Service verifying system, authentication requesting...

Information security – Access control or authentication – Network

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S016000, C726S028000, C713S155000, C713S168000, C380S270000

Reexamination Certificate

active

08079064

ABSTRACT:
An object is to provide a service providing method capable of curbing rise of cost. A service providing method according to the present invention is one for providing services A and B, which authenticates a user of an authentication requesting terminal in order to make service A available to the user and which determines whether service B is available to the user, in a state in which the user is authenticated about service A. When service B is determined to be available, a permission message is stored and a permission response based on the permission message for utilization of service B is transmitted to the authentication requesting terminal. Then the permission message on which a utilization request message from a service utilizing terminal is based, is verified, and, if it is in an available status, the service utilizing terminal is permitted to utilize service B. The use of the authentication result on service A obviates a need for provision of a new authentication result for service B, so as to lead to reduction of cost.

REFERENCES:
patent: 5687235 (1997-11-01), Perlman et al.
patent: 6085171 (2000-07-01), Leonard
patent: 6587836 (2003-07-01), Ahlberg et al.
patent: 7020685 (2006-03-01), Chen et al.
patent: 2004/0261116 (2004-12-01), McKeown et al.
patent: 2005/0154914 (2005-07-01), Eguchi et al.
patent: 1 054 543 (2000-11-01), None
patent: 1 238 690 (2002-09-01), None
patent: 2002-269352 (2002-09-01), None
patent: WO 01/43390 (2001-06-01), None
patent: WO 01/91479 (2001-11-01), None
Bruce Schneier, “Applied Chryptography”, John Wiley & Sons, Inc. 1996, pp. 52-56.
“NTT DoCoMo Technical Journal”, The Telecommunications Association, vol. 3, No. 4, Jan. 2002, pp. 34-43 (with English translation pp. 23-33).
Keiji Tachikawa, “W-CDMA Mobile Communications System”, John Wiley and Sons, Ltd., 2002, pp. 345-356.
Office Action mailed Sep. 2, 2010, in co-pending U.S. Appl. No. 12/407,841.
Stelvio Cimato, “Design of an Authentication Protocol for Gsm Javacards”, ICICS 2001, 4thInternational Conference Proceedings, vol. 2288, XP-002526434, Dec. 7, 2001, pp. 355-368.
Stallings W., “Authentication Applications”, Cryptography and Network Security: Principles and Practice, XX, XX, XP-002161792, Chapter 11, Jan. 1, 1998, pp. 323-340.
P. V. McMahon, “Sesame V2 Public Key and Authorisation Extensions to Kerberos”, Proceedings of the Symposium on San Diego, IEEE Comput, Soc., XP-010134534, Feb. 16, 1995, pp. 114-131.
Eric Freudenthal, et al., “dRBAC: Distributed Role-based Access Control for Dynamic Coalition Environments”, Proceedings of the 22ndInternational Conference on Distributed Computing Systems, vol. Conf. 22, XP-010595553, Jul. 2, 2002, pp. 372-381.
Office Action mailed Mar. 18, 2011, in co-pending U.S. Appl. No. 12/407,841.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Service verifying system, authentication requesting... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Service verifying system, authentication requesting..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Service verifying system, authentication requesting... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4295870

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.