US7356704B2 - Aggregated authenticated identity apparatus for and method therefor - Google Patents
Aggregated authenticated identity apparatus for and method therefor Download PDFInfo
- Publication number
- US7356704B2 US7356704B2 US09/731,623 US73162300A US7356704B2 US 7356704 B2 US7356704 B2 US 7356704B2 US 73162300 A US73162300 A US 73162300A US 7356704 B2 US7356704 B2 US 7356704B2
- Authority
- US
- United States
- Prior art keywords
- security context
- user
- context
- access
- security
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime, expires
Links
- 238000000034 method Methods 0.000 title claims abstract description 25
- 230000004044 response Effects 0.000 claims abstract description 17
- 238000012545 processing Methods 0.000 abstract description 11
- 238000013475 authorization Methods 0.000 abstract description 8
- 230000004931 aggregating effect Effects 0.000 abstract description 2
- 239000002131 composite material Substances 0.000 abstract description 2
- 238000010586 diagram Methods 0.000 description 8
- 230000002776 aggregation Effects 0.000 description 5
- 238000004220 aggregation Methods 0.000 description 5
- 238000004590 computer program Methods 0.000 description 4
- 238000012423 maintenance Methods 0.000 description 3
- 230000007246 mechanism Effects 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 230000009471 action Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 230000004075 alteration Effects 0.000 description 1
- 230000003090 exacerbative effect Effects 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000000638 solvent extraction Methods 0.000 description 1
- 239000000126 substance Substances 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2119—Authenticating web pages, e.g. with suspicious links
Definitions
- the present invention relates in general to data processing systems, and in particular, to user authentication and access in a data processing system.
- a security context is a representation of the user's identity as well as any authorization information associated therewith.
- the context may include the user's identifier (user ID), the user's role, and group membership.
- FIG. 1 An illustrative security context 100 is schematically depicted in FIG. 1 .
- security context 100 has a user ID field 102 with the value “identitya,” a role field 104 containing the role of the user associated with identitya, here an Administrator denoted by the value “Admin,” and two group fields 106 A and 106 B indicating that the user associated with identitya is a member of two groups, denoted by the values TeamA, and Staff.
- the browser user now logged on, and associated with identitya, attempts to retrieve information from the web server. Based on the information in the security context, the web server determines whether the users request can be satisfied. If, for example the requested information can be accessed by any user in TeamA, then the request can be satisfied.
- An application or operating system may support a sequence of logons (which, particularly in directory server applications, may be referred to as binds) without requiring the user to log off before logging on again.
- an individual user may be associated with different identities (that is, user ID values) wherein a unique context is associated with each identity.
- identities that is, user ID values
- a System Administrator may have an identity which associates a security context in the role of System Administrator, and a second identity that associates a context with the user that includes roles as System Administrator and Printer Administrator.
- the access authorities available to the same user in the security context associated with the different identities need not be the same.
- the application or operating system may employ one of several alternatives when creating and destroying security context.
- a first alternative when the user logs on, and a security context is created, any pre-existing security context is destroyed. When the user logs off the security contest is destroyed.
- This alternative is typically used when logging into web and LDAP servers.
- LDAP refers to the Lightweight Directory Access Protocol, which is an open industry standard for accessing a directory, which is a particular database containing information describing attributes associated with users and resources on a network.
- the specifications for the LDAP Version 3 may be found in Request for Comments (RFC) 2251.
- An alternative model saves a pre-existing security context by, for example, pushing the context onto a stack, and a new security context created.
- the new security context is used to access resources.
- the new security context is destroyed, and the pre-existing security context is restored, that is, popped off the stack.
- This model is supported by, for example, the Distributed Computing Environment (DCE).
- DCE Distributed Computing Environment
- DCE is promulgated by the Open Software Foundation (OSF).
- OSF Open Software Foundation
- the user's access is determined by the current security context.
- the security policies may typically be established in a simple hierarchical structure, whereby each level of authorization includes all of the access rights granted by the authorization levels lower in the hierarchy. This may be understood by referring to FIG. 1B illustrating a hierarchical structure of access authority in Venn diagram form. In the exemplary hierarchical structure in FIG. 1B , four levels of authority are depicted.
- Level 108 may be associated with general user access authority.
