Network security system

Information security – Prevention of unauthorized use of data including prevention... – Access control

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S004000, C726S010000, C713S171000, C713S182000, C380S047000, C380S286000

Reexamination Certificate

active

07418736

ABSTRACT:
Security is provided in a network system. A message is received from a user, which message requires authentication of the user. An authentication message is sent indicating the identity of the user to an initial software security agent. The software security agent, on receipt of the authentication message, determines whether information relating to the user is stored on a security database associated with the software security agent, and, if so, the software security agent adds an authentication key to the authentication message. The authentication message is sent on to one or more further software security agents. The prior noted steps are repeated with the further software security agent(s) and, if user-related stored security information is found, adding an authentication key to the authentication message and sending the authentication message on to one or more further software security agents until the number of keys associated with the authentication message equals a predetermined number N. When the number of associated keys equals N, the authentication message is sent to the initial software security agent which then grants the required permission to the user.

REFERENCES:
patent: 0580350 (1994-01-01), None
R. Filman et al., Communicating Security Agents, Proceedings of WET ICE '96, IEEE 1996, pp. 86-91.
L. Kagal et al., A Framework for Distributed Trust Management, Proceedings of the IJACI-01 Workshop on Autonomy, Delegation and Control. 2001.
Kong et al., “Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks”, 2001, IEEE, pp. 251-260, XP002211338.
Gong, Increasing Availability and Security of an Authentication Service, IEEE Journal on Selected Areas in Communications, vol. 11, pp. 657662, 1993, No. 5.
Korba, “Security System for Wireless Local Area Networks”, 1998 IEEE, pp. 1550-1554.
Deswarte et al., “Intrusion Tolerance in Distributed Computing Systems”, 1991 IEEE, pp. 110-121.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Network security system does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Network security system, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Network security system will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4018445

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.