Single sign-on to an underlying operating system application

Information security – Access control or authentication – Network

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

Reexamination Certificate

active

07137141

ABSTRACT:
A method and computer program product for bypassing the initial sign-on of an underlying operating system with single sign-on capability. In one embodiment, a method comprises the step of providing an application framework which logs on a user with a first level of access in the underlying operating system thereby bypassing the initial sign-on screen of the underlying operating system. The method further comprises entering a logon input, e.g., userID and password, on a generated application framework sign-on screen by the user. The method further comprises comparing the logon input with an application framework security database to determine the level of access. If the user is only entitled to the first level of access, then the user is restricted to a first level of access. If the user is entitled to another level of access, then a switch user program may be executed to switch the level of access to a second level of access, i.e., change in the assortment and/or number of applications. In another embodiment, the user selects an icon to maintain a first level of access upon entering the logon input. In another embodiment, the user selects an icon to change the level of access upon entering the logon input.

REFERENCES:
patent: 5241594 (1993-08-01), Kung
patent: 5684950 (1997-11-01), Dare et al.
patent: 5708832 (1998-01-01), Inniss et al.
patent: 5768504 (1998-06-01), Kells et al.
patent: 5884312 (1999-03-01), Dustan et al.
patent: 5935251 (1999-08-01), Moore
patent: 5944824 (1999-08-01), He
patent: 10-269184 (1998-10-01), None
patent: 11-25048 (1999-01-01), None
“Safe Single-Sign-On Protocol with Minimal Password Exposure No-Decryption, and Technology-Adaptivity,”IBM Technical Disclosure Bulletin, vol. 38 No. 03, Mar. 1995, pp. 245-248.
“Logon Assist for Multiple Logons,”IBM Technical Disclosure Bulletin, vol. 32 No. 8A, Jan. 1990, pp. 303-315.
“Method to Recognize a User Who Has Logged On to a Network Through Windows, DOS LAN Requester Command Line or DOS LAN Requester Full-Screen Interface,”IBM Technical Disclosure Bulletin, vol. 34 No. 10B, Mar. 1992, p. 359.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Single sign-on to an underlying operating system application does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Single sign-on to an underlying operating system application, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Single sign-on to an underlying operating system application will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3629519

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.