Method and system for synchronizing identity information

Data processing: database and file management or data structures – Database design – Data structure types

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C707S793000, C707S793000, C709S231000

Reexamination Certificate

active

10693175

ABSTRACT:
An identity system and method that stores identity information related to different principals and stores the identities on different or disparate systems such that the different systems can use the identities. A synchronization process synchronizes identity information and rules based on identity information between a primary computer system and a disparate secondary computer system. Accordingly, the secondary computer system has a representative database of identity information following receipt of the converted information, wherein the representative database is representative of a primary database of identity information stored on the primary computer system. In order to synchronize a conversion may take place. The conversion process may be performed by a dedicated process designed for the secondary system. Alternatively, the conversion is performed by a generalized process using mapping tables designed to convert identity information into multiple different formats.

REFERENCES:
patent: 5640566 (1997-06-01), Victor et al.
patent: 5884328 (1999-03-01), Mosher, Jr.
patent: 6212529 (2001-04-01), Boothby et al.
patent: 6269369 (2001-07-01), Robertson
patent: 6269405 (2001-07-01), Dutcher et al.
patent: 6317797 (2001-11-01), Clark et al.
patent: 6463149 (2002-10-01), Jolissaint et al.
patent: 6530081 (2003-03-01), Hayes, Jr.
patent: 6539381 (2003-03-01), Prasad et al.
patent: 6748402 (2004-06-01), Reeves et al.
patent: 6799190 (2004-09-01), Boothby
patent: 6925595 (2005-08-01), Whitledge et al.
“Optimal replication algorithms for hierarchical mobility management in PCS networks” by Qing Tian; Cox, D.C.; Computer Networks, vol. 38, No. 4, p. 447-59; Mar. 15, 2002.
“Mobile devices and mobile data-issued of identity and reference” by Lucas, P.; Human-Computer Interaction, vol. 16, No. 2-4, p. 323-36; 2001.
“Disconnected operations′ synchronization facility extension for mobile terminal's messaging system” by Saito, M.; Yoshida, R.; Transactions of the Information Processing Society of Japan, vol. 42, No. 11, p. 2780-8; Nov. 2001.
“On-line profile replication for hierarchical mobility management in PCS networks” by Tian, Qing; Cox, Donald C.; IEEE Infocom 2002, Proceedings—IEEE INFOCOM v 3 2002, p. 1288-1297.
“A global authentication service without global trust” by Birrell, A.D.; Lampson, B.W.; Needham, R.M.; Schroeder, M.D.; Proceedings of the 1986 IEEE Symposium on Security and Privacy (Cat. No. 86CH2292-1), p. 223-30.
“Wireless distributed data acquisition system” by Priddy, B.; Jovanov, E.; Proceedings of the Thirty-Fourth Southeastern Symposium on System Theory (Cat. No. 02EX540), p. 463-6; 2002.
“Personal communications networking architecture and functionality evolution” by Verma, M.K.; TENCON '92, ‘Technology Enabling Tomorrow’ 19912 IEEE Region 10 International Conference. Computers, Communications and Automation towards the 21stCentury (Cat. No. 92CH3223-5), p. 2127-21, vol. 1.
“Naming and addressing of objects without unique identifiers” by Fujinami, N.; Yokote, Y.; Proceedings of the 12thInternational Conference on Distributed Computing Systems (Cat. No. 92CH2175-7), p. 581-8; 1992.
Tian, Q. et al.,Optimal replication algorithms for hierarchical mobility management in PCS networks, Computer Networks 38, pp. 447-459 (2002).
Birrell, A., et al.,A Global Authentication Service without Global Trust, Proceedings of the 1986 IEEE Symposium on Security and Privacy, pp. 223-230 (1986).
Lucas, P.,Mobile Devices and Mobile Data—Issues of Identity and Reference, Human-Computer Interaction, vol. 16, pp. 323-336 (2001).
Fernique, P., et al.,CDS GLU, A Tool for Managing Heterogeneous Distributed Web Services, Astronomical Society of the Pacific Conference Series, vol. 145, pp. 466-469 (1998).
