Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Central trusted authority provides computer authentication
Reexamination Certificate
2005-12-13
2005-12-13
Sheikh, Ayaz (Department: 2131)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Central trusted authority provides computer authentication
C713S152000, C713S156000, C713S185000, C707S793000, C707S793000, C705S002000, C705S021000, C705S051000, C705S065000
Reexamination Certificate
active
06976164
ABSTRACT:
The present invention provides a method, system, and computer program product which enables changing user credentials that are used to access legacy host applications and/or systems which provide legacy host data during a secure host access session which is authenticated using a digital certificate and is protected by a host-based security system, such as RACF (Resource Access Control Facility, a product offered by the IBM Corporation), where these changed credentials are used to authenticate a user after previously-provided credentials have been used for authentication earlier in the same session. The changed credentials may belong to the same user, where that user happens to have a different user ID and/or password for different legacy host applications and wishes to change from accessing one legacy host application to accessing another. Or, the changed credentials may be used to enable a different user to interact with the same legacy host application used by the previously-authenticated user. The disclosed technique may also be used advantageously to authenticate a user for accessing an application, when the user's credentials are not changing.
REFERENCES:
patent: 5659616 (1997-08-01), Sudia
patent: 5684950 (1997-11-01), Dare et al.
patent: 5689566 (1997-11-01), Nguyen
patent: 5884312 (1999-03-01), Dustan et al.
patent: 5944824 (1999-08-01), He
patent: 6105131 (2000-08-01), Carroll
patent: 6178511 (2001-01-01), Cohen et al.
patent: 6356941 (2002-03-01), Cohen
patent: 6405214 (2002-06-01), Meade, II
patent: 6438690 (2002-08-01), Patel et al.
patent: 6584505 (2003-06-01), Howard et al.
patent: 6606708 (2003-08-01), Shifrin et al.
patent: 6609198 (2003-08-01), Wood et al.
patent: 6629246 (2003-09-01), Gadi
patent: 6671808 (2003-12-01), Abbott et al.
patent: 6678731 (2004-01-01), Howard et al.
Schneier, B. Applied Cryptography, 1996, John Wiley & Sons, p. 59.
King Julie H.
Kirkman Susan D.
Labrecque Daniel J.
Overby, Jr. Linwood H.
Pogue Steven Wayne
Arani Taghi T.
Doubet Marcia L.
Herndon Jerry W.
Sheikh Ayaz
LandOfFree
Technique for handling subsequent user identification and... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Technique for handling subsequent user identification and..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Technique for handling subsequent user identification and... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3493876