Information security – Access control or authentication – Network
Reexamination Certificate
2002-02-26
2009-08-04
Moazzami, Nasser G (Department: 2436)
Information security
Access control or authentication
Network
C726S001000, C726S002000, C726S005000, C726S014000, C726S027000, C713S182000, C380S277000, C709S200000, C705S018000
Reexamination Certificate
active
07571467
ABSTRACT:
The present invention relates to a system and methodology to facilitate communications security in a distributed computing and applications environment. A pass-phrase is generated to wrap a strong set of security credentials that are employed to establish trusted relationships between entities such as a service provider and one or more partners seeking access to the provider. The pass-phrase is generally constructed from weaker cryptographic material and is generally transported or communicated separately from the wrapped security credentials. When the partner desires to access service resources, the pass-phrase is employed to unlock the strong set of security credentials contained within the wrapper. The unlocked security credentials are then utilized to establish encrypted communications channels between the service provider and the partner.
REFERENCES:
patent: 5222135 (1993-06-01), Hardy et al.
patent: 5497421 (1996-03-01), Kaufman et al.
patent: 5604490 (1997-02-01), Blakley, III et al.
patent: 5757920 (1998-05-01), Misra et al.
patent: 5764887 (1998-06-01), Kells et al.
patent: 5802276 (1998-09-01), Benantar et al.
patent: 5825300 (1998-10-01), Bathrick et al.
patent: 5875296 (1999-02-01), Shi et al.
patent: 5995625 (1999-11-01), Sudia et al.
patent: 5999711 (1999-12-01), Misra et al.
patent: 6052785 (2000-04-01), Lin et al.
patent: 6343361 (2002-01-01), Nendell et al.
patent: 6349338 (2002-02-01), Seamons et al.
patent: 6377994 (2002-04-01), Ault et al.
patent: 6401211 (2002-06-01), Brezak, Jr. et al.
patent: 6607136 (2003-08-01), Atsmon et al.
patent: 6920567 (2005-07-01), Doherty et al.
patent: 6986050 (2006-01-01), Hypponen
patent: 6993555 (2006-01-01), Kay et al.
patent: 7111172 (2006-09-01), Duane et al.
patent: 7114080 (2006-09-01), Rahman et al.
patent: 7210167 (2007-04-01), Brezak et al.
patent: 7210169 (2007-04-01), Smith et al.
patent: 2001/0011254 (2001-08-01), Clark
patent: 2001/0014158 (2001-08-01), Baltzley
patent: 2002/0007453 (2002-01-01), Nemovicher
patent: 2002/0031230 (2002-03-01), Sweet et al.
patent: 2002/0059144 (2002-05-01), Meffert et al.
patent: 2002/0104019 (2002-08-01), Chatani et al.
patent: 2002/0178353 (2002-11-01), Graham
patent: 2003/0060188 (2003-03-01), Gidron et al.
patent: 2003/0097579 (2003-05-01), England et al.
patent: 2003/0142364 (2003-07-01), Goldstone
patent: 2003/0188183 (2003-10-01), Lee et al.
Sung-Min Lee et al, A Secure Electronic Software Distribution (ESD) Protocol Based on PKC, Springer-Verlag Berlin Heidelberg, 2000.
Sub Ramakrishnan, Java Based E-Commerce Middleware, 0-7695-0990-8/01/$10.00, IEEE, 2001.
Stuart Jacobs, Tactical Network Security, 0-7803-5538-5/$10.00, IEEE, 1999.
Bruce Schneier, Applied Cryptography, Second Edition, Wiley, 1996.
“A secure Electronic Software Distribution (ESD) Protocol Based on PKC”, Sung-Min Lee et al, Springer, 2000.
“Tactical Network Security”, Stuart Jacobs, IEEE, 1999.
“Applied Cryptography”, Bruce Schneier, pp. 174, Second edition, Wiley, 1996.
Sung-Min Lee et al, A secure electronic software distribution (ESD) protocol based on PKC, Springer 2000.
Brainard , SecurSight : An architecture for secure information access, RSA Laboratories.
Stuart, Tactical network security, IEEE, 1999.
Schneier, Applied Cryptography, Wiley, 1996.
Kyung-Ah Chang, et al. “CORBA-based Fair Contracts Support System for Subjects of Electronic Commerce”IEEE International Workshops on Parallel Processing Proceedings, 1999, p. 1-6.
Michael Hitchens, et al. “Design Choices for Symmetric Key Based Inter-Domain Authentication Protocols in Distributed Systems” Proceedings of the 12th Annual Computer Security Applications Conference (ACSA), 1996, p. 105-116.
Peter Sewell, et al. “Secure Composition of Untrusted Code: Wrappers and Causality Types” IEEE, 2000, p. 1-16.
John G. Brainard, “SecurSight: An Architecture for Secure Information Access”, RSA Laboratories, p. 1-9.
Neil Ching, et al. “Authorization in the Digital Library: Secure Access to Services Across Enterprise Boundaries” IEEE Proceedings of ADL 1996, p. 110-119.
Doubrovkine Daniel
Priestley Matthew Charles
Abedin Shanto M
Microsoft Corporation
Moazzami Nasser G
Shook Hardy & Bacon L.L.P.
LandOfFree
System and method to package security credentials for later use does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with System and method to package security credentials for later use, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method to package security credentials for later use will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4090555