Service verifying system, authentication requesting...

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S155000, C380S270000, C726S004000, C726S016000, C726S028000

Reexamination Certificate

active

07664952

ABSTRACT:
An object is to provide a service providing method capable of curbing rise of cost. A service providing method according to the present invention is one for providing services A and B, which authenticates a user of an authentication requesting terminal in order to make service A available to the user and which determines whether service B is available to the user, in a state in which the user is authenticated about service A. When service B is determined to be available, a permission message is stored and a permission response based on the permission message for utilization of service B is transmitted to the authentication requesting terminal. Then the permission message on which a utilization request message from a service utilizing terminal is based, is verified, and, if it is in an available status, the service utilizing terminal is permitted to utilize service B. The use of the authentication result on service A obviates a need for provision of new authentication means for service B, so as to lead to reduction of cost.

REFERENCES:
patent: 5687235 (1997-11-01), Perlman et al.
patent: 6085171 (2000-07-01), Leonard
patent: 6587836 (2003-07-01), Ahlberg et al.
patent: 2004/0261116 (2004-12-01), Mckeown et al.
patent: 1 054 543 (2000-11-01), None
patent: 1 238 690 (2002-09-01), None
patent: 2002-269352 (2002-09-01), None
patent: WO 01/43390 (2001-06-01), None
patent: WO 01/91479 (2001-11-01), None
Bruce Schneier, “Applied Chryptography”, John Wiley & Sons, Inc., 1996, pp. 52-56.
“NTT DoCoMo Technical Journal”, The Telecomunications Association, vol. 3, No. 4, Jan. 2002, pp. 34-43 (with English translation pp. 23-33).
Keiji Tachikawa, “W-CDMA Mobile Communications System”, John Wiley and Sons, Ltd. 2002, pp. 345-356.
Stelvio Cimato, “Design of an Authentication Protocol for Gsm Javacards”, Information Security and Criptology-ICISC 2001. 4thInternational Conference. Proceedings (Lecture Notes in Computer Science vol. 2288) Springer-Verlag Berlin, Germany, XP-002526434, Dec. 6 and 7, 2001, pp. 355-368.
W Stallings, “Autentication Applications”, Cryptography and Network Security, Cryptography and Network Security: Principles and Pratice, XP-002161792, Jan. 1, 1998, pp. 323-340.
P V McMahon, “Sesame V2 Public Key and Authorisation Extensions to Kerberos”, Network and Distributed System Security, IEEE Comput. Soc.,XP-010134534, Feb. 16, 1995, pp. 114-131.
Eric Freudenthal, et al., “dRBAC: Distributed Role-based Access Control for Dynamic Coalition Environments”, Proceedings of the 22ndInternational Conference on Distributed Computing Systems. ICDCS Vienna, Austria; International Confernce on Distributed Computing Systems, Los Alamitos, CA. IEEE Comp. Soc. US, Conf. 22,, XP-010595553, Jul. 2, 2002, pp. 372-381.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Service verifying system, authentication requesting... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Service verifying system, authentication requesting..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Service verifying system, authentication requesting... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4181269

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.