System and method for authenticating a subject

Information security – Access control or authentication – Network

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

Reexamination Certificate

active

07610618

ABSTRACT:
A method for adaptively authenticating a subject based on authentication information, comprising the steps of providing for the receipt of the authentication information; providing for the performance of Java Authentication and Authorization Service (JAAS) authentication of the subject based on the authentication information and wherein successful authentication of the subject results in the association of a principal with the subject; providing for the signing of the principal by determining an authentication code for the principal that is a function of the principal and a key.

REFERENCES:
patent: 5341478 (1994-08-01), Travis, Jr. et al.
patent: 5619710 (1997-04-01), Travis, Jr. et al.
patent: 5925126 (1999-07-01), Hsieh
patent: 6308163 (2001-10-01), Du et al.
patent: 6353891 (2002-03-01), Borella et al.
patent: 6490624 (2002-12-01), Sampson et al.
patent: 6571247 (2003-05-01), Danno et al.
patent: 6618806 (2003-09-01), Brown et al.
patent: 6651168 (2003-11-01), Kao et al.
patent: 6668327 (2003-12-01), Prabandham et al.
patent: 6711681 (2004-03-01), Al-Salqan et al.
patent: 6836845 (2004-12-01), Lennie et al.
patent: 6877095 (2005-04-01), Allen
patent: 6892307 (2005-05-01), Wood et al.
patent: 6944761 (2005-09-01), Wood et al.
patent: 6976076 (2005-12-01), Shrader et al.
patent: 6985953 (2006-01-01), Sandhu et al.
patent: 7089584 (2006-08-01), Sharma
patent: 2002/0091798 (2002-07-01), Joshi et al.
patent: 2002/0188869 (2002-12-01), Patrick
patent: 2003/0005118 (2003-01-01), Williams
patent: 2003/0005331 (2003-01-01), Williams
patent: 2003/0051142 (2003-03-01), Hidalgo et al.
patent: 2003/0097574 (2003-05-01), Upton
patent: 2003/0131113 (2003-07-01), Reeves et al.
patent: 2003/0177388 (2003-09-01), Botz et al.
patent: 2003/0229623 (2003-12-01), Chang et al.
patent: 2004/0117486 (2004-06-01), Bourne et al.
Coulouris et al., “Distributed Systems: Concepts And Design”, Aug. 2000, Addison-Wesley, 3rdEdition, pp. 138-145.
Bowker, “Superior app management with JMX”, JavaWorld.com, Jun. 2001, Retrieved from the Internet on Jan. 9, 2008: <URL: http://www.javaworld.com/javaworld/jw-06-2001/jw-0608-jmx.html>.
Oaks, “Java Security”, May 2001, O'Reilly, 2ndEdition, pp. 362-368.
BEA WebLogic Server 7.0—Creating Custom Authentication Providers, BEA Systems, May 2002, Retrieved from the Internet on Jun. 11, 2009: <URL: http://web.archive.org/web/20020528085707/edocs.bea.com/wls/docs70/dvspisec/atn.html>.
WebLogic Server 6.1—Introduction to WebLogic Security, BEA Systems, 2001, Retrieved from the Internet on Jun. 11, 2009: <URL: http://edocs.bea.com/wls/docs61/security/intro.html>.
U.S. Appl. No. 10/373,532, filed Feb. 24, 2003, Paul Patrick.
Bellare et al.,Message Authentication using Hash Functions—The HMAC Construction, RSA Laboratories CryptoBytes, vol. 2, No. 1, Spring 1996, pp. 1-5.
Java Management Extensions (JMX).,Cross-Industry Management Through Java Technology, Sun Microsystems, Inc., Jun. 1999, 2 pages.
Java Management Extensions White Paper,Dynamic Management for the Service Age, Sun Microsystems, Inc., Jun. 1999, pp. 1-13.
BEA Weblogic Server,Programming Weblogic Management Services with JMX, BEA Systems, Release7.0, Revised: Aug. 23, 2002, 115 pages.
BEA Weblogic Server,Introduction to Weblogic Security, BEA Systems, Release 7.0, Document Date: Jun. 2002, Revised: Jun. 28, 2002, 22 pages.
BEA Weblogic Server,Programming WebLogic Security, BEA Systems, Release 7.0, Document Date: Jun. 2002, Revised: Sep. 6, 2002, 104 pages.
BEA WebLogic Server,Developing Security Providers for WebLogic Server, BEA Systems, Release7.0, Document Revised: Aug. 30, 2002, 315 pages.
Lai, C., et al., “User Authentication and Authorization in the Java (TM) Platform,”Published in the Proceedings of the 15thAnnual Computer Security Applications Conference, Phoenix, Arizona, Dec. 1999, 10 pages.
Samar, V., et al., “Making Login Services Independent of Authentication Technologies,”3rdACM Conference on Computer and Communications Security, Mar. 1996, 10 pages.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

System and method for authenticating a subject does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with System and method for authenticating a subject, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for authenticating a subject will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4134666

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.