Information security – Access control or authentication – Network
Reexamination Certificate
2006-11-14
2006-11-14
Zand, Kambiz (Department: 2132)
Information security
Access control or authentication
Network
Reexamination Certificate
active
07137141
ABSTRACT:
A method and computer program product for bypassing the initial sign-on of an underlying operating system with single sign-on capability. In one embodiment, a method comprises the step of providing an application framework which logs on a user with a first level of access in the underlying operating system thereby bypassing the initial sign-on screen of the underlying operating system. The method further comprises entering a logon input, e.g., userID and password, on a generated application framework sign-on screen by the user. The method further comprises comparing the logon input with an application framework security database to determine the level of access. If the user is only entitled to the first level of access, then the user is restricted to a first level of access. If the user is entitled to another level of access, then a switch user program may be executed to switch the level of access to a second level of access, i.e., change in the assortment and/or number of applications. In another embodiment, the user selects an icon to maintain a first level of access upon entering the logon input. In another embodiment, the user selects an icon to change the level of access upon entering the logon input.
REFERENCES:
patent: 5241594 (1993-08-01), Kung
patent: 5684950 (1997-11-01), Dare et al.
patent: 5708832 (1998-01-01), Inniss et al.
patent: 5768504 (1998-06-01), Kells et al.
patent: 5884312 (1999-03-01), Dustan et al.
patent: 5935251 (1999-08-01), Moore
patent: 5944824 (1999-08-01), He
patent: 10-269184 (1998-10-01), None
patent: 11-25048 (1999-01-01), None
“Safe Single-Sign-On Protocol with Minimal Password Exposure No-Decryption, and Technology-Adaptivity,”IBM Technical Disclosure Bulletin, vol. 38 No. 03, Mar. 1995, pp. 245-248.
“Logon Assist for Multiple Logons,”IBM Technical Disclosure Bulletin, vol. 32 No. 8A, Jan. 1990, pp. 303-315.
“Method to Recognize a User Who Has Logged On to a Network Through Windows, DOS LAN Requester Command Line or DOS LAN Requester Full-Screen Interface,”IBM Technical Disclosure Bulletin, vol. 34 No. 10B, Mar. 1992, p. 359.
International Business Machines - Corporation
Lanier Benjamin E.
Voigt, Jr. Robert A.
Winstead Sechrest & Minick P.C.
Zand Kambiz
LandOfFree
Single sign-on to an underlying operating system application does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Single sign-on to an underlying operating system application, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Single sign-on to an underlying operating system application will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3629519