Verifying authenticity of an attribute value signature

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C709S229000

Reexamination Certificate

active

08046585

ABSTRACT:
A method and apparatus for verifying authenticity of a digital signature for an attribute value. In one embodiment, the method includes receiving a message including an attribute value of an attribute from a Lightweight Directory Access Protocol (LDAP) repository entry and a digital signature, and verifying that the digital signature authenticates the attribute value.

REFERENCES:
patent: 6336186 (2002-01-01), Dyksterhouse et al.
patent: 6339827 (2002-01-01), Stokes et al.
patent: 6564370 (2003-05-01), Hunt
patent: 6581093 (2003-06-01), Verma
patent: 6751797 (2004-06-01), Desgranges et al.
patent: 6892300 (2005-05-01), Carroll et al.
patent: 2003/0065921 (2003-04-01), Chang
patent: 2004/0064502 (2004-04-01), Yellepeddy et al.
patent: 2004/0064693 (2004-04-01), Pabla et al.
patent: 2005/0169476 (2005-08-01), Little et al.
patent: 2005/0228886 (2005-10-01), Cain et al.
Hassler, V., “X.500 and LDAP security: A Comparative Overview”, Network, IEEE; vol. 13, Issue 6, Publication Year 1999, pp. 54-64.
Alonso, J.M. et al., LDAP Injection Techniques, Communication Systems, 2008. ICCS 2008. 11thIEEE Singatpore International Conference on Publication, Year 2008, pp. 980-986.
Xudong Li et al., Research on LDAP Data Access Based on SDO, “Computational Intelligence and Software Engineering”, 2009, CiSE 2009, International Conference on Publication, Year 2009, pp. 1-4.
U.S. Appl. No. 11/756,545, Notice of Allowance dated Sep. 8, 2010, 8 pages.
Entrust, Technical Integration Guide for Red Hat Directory Server 7.1 and Entrust Authority Security Manager 7.1, Entrust Authority Roaming Server 6.0 and Entrust Entelligence Desktop Manager 7.0, Jul. 2005, 9 pages.
Knight, N., Managing Security with Group Policy and the Windows Server 2003 Group Policy Management Console Authored by: Norman Christopher-Knight Feb. 2003, 67 pages.
Red Hat Office Action for 11/756,545 mailed Jun. 7, 2010.
Red Hat Office Action for 11/756,553 mailed Jun. 24, 2010.
Red Hat Notice of Allowance for U.S. Appl. No. 11/756,553, mailed Oct. 15, 2010.
Red Hat Office Action for U.S. Appl. No. 11/756,553 mailed Dec. 8, 2010.
Red Hat Office Action for U.S. Appl. No. 11/756,545 mailed Dec. 15, 2010.
Red Hat Office Action for U.S. Appl. No. 11/756,545 mailed Oct. 18, 2010.
Alsubhi, K., et al., “Policy-Based Security Configuration Management, Application to Intrusion Detection and Prevention,” Communications, 2009, ICC '09 IEEE International Conference, Publication Year 2009, pp. 1-6.
Hsieh, G., et al., “Supporting Secure Embedded Access Control Policy with XACML+XML security,” Future Information Technology (FutureTech), 2010 5thInternational Conference, Publication Year: 2010, pp. 1-6.
Yong-Zhong, H., et al., “Server-aided digital signature protocol based on password,” Security Technology, 2005, CCST '05, 39thAnnual 2005 International Carnahan Conference, Publication Year: 2005, pp. 89-92.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Verifying authenticity of an attribute value signature does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Verifying authenticity of an attribute value signature, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Verifying authenticity of an attribute value signature will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4300992

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.