Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer
Patent
1996-09-27
2000-04-25
Maung, Zarni
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Protection at a particular protocol layer
709225, G06F 1516
Patent
active
060556374
ABSTRACT:
A resource access control system and method (50) for a corporate enterprise includes a security administrator (60, 62) in communication with a plurality of users (90), each of the users (90) having an assigned role and a unique user identifier. A temporary credential token (52) is generated correlative to the assigned role of the user by the security administrator (62) as the user logs on by entering the assigned unique user identifier and indicates a desire to access a resource (56). The temporary credential token (52) is communicated to the resource (56) and any subsequent resources (56) to allow access by the user (90), and deleted as the user (90) terminates the session.
REFERENCES:
patent: 5241594 (1993-08-01), Kung
patent: 5274824 (1993-12-01), Howarth
patent: 5315657 (1994-05-01), Abadi et al.
patent: 5455953 (1995-10-01), Russell
patent: 5506961 (1996-04-01), Carlson et al.
patent: 5534855 (1996-07-01), Shockley et al.
patent: 5542046 (1996-07-01), Carlson et al.
patent: 5649099 (1997-07-01), Theimer et al.
patent: 5659616 (1997-08-01), Sudia
patent: 5684950 (1997-11-01), Dare et al.
patent: 5748890 (1998-05-01), Goldberg et al.
patent: 5757920 (1998-05-01), Misra et al.
patent: 5815574 (1998-09-01), Fortinsky
patent: 5815665 (1998-09-01), Teper et al.
patent: 5818936 (1998-10-01), Mashayekhi
patent: 5841970 (1998-11-01), Tabuki
patent: 5864665 (1999-01-01), Tran
patent: 5899952 (1999-01-01), Hunnicutt et al.
patent: 5911143 (1999-06-01), Deinhart et al.
Unix System v: Release 4 Administration, 2nd., pp. 189-191, 1994.
Samuel I. Schaen and Brian W. McKenney, "Network Auditing: Issues and Recomendations", IEEE, pp. 66-79, Dec. 6, 1991.
Steiner, Neuman and Schiller, Kerberos: An Authentication Service for Open Network Systems, Project Athena, Cambridge, Massachusetts, Jan. 12, 1988.
Understanding Network Directory Services, Statement of Direction, Banyan Systems Inc., 1992.
Lunt, Steven J., cc:Mail re: Kerberized ftp with encryption option available, Jun. 2, 1993.
Kerberos Presentation .
Murray, WIliam H., Token Talk, Infosecurity News, Jul./Aug. 1996.
Sandhu, Coyne, Feinstein and Youman, Role-Based Access Control Models, Computer magazine, Feb. 1996.
Ferraiolo, Cugini, Kuhn, Role-Based Access Control (RBAC): Features and Motivations, 11th Annual Computer Security Application Proceedings 1995.
Stephenson, Peter, Enterprise Security Solutions?, Infosecurity News, Jul./Aug. 1996.
Conorich, Douglas G., Managing Security in a Multiplatform Environment, Information Systems Security, vol. 5, No. 2, Summer 1996.
Champagne Jean-Paul
Galindo Mary A.
Hickerson Cynthia M. K.
Hickman Donna R.
Hudson Jerome D.
Caldwell Andrew
Electronic Data Systems Corporation
Griebenow L. Joy
Maung Zarni
LandOfFree
System and method for accessing enterprise-wide resources by pre does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with System and method for accessing enterprise-wide resources by pre, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for accessing enterprise-wide resources by pre will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-1002982