Information security – Access control or authentication – Network
Reexamination Certificate
2004-05-20
2011-10-18
Zand, Kambiz (Department: 2434)
Information security
Access control or authentication
Network
C726S002000, C726S006000, C726S008000, C713S185000, C713S186000, C713S164000
Reexamination Certificate
active
08042163
ABSTRACT:
A method for revocable token identifiers may be employed in a shared storage environment. An access server may generate access tokens and include revocable token identifiers previously obtained from storage devices. When clients present access tokens to storage devices during storage requests, storage devices may check the validity of access tokens by verifying that the revocable token identifiers were previously issued to the access server. An access server may request that the storage device revoke revocable token identifiers. Storage devices may deny any future storage requests including revoked token identifiers. Additionally, an access token may include instructions specifying operations for a storage device to perform in conjunction with a storage request. A trusted server may issue grantor tokens granting permissions for access servers to use when issuing access tokens. An access server may then include such a grantor token in access tokens that it generates and issues to clients.
REFERENCES:
patent: 5764890 (1998-06-01), Glasser et al.
patent: 5784463 (1998-07-01), Chen et al.
patent: 6088451 (2000-07-01), He et al.
patent: 6263446 (2001-07-01), Kausik et al.
patent: 6314425 (2001-11-01), Serbinis et al.
patent: 6324537 (2001-11-01), Moran
patent: 6385729 (2002-05-01), DiGiorgio et al.
patent: 6453362 (2002-09-01), Bittinger et al.
patent: 6587867 (2003-07-01), Miller et al.
patent: 6615264 (2003-09-01), Stoltz et al.
patent: 6856800 (2005-02-01), Henry et al.
patent: 7028090 (2006-04-01), McBrearty et al.
patent: 7111324 (2006-09-01), Elteto et al.
patent: 7134138 (2006-11-01), Scherr
patent: 7191344 (2007-03-01), Lin et al.
patent: 7191467 (2007-03-01), Dujari et al.
patent: 7231526 (2007-06-01), Hon et al.
patent: 7275259 (2007-09-01), Jamieson et al.
patent: 2003/0084171 (2003-05-01), de Jong et al.
patent: 2003/0084292 (2003-05-01), Pierce et al.
patent: 2003/0163725 (2003-08-01), Feuser et al.
patent: 2003/0172265 (2003-09-01), Vu et al.
patent: 2003/0187883 (2003-10-01), Zelenka et al.
patent: 2003/0204743 (2003-10-01), Devadas et al.
patent: 2004/0103325 (2004-05-01), Priebatsch
patent: 2004/0153451 (2004-08-01), Phillips et al.
patent: 2004/0255143 (2004-12-01), Wemyss et al.
Gibson et al., “File Server Scaling with Network-Attached Secure Disks,” Proceeding of the ACM International Conference on Measurement and Modeling of Computer Systems, Jun. 15-18, 1997 (13 Pages).
Gibson et al., “Filesystems for Network-Attached Secure Disks,” CMU-CS-97-118, Jul. 1997, (18 Pages).
Gibson et al., “A Cost-Effective, High Bandwidth Storage Architecture,” Proceedings of the 8thConference on Architectual Support for Programming Languages and Operating Systems, 1998, (12 Pages).
Czerwinski et al., “An Architecture for a Secure Service Discovery Service,” Computer Science Division, University of California, Berkeley, 1999, (pp. 24-35).
Sandhu et al., “Access Control: Principles and Practice,” IEEE Computer, Sep. 1994, (pp. 40-48).
Finlay John R.
Jonnala Ramana
Joshi Dhanesh V.
Karr Ronald S.
Valiveti Narasimha R.
Bayou Yonas
Kowert Robert C.
Meyerstons Hood Kivlin Kowert & Goetzel, P.C.
Symatec Operating Corporation
Zand Kambiz
LandOfFree
Secure storage access using third party capability tokens does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Secure storage access using third party capability tokens, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Secure storage access using third party capability tokens will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4272126