- Level 110 may be associated with Printer Administrator access authority, which access authority includes all of the general user authority and additionally, authority necessary to perform the tasks associated with maintaining and configuring networked printer resources.
- Level 112 may correspond to the authorization level for a Network Administrator. In the hierarchical structure of FIG. 1B , these authorities would include the authorities granted general users as well as those granted the Printer Administrator and additionally the authorities required to perform the tasks associated with the management of the network generally.
- Level 114 may be associated with a System Administrator, which authorities include those of the general user, the Printer and Network Administrators, and additionally the authorities necessary to perform the tasks associated with management of the overall system.
- an authentication method in a first form, includes generating a first security context in response to a first user authentication.
- a second security context is generated in response to a second user authentication.
- the second security context aggregates the first security context and a security context corresponding to an identity in the second user authentication.
- a computer program product embodied in a tangible storage medium, the program product comprising a program of instructions for performing the method steps for an authentication method. Included are instructions for generating a first security context in response to a first user authentication. The instructions also perform the step of generating a second security context in response to a second user authentication, in which the second security context aggregates the first security context and a security context corresponding to an identity in the second user authentication.
- a data processing system including circuitry operable for generating a first security context in response to a first user authentication and circuitry operable for generating a second security context in response to a second user authentication.
- the second security context aggregates the first security context and a security context corresponding to an identity in the second user authentication.
- FIG. 1A schematically illustrates a security context which may be used in an embodiment of the present invention
- FIG. 1B illustrates in Venn diagram form, a hierarchical access authorization structure
- FIG. 2 illustrates, in block diagram form, a data processing system implemented in accordance with an embodiment of the present invention
- FIG. 3 illustrates, in flow chart form, a methodology in accordance with an embodiment of the present invention
- FIG. 4 schematically illustrates additional security context to which may be used in an embodiment of the present invention.
- FIG. 5 illustrates in Venn diagram form, a partioning of access authority which may be used in an embodiment of the present invention.
- the present invention provides a system and method for aggregating authenticated identities.
- a security context created in response to a first user logon is saved in response to a second logon.
- a composite or aggregate security context is created based on the identity passed in the second logon. Access may then be granted (or denied) based on the current, aggregated security context.
- the aggregate security context is destroyed, and the security context reverts to the context previously saved.
- all security contexts, including those on the stack may be destroyed.
- FIG. 2 an example is shown of a data processing system 200 which may be used for the invention.
- the system has a central processing unit (CPU) 210 , which is coupled to various other components by system bus 212 .
- Read only memory (“ROM”) 216 is coupled to the system bus 212 and includes a basic input/output system (“BIOS”) that controls certain basic functions of the data processing system 200 .
- RAM random access memory
- I/O adapter 218 may be a small computer system interface (“SCSI”) adapter that communicates with a disk storage device 220 .
- SCSI small computer system interface
- Communications adapter 234 interconnects bus 212 with an outside network enabling the data processing system to communicate with other such systems.
- Input/Output devices are also connected to system bus 212 via user interface adapter 222 and display adapter 236 .
- Keyboard 224 , track ball 232 , mouse 226 and speakers 228 are all interconnected to bus 212 via user interface adapter 222 .
- Display monitor 238 is connected to system bus 212 by display adapter 236 . In this manner, a user is capable of inputting to the system throughout the keyboard 224 , trackball 232 or mouse 226 .
- Preferred implementations of the invention include implementations as a computer system programmed to execute the method or methods described herein, and as a computer program product.
- sets of instructions for executing the method or methods are resident in the random access memory 214 of one or more computer systems configured generally as described above.
- the set of instructions may be stored as a computer program product in another computer memory, for example, in disk drive 220 (which may include a removable memory such as an optical disk or floppy disk for eventual use in the disk drive 220 ).
- the computer program product can also be stored at another computer and transmitted when desired to the user's work station by a network or by an external network such as the Internet.
- the physical storage of the sets of instructions physically changes the medium upon which it is stored so that the medium carries computer readable information.
- the change may be electrical, magnetic, chemical, biological, or some other physical change. While it is convenient to describe the invention in terms of instructions, symbols, characters, or the like, the reader should remember that all of these and similar terms should be associated with the appropriate physical elements.
