Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique
Reexamination Certificate
2007-05-31
2011-10-25
Gergiso, Techane (Department: 2437)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Particular communication authentication technique
C709S229000
Reexamination Certificate
active
08046585
ABSTRACT:
A method and apparatus for verifying authenticity of a digital signature for an attribute value. In one embodiment, the method includes receiving a message including an attribute value of an attribute from a Lightweight Directory Access Protocol (LDAP) repository entry and a digital signature, and verifying that the digital signature authenticates the attribute value.
REFERENCES:
patent: 6336186 (2002-01-01), Dyksterhouse et al.
patent: 6339827 (2002-01-01), Stokes et al.
patent: 6564370 (2003-05-01), Hunt
patent: 6581093 (2003-06-01), Verma
patent: 6751797 (2004-06-01), Desgranges et al.
patent: 6892300 (2005-05-01), Carroll et al.
patent: 2003/0065921 (2003-04-01), Chang
patent: 2004/0064502 (2004-04-01), Yellepeddy et al.
patent: 2004/0064693 (2004-04-01), Pabla et al.
patent: 2005/0169476 (2005-08-01), Little et al.
patent: 2005/0228886 (2005-10-01), Cain et al.
Hassler, V., “X.500 and LDAP security: A Comparative Overview”, Network, IEEE; vol. 13, Issue 6, Publication Year 1999, pp. 54-64.
Alonso, J.M. et al., LDAP Injection Techniques, Communication Systems, 2008. ICCS 2008. 11thIEEE Singatpore International Conference on Publication, Year 2008, pp. 980-986.
Xudong Li et al., Research on LDAP Data Access Based on SDO, “Computational Intelligence and Software Engineering”, 2009, CiSE 2009, International Conference on Publication, Year 2009, pp. 1-4.
U.S. Appl. No. 11/756,545, Notice of Allowance dated Sep. 8, 2010, 8 pages.
Entrust, Technical Integration Guide for Red Hat Directory Server 7.1 and Entrust Authority Security Manager 7.1, Entrust Authority Roaming Server 6.0 and Entrust Entelligence Desktop Manager 7.0, Jul. 2005, 9 pages.
Knight, N., Managing Security with Group Policy and the Windows Server 2003 Group Policy Management Console Authored by: Norman Christopher-Knight Feb. 2003, 67 pages.
Red Hat Office Action for 11/756,545 mailed Jun. 7, 2010.
Red Hat Office Action for 11/756,553 mailed Jun. 24, 2010.
Red Hat Notice of Allowance for U.S. Appl. No. 11/756,553, mailed Oct. 15, 2010.
Red Hat Office Action for U.S. Appl. No. 11/756,553 mailed Dec. 8, 2010.
Red Hat Office Action for U.S. Appl. No. 11/756,545 mailed Dec. 15, 2010.
Red Hat Office Action for U.S. Appl. No. 11/756,545 mailed Oct. 18, 2010.
Alsubhi, K., et al., “Policy-Based Security Configuration Management, Application to Intrusion Detection and Prevention,” Communications, 2009, ICC '09 IEEE International Conference, Publication Year 2009, pp. 1-6.
Hsieh, G., et al., “Supporting Secure Embedded Access Control Policy with XACML+XML security,” Future Information Technology (FutureTech), 2010 5thInternational Conference, Publication Year: 2010, pp. 1-6.
Yong-Zhong, H., et al., “Server-aided digital signature protocol based on password,” Security Technology, 2005, CCST '05, 39thAnnual 2005 International Carnahan Conference, Publication Year: 2005, pp. 89-92.
Gergiso Techane
Lowenstein & Sandler PC
Red Hat, Inc.
LandOfFree
Verifying authenticity of an attribute value signature does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Verifying authenticity of an attribute value signature, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Verifying authenticity of an attribute value signature will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4300992