Technique for handling subsequent user identification and...

Electrical computers and digital processing systems: support – System access control based on user identification by...

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S152000, C713S156000, C713S185000, C707S793000, C705S065000

Reexamination Certificate

active

06934848

ABSTRACT:
The present invention provides a method, system, and computer program product for enabling a user to provide a single system sign-on for accessing one or more legacy host applications and/or one or more systems which provide legacy host data (such as legacy database systems) during a secure host access session which is authenticated using a digital certificate and is protected by a host-based security system, such as RACF (Resource Access Control Facility, a product offered by the IBM Corporation), where the same set of credentials must be provided more than once during the secure session. The subsequent provision of the credentials may be transparent to the user, and does not require change to existing legacy applications or systems.

REFERENCES:
patent: 5659616 (1997-08-01), Sudia
patent: 5684950 (1997-11-01), Dare et al.
patent: 5689566 (1997-11-01), Nguyen
patent: 5884312 (1999-03-01), Dustan et al.
patent: 5944824 (1999-08-01), He
patent: 6105131 (2000-08-01), Carroll
patent: 6178511 (2001-01-01), Cohen et al.
patent: 6356941 (2002-03-01), Cohen
patent: 6405214 (2002-06-01), Meade, II
patent: 6438690 (2002-08-01), Patel et al.
patent: 6584505 (2003-06-01), Howard et al.
patent: 6606708 (2003-08-01), Devine et al.
patent: 6609198 (2003-08-01), Wood et al.
patent: 6629246 (2003-09-01), Gadi
patent: 6671808 (2003-12-01), Abbott et al.
patent: 6678731 (2004-01-01), Howard et al.
IBM Technical Bulletin, Customized Handling of application Errors under os/2, Apr. 1, 1992, vol. 34, pp. 459-461.
Schneier, Applied Crytography, 1996, John Wiley & Sons, Inc., Second Edition, 574-575.
Davies, Computer Networks and their Protocols, 1979, John Wiley & Sons, Inc., 355-374.
Schneier, B. “Applied Cryptography”, 1996, John Wiley and Sons, p. 59.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Technique for handling subsequent user identification and... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Technique for handling subsequent user identification and..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Technique for handling subsequent user identification and... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3511566

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.