Information security – Access control or authentication – Network
Reexamination Certificate
2006-06-13
2006-06-13
Revak, Christopher (Department: 2136)
Information security
Access control or authentication
Network
C726S004000, C726S008000, C726S029000, C713S156000, C713S168000, C713S170000, C709S203000, C709S213000, C709S219000, C709S243000, C705S076000, C380S277000
Reexamination Certificate
active
07062781
ABSTRACT:
A system provides secure communication of commands from a client (600) to multiple hosts (1200) via a network server (700). The system receives at least one command from the client (600), initiates one or more remote execution processes (1040) for processing the at least one command, and transmits the at least one command to one or more of the hosts (1200) via the one or more remote execution processes (1040). The system obtains, from the one or more remote execution processes (1040), data associated with the one or more hosts (1200) executing the at least one command, formats the data, and sends the formatted data to the client (600).
REFERENCES:
patent: 4672572 (1987-06-01), Alsberg
patent: 5241594 (1993-08-01), Kung
patent: 5313521 (1994-05-01), Torii et al.
patent: 5349643 (1994-09-01), Cox et al.
patent: 5416842 (1995-05-01), Aziz
patent: 5511122 (1996-04-01), Atkinson
patent: 5590199 (1996-12-01), Krajewski, Jr. et al.
patent: 5604803 (1997-02-01), Aziz
patent: 5764687 (1998-06-01), Easton
patent: 5768504 (1998-06-01), Kells et al.
patent: 5774551 (1998-06-01), Wu et al.
patent: 5815574 (1998-09-01), Fortinsky
patent: 6606708 (2003-08-01), Devine et al.
patent: 6657956 (2003-12-01), Sigaud
Microsoft, “Microsoft Windows NT™ Server Version 4.0, A guide to Reviewing and Evaluating”, Microsoft Corp., Aug. 1996, entire document.
Yin, J., Automating the Remote Execution of Server Administrator CLI Commands, PowerSolutions, May 2002, pp. 50-54, entire article, ftp.jp.dell.com/app/2q02-Yin.pdf.
Lawrence, R., “A survey of Process Migration Mechanisms”, Dept. of CS, Univ. of Manitoba, May 29, 1998, entire article, www.cs.uiowa.edu/˜rlawrenc/research/Papers/proc—mig.pdf.
Freier, Alan O., et al., The SSL Protocol, Version 3.0, Mar. 4, 1996.
Kohl, J. and Neuman, C., TheKerberosNetwork Authentication Service (V5), Sep. 1993.
Schneier, Bruce, Applied Cryptography, 2nd ed. (1996), pp. 566-572.
Steiner, Jennifer G., et al., “Kerberos: An Authentication Service for Open Network Systems,” Mar. 30, 1988.
Kohl, John T., et al., “The Evoluation of theKerberosAuthentication Service,” Spring 1991 EurOpen Conference, Tromso, Norway.
Gradient Technologies, Inc., Web Integration Strategies: Believe It Or Not-Gradient Technologies' WebCrusader, Apr. 1996, pp. 1-12.
Gradient Technologies, Inc., Developing Secure Web-based Java Applications, The Integration of Web Crusader and Net Dynamics, May 1997, pp. 1-16.
Gradient Technologies, Inc., Encryption Security In the Enterprise, Public Key/Secret Key, Jan. 1997, pp. 1-20.
InformationWeek, Spinning A Secure Web, Aug. 12, 1996 (4 pages).
Gradient Technologies, Inc., NetCrusader Product Data Sheet, NetCrusader's Distributed Services Product Line, Mar. 1997 (4 pages).
Gradient Technologies, Inc., NetCrusader Product Family Overview, Mar. 1997 (4 pages).
Gradient Technologies, Inc., NetCrusader Product Data Sheet, NetCrusader Commander, Mar. 1997 (4 pages).
Gradient Technologies, Inc., WebCrusader Product Data Sheet, WebCrusader Product Line, Mar. 1997 (4 pages).
Gradient Technologies, Inc., Web-based Applications Make the Grade at Penn State University, 1996 (2 pages).
MIT, Kerberos V5 Installation Guide (Release beta 7), Sep. 11, 1996.
MIT, Kerberos V5 System Administrator's Guide (Release beta 7), Sep. 10, 1996.
MIT, Kerberos V5 UNIX User's Guide (Release beta 7), Sep. 10, 1996.
MIT, Kerberos V5 Application Programming Library, Sep. 10, 1996.
MIT, Kerberos V5 Data Encryption Standard Library draft, p. 1.
MIT, Kerberos V5 Implementer's Guide, Sep. 10, 1996.
Jaspan, Barry, Kerberos Administration System KADMS API Functional Specifications, Sep. 10, 1996.
Jaspan, Barry, KADMS Library and Server Implementation Design, Sep. 10, 1996.
Kamens, Jonathan I., KADMS Admin API Unit Test Description, Sep. 10, 1996.
Kamens, Jonathan I., Open V*Secure Admin Database API Unit Test Description*, Sep. 10, 1996.
MIT, Kerberos V5 Installation Guide (Release 1.0) Dec. 18, 1996.
MIT, Kerberos V5 System Administrator's Guide (Release 1.0), Nov. 27, 1996.
MIT, Kerberos V5 UNIX User's Guide (Release 1.0), Dec. 18, 1996.
MIT, Upgrading to Kerberos V5 from Kerberos V4 (Release 1.0), Dec. 18, 1996.
Baum Ronald
Revak Christopher
Suchtya, Esq. Leonard C.
Verizon Laboratories Inc.
Wall, Esq. Joel
LandOfFree
Method for providing simultaneous parallel secure command... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method for providing simultaneous parallel secure command..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for providing simultaneous parallel secure command... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3710443