- the invention may describe terms such as comparing, validating, selecting, identifying, or other terms that could be associated with a human operator.
- terms such as comparing, validating, selecting, identifying, or other terms that could be associated with a human operator.
- no action by a human operator is desirable.
- the operations described are, in large part, machine operations processing electrical signals to generate other electrical signals.
- step 302 it is determined if a user authentication has been received, that is if a user has requested a logon by submitting a user ID value and password value.
- a user ID value and password value may simply be referred to as submitting a user ID and password hereinbelow, however, the values will be referred to explicitly where the context requires.
- step 304 it is determined if security context aggregation is enabled. Aggregation may be enabled for a application/operating system in response to a predetermined set of policies. For example, if the policies permit the user to select the type of authentication, in an embodiment of system 200 , FIG. 2 , in which the operating system employs a graphical user interface (GUI), a dialog box may be presented displaying the fields for receiving the corresponding values: User ID, Password, and Aggregate identities? (Yes/No). Alternatively in an embodiment of system 100 using a command line interface (CLI), a command line “switch” maybe used.
- GUI graphical user interface
- step 304 if aggregation is enabled step 304 proceeds by the “Yes” branch.
- step 310 the current security context is saved.
- the current security context may be saved by pushing the current context onto a stack.
- step 312 the current security context is aggregated with a new security context based on the identity received as the value of the user ID in step 302 , and the aggregate current security context becomes the new security context.
- step 309 access is granted or denied in response to the new current security context from step 312 .
- Process 300 then proceeds loops over steps 302 and 314 - 16 logouts and authentications as discussed further below.
- FIG. 4 illustrating in schematic form, a security context 400 .
- the user has authenticated, in step 302 , FIG. 3 , with a userID of “indentityb,” and the security context associated therewith is security context 400 .
- Field 402 contains the userID of identityb, the role corresponding therewith, field 404 is Printer Administrator (“PrintAdmin”), and the group, field 406 , is “Maintenance.”
- PrintAdmin Printer Administrator
- the group, field 406 is “Maintenance.”
- the current security context corresponds to security context 100 , FIG. 1 .
- security context 100 is saved.
- the new security context becomes the aggregate of security context 100 , FIG.
- FIG. 4 also schematically illustrates security context 450 A, which may be the new security context.
- Field 452 contains the usernD of identityb.
- the roles associated with security context 450 A is field 454 with subfields 454 A and 454 B, respectively, Admin and PrintAdmin.
- security context 450 includes field 456 containing the groups TeamA, subfield 456 A, Staff, subfield 456 B and Maintenance, subfield 456 C.
- the user's identities may also be aggregated.
- a security context 450 B corresponding to such an embodiment is also schematically illustrated in FIG. 4 .
- Field 452 of security context 450 B has a subfields 452 A and 452 B containing identitya and identityb, respectively.
- security context 100 , FIG. 1 and security contexts 400 and 450 , FIG. 4 are for illustrative purposes only, and the principles of the present invention are applicable to security contexts having other, structural implementations and values contained in the fields therein.
- step 302 proceeds by the “No” branch to step 314 .
- step 314 it is determined if the user logs out. If not, methodology 300 loops between steps 314 and 302 to receive user authentication requests, or logout requests.
- step 314 if a logout is received, step 314 proceeds by the “Yes” branch, and in step 316 the current security context is destroyed. (An artisan of ordinary skill would understand that a security context may be “destroyed” by releasing, or freeing, the data structures maintaining the state of the security context, that is, freeing the portion of memory, such as RAM 214 , FIG. 2 , containing the data structures.)
- step 318 if aggregation has not been enabled, as discussed in conjunction with step 304 , process 300 returns to step 302 . Otherwise, step 318 proceeds via the “Yes” branch to step 320 , and the security context saved in step 310 is reverted to. Process 300 then returns to step 302 .
- step 314 Upon logoff of the user in the context of identityb, via step 314 , the current context, security context 450 , FIG. 4 is destroyed, via step 316 , FIG. 3 , and the previous context, saved via step 310 , FIG. 3 , is reverted to, by for example, popping the context off of a stack, via step 320 and the “Yes” branch of step 318 .
- an authentication mechanism is implemented which permits a user to selectively authenticate without necessarily giving up already established access.
