Electrical computers and digital processing systems: support – System access control based on user identification by...
Reexamination Certificate
2005-08-23
2005-08-23
Barrón, Gilberto (Department: 2131)
Electrical computers and digital processing systems: support
System access control based on user identification by...
C713S152000, C713S156000, C713S185000, C707S793000, C705S065000
Reexamination Certificate
active
06934848
ABSTRACT:
The present invention provides a method, system, and computer program product for enabling a user to provide a single system sign-on for accessing one or more legacy host applications and/or one or more systems which provide legacy host data (such as legacy database systems) during a secure host access session which is authenticated using a digital certificate and is protected by a host-based security system, such as RACF (Resource Access Control Facility, a product offered by the IBM Corporation), where the same set of credentials must be provided more than once during the secure session. The subsequent provision of the credentials may be transparent to the user, and does not require change to existing legacy applications or systems.
REFERENCES:
patent: 5659616 (1997-08-01), Sudia
patent: 5684950 (1997-11-01), Dare et al.
patent: 5689566 (1997-11-01), Nguyen
patent: 5884312 (1999-03-01), Dustan et al.
patent: 5944824 (1999-08-01), He
patent: 6105131 (2000-08-01), Carroll
patent: 6178511 (2001-01-01), Cohen et al.
patent: 6356941 (2002-03-01), Cohen
patent: 6405214 (2002-06-01), Meade, II
patent: 6438690 (2002-08-01), Patel et al.
patent: 6584505 (2003-06-01), Howard et al.
patent: 6606708 (2003-08-01), Devine et al.
patent: 6609198 (2003-08-01), Wood et al.
patent: 6629246 (2003-09-01), Gadi
patent: 6671808 (2003-12-01), Abbott et al.
patent: 6678731 (2004-01-01), Howard et al.
IBM Technical Bulletin, Customized Handling of application Errors under os/2, Apr. 1, 1992, vol. 34, pp. 459-461.
Schneier, Applied Crytography, 1996, John Wiley & Sons, Inc., Second Edition, 574-575.
Davies, Computer Networks and their Protocols, 1979, John Wiley & Sons, Inc., 355-374.
Schneier, B. “Applied Cryptography”, 1996, John Wiley and Sons, p. 59.
King Julie H.
Kirkman Susan D.
Labrecque Daniel J.
Overby, Jr. Linwood H.
Pogue Steven Wayne
Arani Taghi T.
Barrón Gilberto
Doubet Marcia L.
Herndon Jerry W.
LandOfFree
Technique for handling subsequent user identification and... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Technique for handling subsequent user identification and..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Technique for handling subsequent user identification and... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3511566