System and method for enterprise authentication

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S183000, C713S185000, C713S186000, C709S225000, C709S229000, C380S255000, C380S270000, C705S001100

Reexamination Certificate

active

07017051

ABSTRACT:
A method for adaptively authenticating a subject, said method adapted to cooperate with a security provider interface hierarchy, said method comprising the steps of providing for the implementation of an authentication interface adapted to extend and implement at least a portion of the security provider hierarchy, providing for the authentication of the subject when so directed by the authentication interface, and providing for the association of a signed principal with the subject upon the successful authentication of the subject.

REFERENCES:
patent: 5341478 (1994-08-01), Travis, Jr. et al.
patent: 5619710 (1997-04-01), Travis, Jr. et al.
patent: 5925126 (1999-07-01), Hsieh
patent: 6353891 (2002-03-01), Borella et al.
patent: 6618806 (2003-09-01), Brown et al.
patent: 6651168 (2003-11-01), Kao et al.
patent: 6668327 (2003-12-01), Prabandham et al.
patent: 2003/0005331 (2003-01-01), Williams
patent: 2003/0093539 (2003-05-01), Simeloff et al.
patent: 2003/0097574 (2003-05-01), Upton
patent: 2003/0177388 (2003-09-01), Botz et al.
patent: 2004/0117486 (2004-06-01), Bourne et al.
BEA WebLogic Server,Programming WebLogic Management Services with JMX, BEA Systems, Release 7.0, Revised: Aug. 23, 2002, 115 pages.
BEA WebLogic Server.Introduction to WebLogic Security, BEA Systems, Release 7.0, Document Date: Jun. 2002, Revised: Jun. 28, 2002, 22 pages.
BEA WebLogic Server,Programming WebLogic Security, BEA Systems Release 7.0, Document Date: Jun. 2002, Revised Sep. 6, 2002, 104 pages.
BEA WebLogic Server, Developing Security Providers for WebLogic Server,BEA Systems, Release 7.0, Document Revised: Aug. 30, 2002, 315 Pages.
Lai, C., et al., “User Authentication and Authorization in the Java (TM) Platform,”Published in the Proceedings of the 15thAnnual Computer Security Applications Conference, Phoenix, Arizona, Dec. 1999, 10 pages.
Samar, V., et al., “Making Login Services Independent of Authentication Technologies,”3rdACM Conference on Computer and Communications Security, Mar., 1996, 10 pages.
U.S. Appl. No. 10/373,533, filed Feb. 24, 2003, Paul Patrick.
Bellare et al.,Message Authentication using Hash Functions—HMAC Contruction, RSA Laboratories Cryptobytes, vol. 2, No. 1, Spring 1996, pps 1-5.
Java Management Extensions (JMX).,Cross-Industry Management Through Java Technology. Sun Microsystems, Inc., Jun. 1999, 2 pages.
Java Management Extension White Paper,Dynamic Management for the Service Age, Sun Microsystems, Inc., Jun. 1999, pps 1-13.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

System and method for enterprise authentication does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with System and method for enterprise authentication, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for enterprise authentication will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3561245

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.