- a user need not refer to a “human” user but may, for example, include a proxy server running under a user's identity.
- access authorizations may be have fine granularity, both vertically, that is, along organizational lines, and horizontally, that is, along functional lines, to reduce the opportunity for comprise of system security without increasing the inconvenience of multiple logon/logoff sequences.
- the partitioning of access authority need not be hierarchical, such as that illustrated in Venn diagram form in FIG. 1B .
- a Printer Administrator may have authorities not granted a System Administrator, wherein, the authorities may be disjoint, as illustrated in Venn diagram form in FIG. 5 , in which the set 502 (which may represent the set of System Administrator access authorities) does not include access authorities in set 504 (which may represent the set of System Administrator access authorities). Additionally, authorities may be partially disjoint, such a sets of authorities 506 and 508 , FIG. 5 .
- a System Administrator may be granted access to private personnel records, only for the purpose of backing up lost records due to a system failure, (which may, for example, be associated with a security context with a role of Admin and group of Maintenance) while a Human Resources Administrator may have access to not only back up records, but have access for reading and writing, generally.
- the common authority to back up lost records would be associated with the intersection 510 of sets 506 and 508 .
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims (8)
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/731,623 US7356704B2 (en) | 2000-12-07 | 2000-12-07 | Aggregated authenticated identity apparatus for and method therefor |
US11/950,007 US7694336B2 (en) | 2000-12-07 | 2007-12-04 | Aggregated authenticated identity apparatus for and method therefor |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/731,623 US7356704B2 (en) | 2000-12-07 | 2000-12-07 | Aggregated authenticated identity apparatus for and method therefor |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/950,007 Continuation US7694336B2 (en) | 2000-12-07 | 2007-12-04 | Aggregated authenticated identity apparatus for and method therefor |
Publications (2)
Publication Number | Publication Date |
---|---|
US20020073320A1 US20020073320A1 (en) | 2002-06-13 |
US7356704B2 true US7356704B2 (en) | 2008-04-08 |
Family
ID=24940290
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/731,623 Expired - Lifetime US7356704B2 (en) | 2000-12-07 | 2000-12-07 | Aggregated authenticated identity apparatus for and method therefor |
US11/950,007 Expired - Fee Related US7694336B2 (en) | 2000-12-07 | 2007-12-04 | Aggregated authenticated identity apparatus for and method therefor |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/950,007 Expired - Fee Related US7694336B2 (en) | 2000-12-07 | 2007-12-04 | Aggregated authenticated identity apparatus for and method therefor |
Country Status (1)
Country | Link |
---|---|
US (2) | US7356704B2 (en) |
Cited By (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050160068A1 (en) * | 2003-12-26 | 2005-07-21 | Canon Kabushiki Kaisha | Method and apparatus for processing data |
US20080281837A1 (en) * | 2007-05-10 | 2008-11-13 | Konica Minolta Business Technologies, Inc. | Image forming apparatus controlling use of medium inserted thereinto |
US20100017850A1 (en) * | 2008-07-21 | 2010-01-21 | Workshare Technology, Inc. | Methods and systems to fingerprint textual information using word runs |
US20100064347A1 (en) * | 2008-09-11 | 2010-03-11 | Workshare Technology, Inc. | Methods and systems for protect agents using distributed lightweight fingerprints |
US20100124354A1 (en) * | 2008-11-20 | 2010-05-20 | Workshare Technology, Inc. | Methods and systems for image fingerprinting |
US20100299727A1 (en) * | 2008-11-18 | 2010-11-25 | Workshare Technology, Inc. | Methods and systems for exact data match filtering |
