Technique for handling subsequent user identification and...

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Central trusted authority provides computer authentication

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S152000, C713S156000, C713S185000, C707S793000, C707S793000, C705S002000, C705S021000, C705S051000, C705S065000

Reexamination Certificate

active

06976164

ABSTRACT:
The present invention provides a method, system, and computer program product which enables changing user credentials that are used to access legacy host applications and/or systems which provide legacy host data during a secure host access session which is authenticated using a digital certificate and is protected by a host-based security system, such as RACF (Resource Access Control Facility, a product offered by the IBM Corporation), where these changed credentials are used to authenticate a user after previously-provided credentials have been used for authentication earlier in the same session. The changed credentials may belong to the same user, where that user happens to have a different user ID and/or password for different legacy host applications and wishes to change from accessing one legacy host application to accessing another. Or, the changed credentials may be used to enable a different user to interact with the same legacy host application used by the previously-authenticated user. The disclosed technique may also be used advantageously to authenticate a user for accessing an application, when the user's credentials are not changing.

REFERENCES:
patent: 5659616 (1997-08-01), Sudia
patent: 5684950 (1997-11-01), Dare et al.
patent: 5689566 (1997-11-01), Nguyen
patent: 5884312 (1999-03-01), Dustan et al.
patent: 5944824 (1999-08-01), He
patent: 6105131 (2000-08-01), Carroll
patent: 6178511 (2001-01-01), Cohen et al.
patent: 6356941 (2002-03-01), Cohen
patent: 6405214 (2002-06-01), Meade, II
patent: 6438690 (2002-08-01), Patel et al.
patent: 6584505 (2003-06-01), Howard et al.
patent: 6606708 (2003-08-01), Shifrin et al.
patent: 6609198 (2003-08-01), Wood et al.
patent: 6629246 (2003-09-01), Gadi
patent: 6671808 (2003-12-01), Abbott et al.
patent: 6678731 (2004-01-01), Howard et al.
Schneier, B. Applied Cryptography, 1996, John Wiley & Sons, p. 59.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Technique for handling subsequent user identification and... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Technique for handling subsequent user identification and..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Technique for handling subsequent user identification and... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3493876

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.