Electrical computers and digital processing systems: multicomput – Computer-to-computer session/connection establishing – Network resources access controlling
Reexamination Certificate
2006-09-26
2006-09-26
Rones, Charles (Department: 2164)
Electrical computers and digital processing systems: multicomput
Computer-to-computer session/connection establishing
Network resources access controlling
C709S200000, C707S793000, C707S793000, C707S793000
Reexamination Certificate
active
07113994
ABSTRACT:
A method of controlling access to network services enables an authorized proxy client to access a service on behalf of a user. To permit the client to function as a proxy, the user registers proxy authorization information with a trusted security server. The proxy authorization information identifies the proxy client and specifies the extent of proxy authority granted to the proxy client. When the proxy client wants to access a target service on behalf of the user, it sends a proxy request to the trusted security server. The trusted security server checks the proxy authorization information of the user to verify whether the request is within the proxy authority granted to the proxy client. If so, the trusted security server returns to the proxy client a data structure containing information recognizable by the target service to authenticate the proxy client for accessing the target service on behalf of the user.
REFERENCES:
patent: 5623601 (1997-04-01), Vu
patent: 5913025 (1999-06-01), Higley et al.
patent: 5983350 (1999-11-01), Minear et al.
patent: 6012088 (2000-01-01), Li et al.
patent: 6081900 (2000-06-01), Subramaniam et al.
patent: 6198824 (2001-03-01), Shambroom
patent: 6298383 (2001-10-01), Gutman et al.
J. Kohl and C. Neuman: Request for Comments RFC1510—“The Kerberos Network Authentication Service” Sep. 1993, available at ftp://ftp.isi.edu/in-notes/rfc1510.txt (accessed on Nov. 21, 2000).
B. Clifford Neuman and Theodore Ts'o: “Kerberos: An Authentication Service for Computer Networks”, USC/ISI Technical Report No. ISI/RS-94-39: Copyright 1994 Institute of Electrical and Electronics Engineers, IEEE Communications Magazine, vol. 32, No. 9, pp. 33-38, Sep. 1994.
“Windows 2000 Kerberos Authentication” Microsoft Windows NT Server, White Paper, Copyright 1999 Microsoft Corporation.
Wei Hu “DCE Security Programming”, Copyright 1995, O'Reilly & Associates, Inc.
Amit Neta
Swift Michael M.
Ward Richard B.
Lee & Hayes PLLC
Microsoft Corporation
Ortiz Belix M.
Rones Charles
LandOfFree
System and method of proxy authentication in a secured network does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with System and method of proxy authentication in a secured network, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method of proxy authentication in a secured network will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3594947