Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer
Reexamination Certificate
2006-01-03
2006-01-03
Sheikh, Ayaz (Department: 2131)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Protection at a particular protocol layer
C713S155000, C713S159000, C713S162000, C713S164000, C713S187000, C709S229000
Reexamination Certificate
active
06983377
ABSTRACT:
A trusted agent for enabling the check of the access of a user operating a first computer system controlled by a first security system to software and/or data on a second computer system controlled by a second security system. The trusted agent includes several functions, including: (a) reception of a user-id for the second computer system and transmission of the user-id to the second security system; (b) retrieval of a shared secret, which is registered in the fist security system and in the second security system, from the second security system; and (3) transmission of the shared secret from the trusted agent to the second computer system.
REFERENCES:
patent: 5349643 (1994-09-01), Cox et al.
patent: 5586260 (1996-12-01), Hu
patent: 5590199 (1996-12-01), Krajewski, Jr. et al.
patent: 5684950 (1997-11-01), Dare et al.
patent: 5872917 (1999-02-01), Hellmann
patent: 5903732 (1999-05-01), Reed et al.
Beesley Neil
Gaertner Dietmar
Holme James
Kennedy Terence
Kessler Dieter
Arani Taghi T.
Davidson Davidson & Kappel LLC
Sheikh Ayaz
Software AG
LandOfFree
Method for checking user access does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method for checking user access, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for checking user access will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3577258