (1996-04-01), Hill et al.
patent: 5586260 (1996-12-01), Hu
patent: 5594921 (1997-01-01), Pettus
patent: 5608903 (1997-03-01), Prasad et al.
patent: 5613148 (1997-03-01), Bezviner et la.
patent: 5623601 (1997-04-01), Vu
patent: 5642511 (1997-06-01), Chow et al.
patent: 5677851 (1997-10-01), Kingdon et al.
Neumann et al., "Proxy Based Authorization and Accounting for Distributed Systems", IEEE, pp. 283-291, 1993.
Shapiro, "A Binding Protocol for Distributed Shared Objects", Distributed Computig Systems, Int'l Conf., IEEE, pp. 134-141, 1994.
Dave et al., "Proxies, Application Interfaces, and Distributed Systems", Object Orientation in Oerating Systems, Int'l Workshop, IEEE, pp. 212-220, 1992.
Russo et al., "Distributed Objhect Interoperability Via a Nteowrk Type System", Object Orientation in Operating Systems, Int'l Workshop, IEEE, pp. 319-327, 1992.
Trostle et al., "A Flexible Distributed Authroization Protocol", Network and Distributed System Security Symposium, IEEE, pp. 43-52, 1996.
Schmidt et al., "Using Shared Memory for Read Mostly RPC Services", System Sciences, Annual Int'l Conf., IEEE, pp. 141-149, 1996.
Novell's Guide to NetWare 4.1 Networks, table of contents and Chapters 12 and 13, Hughes and Thomas,ISBN: 1-56884-736-X, 1996.
Higley DeeAnne Barker
Jarvis Brian Lee
Thorne Bruce Warner
Novell Inc.
Palys Joseph E.
LandOfFree
Method and apparatus for proxy authentication does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and apparatus for proxy authentication, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for proxy authentication will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-408279