Secure access to a unified logon-enabled data store

Information security – Access control or authentication – Network

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S152000, C707S793000, C707S793000

Reexamination Certificate

active

06973671

ABSTRACT:
A secure access system provides security for a computer connected to a data store. Initially, an authentication key, a user name, and a computer identifier are received. The authentication key is parsed to obtain a parsed user name and computer identifier. The parsed user name and computer identifier are validated using the received user name and computer identifier. Additionally, if the received user name and computer identifier are validated, the authentication key is parsed to obtain a server user identifier and a server password. Then, the parsed server user identifier and server password are used to connect to a database server computer.

REFERENCES:
patent: 5241594 (1993-08-01), Kung
patent: 5604490 (1997-02-01), Blakley et al.
patent: 5689638 (1997-11-01), Sadovsky
patent: 5774551 (1998-06-01), Wu et al.
patent: 5815574 (1998-09-01), Fortinsky
patent: 5881234 (1999-03-01), Schwob
patent: 5953504 (1999-09-01), Sokal et al.
patent: 6178511 (2001-01-01), Cohen et al.
patent: 6233618 (2001-05-01), Shannon
patent: 6243816 (2001-06-01), Fang et al.
patent: 6311275 (2001-10-01), Jin et al.
patent: 6359711 (2002-03-01), Cole et al.
patent: 6463474 (2002-10-01), Fuh et al.
patent: 6615264 (2003-09-01), Stoltz et al.
patent: 2 343 531 (2000-05-01), None
patent: 2 354 617 (2001-03-01), None
Stallings, William; Cryptography and Network Security; Jun. 4, 1998; Prentice-Hall, Inc., 2ndEdition; pp. 323-353.
Lai et al.; “User Authentication and Authorization in the JAVA™ Platform”; Proceedings of the 15th Annual Computer Security Applications Conference, Dec. 1999, pp. 1-10.
Bryant, Bill; “Designing an Authentication System: a Dialogue in Four Scenes”; MIT; 1998; pp. 1-16.
Steiner et al.; “Kerberos: An Authentication Service for Open Network Systems”; MIT; Mar. 30, 1988; pp. 1-29.
Kohl et al.; “The Evolution of the Kerberos Authentication Service”; MIT; Jun. 17, 1992; pp. 1-27.
Samar et al.; “Making Login Services Independent of Authentication Technologies”; Sun Microsystems, Inc.; pp. 1-18.
Schneier, Bruce; Applied Cryptography; 1996; John Wiley & Sons, Inc.; Chapter 3 and 12.
VeriSign; “Certification Practice Statement”; May 30, 1997; VeriSign, Inc.
Lisa Wirthman “Unifying Heterogeneous Computing Environments,” PC Week, vol. 14, No. 31, Jul. 21, 1997, pp. 1-4.
V. Samar, “Unified Login With Pluggable Authentication Modules (PAM), ” 3rd ACM Conference on Computer and Communications Security, New Delhi, India, Mar. 14-16, Sponsored by: ACM.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Secure access to a unified logon-enabled data store does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Secure access to a unified logon-enabled data store, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Secure access to a unified logon-enabled data store will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3475850

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.