US20100310078A1 (en) * | 2009-06-03 | 2010-12-09 | Electronics And Telecommunications Research Institute | System for user-centric identity management and method thereof |
US20110022960A1 (en) * | 2009-07-27 | 2011-01-27 | Workshare Technology, Inc. | Methods and systems for comparing presentation slide decks |
US20110320952A1 (en) * | 2010-06-23 | 2011-12-29 | Canon Kabushiki Kaisha | Network device capable of editing and configuring setting information, device controller, network system, and storage medium |
US9170990B2 (en) | 2013-03-14 | 2015-10-27 | Workshare Limited | Method and system for document retrieval with selective document comparison |
US9613340B2 (en) | 2011-06-14 | 2017-04-04 | Workshare Ltd. | Method and system for shared document approval |
US9948676B2 (en) | 2013-07-25 | 2018-04-17 | Workshare, Ltd. | System and method for securing documents prior to transmission |
US10025759B2 (en) | 2010-11-29 | 2018-07-17 | Workshare Technology, Inc. | Methods and systems for monitoring documents exchanged over email applications |
US10133723B2 (en) | 2014-12-29 | 2018-11-20 | Workshare Ltd. | System and method for determining document version geneology |
US10574729B2 (en) | 2011-06-08 | 2020-02-25 | Workshare Ltd. | System and method for cross platform document sharing |
US10783326B2 (en) | 2013-03-14 | 2020-09-22 | Workshare, Ltd. | System for tracking changes in a collaborative document editing environment |
US10880359B2 (en) | 2011-12-21 | 2020-12-29 | Workshare, Ltd. | System and method for cross platform document sharing |
US10911492B2 (en) | 2013-07-25 | 2021-02-02 | Workshare Ltd. | System and method for securing documents prior to transmission |
US10963584B2 (en) | 2011-06-08 | 2021-03-30 | Workshare Ltd. | Method and system for collaborative editing of a remotely stored document |
US11030163B2 (en) | 2011-11-29 | 2021-06-08 | Workshare, Ltd. | System for tracking and displaying changes in a set of related electronic documents |
US11182551B2 (en) | 2014-12-29 | 2021-11-23 | Workshare Ltd. | System and method for determining document version geneology |
US11567907B2 (en) | 2013-03-14 | 2023-01-31 | Workshare, Ltd. | Method and system for comparing document versions encoded in a hierarchical representation |
US11763013B2 (en) | 2015-08-07 | 2023-09-19 | Workshare, Ltd. | Transaction document management system and method |
Families Citing this family (71)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7941669B2 (en) * | 2001-01-03 | 2011-05-10 | American Express Travel Related Services Company, Inc. | Method and apparatus for enabling a user to select an authentication method |
US7552222B2 (en) * | 2001-10-18 | 2009-06-23 | Bea Systems, Inc. | Single system user identity |
US7260555B2 (en) | 2001-12-12 | 2007-08-21 | Guardian Data Storage, Llc | Method and architecture for providing pervasive security to digital assets |
US7930756B1 (en) | 2001-12-12 | 2011-04-19 | Crocker Steven Toye | Multi-level cryptographic transformations for securing digital assets |
US7178033B1 (en) | 2001-12-12 | 2007-02-13 | Pss Systems, Inc. | Method and apparatus for securing digital assets |
US7631184B2 (en) | 2002-05-14 | 2009-12-08 | Nicholas Ryan | System and method for imposing security on copies of secured items |
US7478418B2 (en) | 2001-12-12 | 2009-01-13 | Guardian Data Storage, Llc | Guaranteed delivery of changes to security policies in a distributed system |
US7921450B1 (en) | 2001-12-12 | 2011-04-05 | Klimenty Vainstein | Security system using indirect key generation from access rules and methods therefor |
US10360545B2 (en) | 2001-12-12 | 2019-07-23 | Guardian Data Storage, Llc | Method and apparatus for accessing secured electronic data off-line |
US7380120B1 (en) | 2001-12-12 | 2008-05-27 | Guardian Data Storage, Llc | Secured data format for access control |
US20030154381A1 (en) * | 2002-02-12 | 2003-08-14 | Pervasive Security Systems, Inc. | Managing file access via a designated place |
US8065713B1 (en) | 2001-12-12 | 2011-11-22 | Klimenty Vainstein | System and method for providing multi-location access management to secured items |
