Information security – Access control or authentication – Network
Reexamination Certificate
2005-12-06
2005-12-06
Barron, Jr., Gilberto (Department: 2132)
Information security
Access control or authentication
Network
C713S152000, C707S793000, C707S793000
Reexamination Certificate
active
06973671
ABSTRACT:
A secure access system provides security for a computer connected to a data store. Initially, an authentication key, a user name, and a computer identifier are received. The authentication key is parsed to obtain a parsed user name and computer identifier. The parsed user name and computer identifier are validated using the received user name and computer identifier. Additionally, if the received user name and computer identifier are validated, the authentication key is parsed to obtain a server user identifier and a server password. Then, the parsed server user identifier and server password are used to connect to a database server computer.
REFERENCES:
patent: 5241594 (1993-08-01), Kung
patent: 5604490 (1997-02-01), Blakley et al.
patent: 5689638 (1997-11-01), Sadovsky
patent: 5774551 (1998-06-01), Wu et al.
patent: 5815574 (1998-09-01), Fortinsky
patent: 5881234 (1999-03-01), Schwob
patent: 5953504 (1999-09-01), Sokal et al.
patent: 6178511 (2001-01-01), Cohen et al.
patent: 6233618 (2001-05-01), Shannon
patent: 6243816 (2001-06-01), Fang et al.
patent: 6311275 (2001-10-01), Jin et al.
patent: 6359711 (2002-03-01), Cole et al.
patent: 6463474 (2002-10-01), Fuh et al.
patent: 6615264 (2003-09-01), Stoltz et al.
patent: 2 343 531 (2000-05-01), None
patent: 2 354 617 (2001-03-01), None
Stallings, William; Cryptography and Network Security; Jun. 4, 1998; Prentice-Hall, Inc., 2ndEdition; pp. 323-353.
Lai et al.; “User Authentication and Authorization in the JAVA™ Platform”; Proceedings of the 15th Annual Computer Security Applications Conference, Dec. 1999, pp. 1-10.
Bryant, Bill; “Designing an Authentication System: a Dialogue in Four Scenes”; MIT; 1998; pp. 1-16.
Steiner et al.; “Kerberos: An Authentication Service for Open Network Systems”; MIT; Mar. 30, 1988; pp. 1-29.
Kohl et al.; “The Evolution of the Kerberos Authentication Service”; MIT; Jun. 17, 1992; pp. 1-27.
Samar et al.; “Making Login Services Independent of Authentication Technologies”; Sun Microsystems, Inc.; pp. 1-18.
Schneier, Bruce; Applied Cryptography; 1996; John Wiley & Sons, Inc.; Chapter 3 and 12.
VeriSign; “Certification Practice Statement”; May 30, 1997; VeriSign, Inc.
Lisa Wirthman “Unifying Heterogeneous Computing Environments,” PC Week, vol. 14, No. 31, Jul. 21, 1997, pp. 1-4.
V. Samar, “Unified Login With Pluggable Authentication Modules (PAM), ” 3rd ACM Conference on Computer and Communications Security, New Delhi, India, Mar. 14-16, Sponsored by: ACM.
Hsing Chi-Pei Michael
Yaung Alan Tsu-I
LandOfFree
Secure access to a unified logon-enabled data store does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Secure access to a unified logon-enabled data store, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Secure access to a unified logon-enabled data store will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3475850