System and method for enterprise authentication

Information security – Access control or authentication – Network

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S155000

Reexamination Certificate

active

07610615

ABSTRACT:
A method for adaptively authenticating a subject, said method adapted to cooperate with a security provider interface hierarchy, said method comprising the steps of providing for the implementation of an authentication interface adapted to extend and implement at least a portion of the security provider hierarchy, providing for the authentication of the subject when so directed by the authentication interface, and providing for the association of a signed principal with the subject upon the successful authentication of the subject.

REFERENCES:
patent: 6490624 (2002-12-01), Sampson et al.
patent: 6618806 (2003-09-01), Brown et al.
patent: 6651168 (2003-11-01), Kao et al.
patent: 6668327 (2003-12-01), Prabandham et al.
patent: 6711681 (2004-03-01), Al-Salqan et al.
patent: 6836845 (2004-12-01), Lennie et al.
patent: 6877095 (2005-04-01), Allen
patent: 6944761 (2005-09-01), Wood et al.
patent: 6976076 (2005-12-01), Shrader et al.
patent: 6985953 (2006-01-01), Sandhu et al.
patent: 7089584 (2006-08-01), Sharma
patent: 2002/0188869 (2002-12-01), Patrick
patent: 2003/0005118 (2003-01-01), Williams
patent: 2003/0005331 (2003-01-01), Williams
patent: 2003/0037237 (2003-02-01), Abgrall et al.
patent: 2003/0097574 (2003-05-01), Upton
patent: 2003/0177388 (2003-09-01), Botz et al.
Lai, C., et al., “User Authentication and Authorization in the JAVA (TM) Platform”, Published in the Proceedings of the 15th Annual Computer Security Applications Conference, Phoenix, Arizona, Dec. 1999. 10 pages.
Samar, V., et al., “Making Login Services Independent of Authentication Technologies,” 3ra ACM Conference on Comouter and Communications Security. Mar. 1996. 10 pages.
Coulouris et al., “Distributed Systems: Concepts and Design”, Aug. 2000, Addison-Wesley, Edition 3, pp. 138-145.
Oaks, S., “Java Security,” May 2001, O'Reilly, 2nd Edition, pp. 362-368.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

System and method for enterprise authentication does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with System and method for enterprise authentication, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for enterprise authentication will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4087953

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.