US8006280B1 (en) | 2001-12-12 | 2011-08-23 | Hildebrand Hal S | Security system for generating keys from access rules in a decentralized manner and methods therefor |
US7562232B2 (en) * | 2001-12-12 | 2009-07-14 | Patrick Zuili | System and method for providing manageability to security information for secured items |
US7921288B1 (en) | 2001-12-12 | 2011-04-05 | Hildebrand Hal S | System and method for providing different levels of key security for controlling access to secured items |
US7681034B1 (en) | 2001-12-12 | 2010-03-16 | Chang-Ping Lee | Method and apparatus for securing electronic data |
US7783765B2 (en) * | 2001-12-12 | 2010-08-24 | Hildebrand Hal S | System and method for providing distributed access control to secured documents |
US7921284B1 (en) | 2001-12-12 | 2011-04-05 | Gary Mark Kinghorn | Method and system for protecting electronic data in enterprise environment |
US7565683B1 (en) | 2001-12-12 | 2009-07-21 | Weiqing Huang | Method and system for implementing changes to security policies in a distributed security system |
US10033700B2 (en) | 2001-12-12 | 2018-07-24 | Intellectual Ventures I Llc | Dynamic evaluation of access rights |
USRE41546E1 (en) | 2001-12-12 | 2010-08-17 | Klimenty Vainstein | Method and system for managing security tiers |
US7950066B1 (en) | 2001-12-21 | 2011-05-24 | Guardian Data Storage, Llc | Method and system for restricting use of a clipboard application |
US8176334B2 (en) | 2002-09-30 | 2012-05-08 | Guardian Data Storage, Llc | Document security system that permits external users to gain access to secured files |
JP3680034B2 (en) * | 2002-03-20 | 2005-08-10 | 株式会社東芝 | Information processing apparatus and user switching method used in the same apparatus |
US8613102B2 (en) | 2004-03-30 | 2013-12-17 | Intellectual Ventures I Llc | Method and system for providing document retention using cryptography |
US7356711B1 (en) | 2002-05-30 | 2008-04-08 | Microsoft Corporation | Secure registration |
US7512810B1 (en) | 2002-09-11 | 2009-03-31 | Guardian Data Storage Llc | Method and system for protecting encrypted files transmitted over a network |
US7836310B1 (en) | 2002-11-01 | 2010-11-16 | Yevgeniy Gutnik | Security system that uses indirect password-based encryption |
US7577838B1 (en) | 2002-12-20 | 2009-08-18 | Alain Rossmann | Hybrid systems for securing digital assets |
US7890990B1 (en) | 2002-12-20 | 2011-02-15 | Klimenty Vainstein | Security system with staging capabilities |
US20040250125A1 (en) * | 2003-05-22 | 2004-12-09 | International Business Machines Corporation | Security context maintenance within a distributed environment |
US8707034B1 (en) | 2003-05-30 | 2014-04-22 | Intellectual Ventures I Llc | Method and system for using remote headers to secure electronic files |
US7730543B1 (en) | 2003-06-30 | 2010-06-01 | Satyajit Nath | Method and system for enabling users of a group shared across multiple file security systems to access secured files |
US7555558B1 (en) | 2003-08-15 | 2009-06-30 | Michael Frederick Kenrich | Method and system for fault-tolerant transfer of files across a network |
US20060266157A1 (en) * | 2003-09-05 | 2006-11-30 | Dai Nippon Toryo Co., Ltd. | Metal fine particles, composition containing the same, and production method for producing metal fine particles |
US8127366B2 (en) | 2003-09-30 | 2012-02-28 | Guardian Data Storage, Llc | Method and apparatus for transitioning between states of security policies used to secure electronic documents |
US7703140B2 (en) | 2003-09-30 | 2010-04-20 | Guardian Data Storage, Llc | Method and system for securing digital assets using process-driven security policies |
US7707427B1 (en) | 2004-07-19 | 2010-04-27 | Michael Frederick Kenrich | Multi-level file digests |
US8079079B2 (en) * | 2005-06-29 | 2011-12-13 | Microsoft Corporation | Multimodal authentication |
JP4682781B2 (en) * | 2005-09-30 | 2011-05-11 | ブラザー工業株式会社 | Multifunctional peripheral device and multifunctional peripheral device control program |
