Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique
Reexamination Certificate
2003-10-16
2010-02-16
Moise, Emmanuel L (Department: 2437)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Particular communication authentication technique
C713S155000, C380S270000, C726S004000, C726S016000, C726S028000
Reexamination Certificate
active
07664952
ABSTRACT:
An object is to provide a service providing method capable of curbing rise of cost. A service providing method according to the present invention is one for providing services A and B, which authenticates a user of an authentication requesting terminal in order to make service A available to the user and which determines whether service B is available to the user, in a state in which the user is authenticated about service A. When service B is determined to be available, a permission message is stored and a permission response based on the permission message for utilization of service B is transmitted to the authentication requesting terminal. Then the permission message on which a utilization request message from a service utilizing terminal is based, is verified, and, if it is in an available status, the service utilizing terminal is permitted to utilize service B. The use of the authentication result on service A obviates a need for provision of new authentication means for service B, so as to lead to reduction of cost.
REFERENCES:
patent: 5687235 (1997-11-01), Perlman et al.
patent: 6085171 (2000-07-01), Leonard
patent: 6587836 (2003-07-01), Ahlberg et al.
patent: 2004/0261116 (2004-12-01), Mckeown et al.
patent: 1 054 543 (2000-11-01), None
patent: 1 238 690 (2002-09-01), None
patent: 2002-269352 (2002-09-01), None
patent: WO 01/43390 (2001-06-01), None
patent: WO 01/91479 (2001-11-01), None
Bruce Schneier, “Applied Chryptography”, John Wiley & Sons, Inc., 1996, pp. 52-56.
“NTT DoCoMo Technical Journal”, The Telecomunications Association, vol. 3, No. 4, Jan. 2002, pp. 34-43 (with English translation pp. 23-33).
Keiji Tachikawa, “W-CDMA Mobile Communications System”, John Wiley and Sons, Ltd. 2002, pp. 345-356.
Stelvio Cimato, “Design of an Authentication Protocol for Gsm Javacards”, Information Security and Criptology-ICISC 2001. 4thInternational Conference. Proceedings (Lecture Notes in Computer Science vol. 2288) Springer-Verlag Berlin, Germany, XP-002526434, Dec. 6 and 7, 2001, pp. 355-368.
W Stallings, “Autentication Applications”, Cryptography and Network Security, Cryptography and Network Security: Principles and Pratice, XP-002161792, Jan. 1, 1998, pp. 323-340.
P V McMahon, “Sesame V2 Public Key and Authorisation Extensions to Kerberos”, Network and Distributed System Security, IEEE Comput. Soc.,XP-010134534, Feb. 16, 1995, pp. 114-131.
Eric Freudenthal, et al., “dRBAC: Distributed Role-based Access Control for Dynamic Coalition Environments”, Proceedings of the 22ndInternational Conference on Distributed Computing Systems. ICDCS Vienna, Austria; International Confernce on Distributed Computing Systems, Los Alamitos, CA. IEEE Comp. Soc. US, Conf. 22,, XP-010595553, Jul. 2, 2002, pp. 372-381.
Eguchi Hisatoshi
Miura Fumiaki
Callahan Paul
Moise Emmanuel L
NTT DoCoMo Inc.
Oblon, Spivak McClelland, Maier & Neustadt, L.L.P.
LandOfFree
Service verifying system, authentication requesting... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Service verifying system, authentication requesting..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Service verifying system, authentication requesting... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4181269