System and method for accessing enterprise-wide resources by pre

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

709225, G06F 1516

Patent

active

060556374

ABSTRACT:
A resource access control system and method (50) for a corporate enterprise includes a security administrator (60, 62) in communication with a plurality of users (90), each of the users (90) having an assigned role and a unique user identifier. A temporary credential token (52) is generated correlative to the assigned role of the user by the security administrator (62) as the user logs on by entering the assigned unique user identifier and indicates a desire to access a resource (56). The temporary credential token (52) is communicated to the resource (56) and any subsequent resources (56) to allow access by the user (90), and deleted as the user (90) terminates the session.

REFERENCES:
patent: 5241594 (1993-08-01), Kung
patent: 5274824 (1993-12-01), Howarth
patent: 5315657 (1994-05-01), Abadi et al.
patent: 5455953 (1995-10-01), Russell
patent: 5506961 (1996-04-01), Carlson et al.
patent: 5534855 (1996-07-01), Shockley et al.
patent: 5542046 (1996-07-01), Carlson et al.
patent: 5649099 (1997-07-01), Theimer et al.
patent: 5659616 (1997-08-01), Sudia
patent: 5684950 (1997-11-01), Dare et al.
patent: 5748890 (1998-05-01), Goldberg et al.
patent: 5757920 (1998-05-01), Misra et al.
patent: 5815574 (1998-09-01), Fortinsky
patent: 5815665 (1998-09-01), Teper et al.
patent: 5818936 (1998-10-01), Mashayekhi
patent: 5841970 (1998-11-01), Tabuki
patent: 5864665 (1999-01-01), Tran
patent: 5899952 (1999-01-01), Hunnicutt et al.
patent: 5911143 (1999-06-01), Deinhart et al.
Unix System v: Release 4 Administration, 2nd., pp. 189-191, 1994.
Samuel I. Schaen and Brian W. McKenney, "Network Auditing: Issues and Recomendations", IEEE, pp. 66-79, Dec. 6, 1991.
Steiner, Neuman and Schiller, Kerberos: An Authentication Service for Open Network Systems, Project Athena, Cambridge, Massachusetts, Jan. 12, 1988.
Understanding Network Directory Services, Statement of Direction, Banyan Systems Inc., 1992.
Lunt, Steven J., cc:Mail re: Kerberized ftp with encryption option available, Jun. 2, 1993.
Kerberos Presentation .
Murray, WIliam H., Token Talk, Infosecurity News, Jul./Aug. 1996.
Sandhu, Coyne, Feinstein and Youman, Role-Based Access Control Models, Computer magazine, Feb. 1996.
Ferraiolo, Cugini, Kuhn, Role-Based Access Control (RBAC): Features and Motivations, 11th Annual Computer Security Application Proceedings 1995.
Stephenson, Peter, Enterprise Security Solutions?, Infosecurity News, Jul./Aug. 1996.
Conorich, Douglas G., Managing Security in a Multiplatform Environment, Information Systems Security, vol. 5, No. 2, Summer 1996.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

System and method for accessing enterprise-wide resources by pre does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with System and method for accessing enterprise-wide resources by pre, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for accessing enterprise-wide resources by pre will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-1002982

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.