Information security – Access control or authentication
Reexamination Certificate
2008-01-09
2011-10-18
Parthasarathy, Pramila (Department: 2493)
Information security
Access control or authentication
C726S001000, C726S005000
Reexamination Certificate
active
08042153
ABSTRACT:
A computer implemented method, data processing system, and computer program product for reducing the overhead associated with distributed password policy enforcement operations using a proxy server. When a proxy server provides a request from a client to a backend directory server, the proxy server determines whether a password policy check is required to be performed at the backend directory server. If a password policy check is not required to be performed at the backend directory server, the proxy server sends the client request together with a skip password policy control to the backend directory server. This skip password policy control informs the backend directory server to skip the password policy check on the client request.
REFERENCES:
patent: 6202157 (2001-03-01), Brownlie et al.
patent: 6665674 (2003-12-01), Buchanan et al.
patent: 6941465 (2005-09-01), Palekar et al.
patent: 7165182 (2007-01-01), Excoffier et al.
patent: 7174563 (2007-02-01), Brownlie et al.
patent: 2002/0078386 (2002-06-01), Bones et al.
patent: 2004/0093519 (2004-05-01), Grobman
patent: 2005/0071421 (2005-03-01), Calo et al.
patent: 2005/0114673 (2005-05-01), Raikar et al.
patent: 2006/0235850 (2006-10-01), Hazelwood et al.
patent: 2007/0025302 (2007-02-01), Zhang et al.
patent: 2006318304 (2006-11-01), None
Tivoli Directory Server Documentation for Version 6.1; Published 2007; 54 pages; Retrieved from http://publib.boulder.ibm.com/infocenter/tivihelp/v2r1/index.jsp; section Securing Directory Access and Distributed Directories.
Tsai et al., “Simulation Verification and Validation by Dynamic Policy Enforcement”, Proceedings of the 38thAnnual Simulation Symposium, IEEE 2005, pp. 1-8.
Bhargavan et al., “Secure Sessions for Web Services”, ACM Transactions on Information and System Security, vol. 10, No. 2, Article 8, May 2007, pp. 1-46.
Bernaschi et al., “REMUS: A Security-Enhanced Operating System”, ACM Transactions on Information and System Security, vol. 5, No. 1, Feb. 2002, pp. 36-61.
Chong et al., “Security Policies for Downgrading”, CCS'04, Oct. 2004, Washington DC, ACM publication, pp. 198-209.
Hicks et al., “Trusted Declassification—High-level policy for a security-typed language”, PLAS'06, Jun. 2006, Ottawa Canada, ACM publication, pp. 65-74.
Feng Daw
Hazlewood Kristin Marie
Williams Gary Dale
International Business Machines - Corporation
LaBaw Jeffrey S.
Le Chau
Parthasarathy Pramila
Yee & Associates P.C.
LandOfFree
Reducing overhead associated with distributed password... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Reducing overhead associated with distributed password..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Reducing overhead associated with distributed password... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4267504