System and method of proxy authentication in a secured network

Electrical computers and digital processing systems: multicomput – Computer-to-computer session/connection establishing – Network resources access controlling

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C709S200000, C707S793000, C707S793000, C707S793000

Reexamination Certificate

active

07113994

ABSTRACT:
A method of controlling access to network services enables an authorized proxy client to access a service on behalf of a user. To permit the client to function as a proxy, the user registers proxy authorization information with a trusted security server. The proxy authorization information identifies the proxy client and specifies the extent of proxy authority granted to the proxy client. When the proxy client wants to access a target service on behalf of the user, it sends a proxy request to the trusted security server. The trusted security server checks the proxy authorization information of the user to verify whether the request is within the proxy authority granted to the proxy client. If so, the trusted security server returns to the proxy client a data structure containing information recognizable by the target service to authenticate the proxy client for accessing the target service on behalf of the user.

REFERENCES:
patent: 5623601 (1997-04-01), Vu
patent: 5913025 (1999-06-01), Higley et al.
patent: 5983350 (1999-11-01), Minear et al.
patent: 6012088 (2000-01-01), Li et al.
patent: 6081900 (2000-06-01), Subramaniam et al.
patent: 6198824 (2001-03-01), Shambroom
patent: 6298383 (2001-10-01), Gutman et al.
J. Kohl and C. Neuman: Request for Comments RFC1510—“The Kerberos Network Authentication Service” Sep. 1993, available at ftp://ftp.isi.edu/in-notes/rfc1510.txt (accessed on Nov. 21, 2000).
B. Clifford Neuman and Theodore Ts'o: “Kerberos: An Authentication Service for Computer Networks”, USC/ISI Technical Report No. ISI/RS-94-39: Copyright 1994 Institute of Electrical and Electronics Engineers, IEEE Communications Magazine, vol. 32, No. 9, pp. 33-38, Sep. 1994.
“Windows 2000 Kerberos Authentication” Microsoft Windows NT Server, White Paper, Copyright 1999 Microsoft Corporation.
Wei Hu “DCE Security Programming”, Copyright 1995, O'Reilly & Associates, Inc.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

System and method of proxy authentication in a secured network does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with System and method of proxy authentication in a secured network, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method of proxy authentication in a secured network will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3594947

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.