Tian, Qing, et al.,Location Management in a Heterogeneous Network Environment, IEEE Wireless Communications and Networking. vol. 2, pp. 753-758 (2000).
Paskin, N.,Toward Unique Identifiers, Proceedings of the IEEE, vol. 87, No. 7, pp. 1208-1227 (1999).
Neame, R.,Communications and HER: Authenticating Who's Who is Vital, International Journal of Medical Informatiics. vol. 60, No. 2, pp. 185-190 (2000).
Cingil, I.,Supporting Global User Profiles Through Trusted Authorities, SIGMOD Record. vol. 31, No. 1, 1. 11-17 (2002).
Adya, A., et al.,Analyzing the Browse Patterns of Mobile Clients, Proceedings of the First ACM SIGCOMM Internet Measurement Workshop, pp. 189-194 (2001).
Kondo, T., et al.,A Resource Reverence Technique Independent from Scheme and Location, Proceedings of the IASTED International Conference on Internet and Multimedia Systems and Applications. pp. 377-382 (2001).
Hung, Chi Chi, et al.,Adaptive Proxy-based Content Transformation Framework for the World-Wide Web, Proceedings on the Fourth International Conference/Exhibition on High Performance Computing in the Asia-Pacific Region. vol. 2, p. 747-50. (2000).
Carlier, D., et al.,Task Delegation Model Assigned to Mobile Computing, Proceedings of ICICS. vol. 1, p. 220-4. (1997).
Principles of Access Control, Modern Office Technology. vol. 34, No. 11, p. 44-5, 48. (Nov. 1989).
Samaras, G., et al.,Managing Transaction Identifiers in the Peer-to-Peer Distributed Transactional Environment, IBM Corporation. p. 796-803.
Booth, L.,Implementing Distributed Applications Using Object Technology, Object EXPO Europe Conference Proceedings. p. 141-4. (1993).
Pasaya, B., et al.,A Temporal Object Oriented Conceptual Schema Model, IEEE Pacific RIM Conference on Communications, Computers and Signal Processing. vol. II, p. 724-727. (2001).
Sollins and Masinter,Functional Requirements for Uniform Resource Names, Network Working Group, Request for Comments: 1737, Dec. 1994.
Dafni, G.J.,Generating Unique Identifiers In A Distributed System, University of Texas at Austin, 14 pp., (1985).
Cooley, R., et al., Dept. of Comput. Sci. & Eng., Minnesota Univ.,Data Preparation for Mining World Wide Web Browsing Patterns, Knowledge and Information Systems, vol. 1, No. 1, pp. 5-32.
Hollosi, A. et al., Advanced Communications and Multimedia Security—Automatic Authentication Based on the Austrian Citizen Card,A Reference Implementation, pp. 241-253.
Butler, R., et al.,Computer—A National-Scale Authentication Infrastructure, pp. 60-66 (2000).
Plaice, J., et al., DCW 2002 (2002:Sydney, N.S.W.): Distributed communities on the Web: 4th International Workshop—PIÑAS: Supporting a Community of Co-authors on the Web, pp. 113-124 (2002).
Kent, Stephen,Evaluating Certification Authority Security, 1998 IEEE Aerospace Conference Proceedings, vol. 4, pp. 319-327.
Lee et al.,Concatenated Wireless Roaming Security Association and Authentication Protocol using ID-Based Cryptography, Conference Proceedings of the IEEE Vehicular Technology Conference, vol. 2, New York, NY, pp. 1507-1511 (c.1978-1979).
Xuhua Ding and Gene Tsudik,Simple Identity-Based Cryptography with Mediated RSA, The Cryptographers′ Track at the RSA Conference 2003, San Francisco, CA, pp. 193-210 (Apr. 13-17, 2003).
Mevel and Simon,Distributed Communication Services in the Masix System, Conference Proceedings of the 1996 IEEE Fifteenth Annual International Phoenix Conference on Computers and Communications, pp. 172-178 (Mar. 1996).
Ninghui Li,Local Names In SPKI/SDSI, Proceedings of the 13th IEEE Computer Security Foundations Workshop, pp. 2-15 (2000).

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and system for synchronizing identity information does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and system for synchronizing identity information, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and system for synchronizing identity information will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3884813

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.