US8024770B2 (en) * | 2006-06-21 | 2011-09-20 | Microsoft Corporation | Techniques for managing security contexts |
US8141140B2 (en) * | 2008-05-23 | 2012-03-20 | Hsbc Technologies Inc. | Methods and systems for single sign on with dynamic authentication levels |
US9083689B2 (en) | 2012-12-28 | 2015-07-14 | Nok Nok Labs, Inc. | System and method for implementing privacy classes within an authentication framework |
US9172687B2 (en) * | 2012-12-28 | 2015-10-27 | Nok Nok Labs, Inc. | Query system and method to determine authentication capabilities |
US9015482B2 (en) | 2012-12-28 | 2015-04-21 | Nok Nok Labs, Inc. | System and method for efficiently enrolling, registering, and authenticating with multiple authentication devices |
US9306754B2 (en) | 2012-12-28 | 2016-04-05 | Nok Nok Labs, Inc. | System and method for implementing transaction signing within an authentication framework |
US9219732B2 (en) | 2012-12-28 | 2015-12-22 | Nok Nok Labs, Inc. | System and method for processing random challenges within an authentication framework |
JP6363325B2 (en) | 2013-01-31 | 2018-07-25 | ブラザー工業株式会社 | Image processing apparatus and image processing system |
US10270748B2 (en) | 2013-03-22 | 2019-04-23 | Nok Nok Labs, Inc. | Advanced authentication techniques and applications |
US9367676B2 (en) | 2013-03-22 | 2016-06-14 | Nok Nok Labs, Inc. | System and method for confirming location using supplemental sensor and/or location data |
US9887983B2 (en) | 2013-10-29 | 2018-02-06 | Nok Nok Labs, Inc. | Apparatus and method for implementing composite authenticators |
US9961077B2 (en) | 2013-05-30 | 2018-05-01 | Nok Nok Labs, Inc. | System and method for biometric authentication with device attestation |
WO2014202718A1 (en) * | 2013-06-20 | 2014-12-24 | Sms Passcode A/S | Method and system protecting against identity theft or replication abuse |
US9577999B1 (en) | 2014-05-02 | 2017-02-21 | Nok Nok Labs, Inc. | Enhanced security for registration of authentication devices |
US9654469B1 (en) | 2014-05-02 | 2017-05-16 | Nok Nok Labs, Inc. | Web-based user authentication techniques and applications |
US10148630B2 (en) | 2014-07-31 | 2018-12-04 | Nok Nok Labs, Inc. | System and method for implementing a hosted authentication service |
US9749131B2 (en) | 2014-07-31 | 2017-08-29 | Nok Nok Labs, Inc. | System and method for implementing a one-time-password using asymmetric cryptography |
US9875347B2 (en) | 2014-07-31 | 2018-01-23 | Nok Nok Labs, Inc. | System and method for performing authentication using data analytics |
US9736154B2 (en) | 2014-09-16 | 2017-08-15 | Nok Nok Labs, Inc. | System and method for integrating an authentication service within a network architecture |
US10482231B1 (en) * | 2015-09-22 | 2019-11-19 | Amazon Technologies, Inc. | Context-based access controls |
US9875373B2 (en) * | 2015-09-28 | 2018-01-23 | International Business Machines Corporation | Prioritization of users during disaster recovery |
US10637853B2 (en) | 2016-08-05 | 2020-04-28 | Nok Nok Labs, Inc. | Authentication techniques including speech and/or lip movement analysis |
US10769635B2 (en) | 2016-08-05 | 2020-09-08 | Nok Nok Labs, Inc. | Authentication techniques including speech and/or lip movement analysis |
US10237070B2 (en) | 2016-12-31 | 2019-03-19 | Nok Nok Labs, Inc. | System and method for sharing keys across authenticators |
US10091195B2 (en) | 2016-12-31 | 2018-10-02 | Nok Nok Labs, Inc. | System and method for bootstrapping a user binding |
US11868995B2 (en) | 2017-11-27 | 2024-01-09 | Nok Nok Labs, Inc. | Extending a secure key storage for transaction confirmation and cryptocurrency |
US11831409B2 (en) | 2018-01-12 | 2023-11-28 | Nok Nok Labs, Inc. | System and method for binding verifiable claims |
US11196733B2 (en) * | 2018-02-08 | 2021-12-07 | Dell Products L.P. | System and method for group of groups single sign-on demarcation based on first user login |
US12041039B2 (en) | 2019-02-28 | 2024-07-16 | Nok Nok Labs, Inc. | System and method for endorsing a new authenticator |
US11792024B2 (en) | 2019-03-29 | 2023-10-17 | Nok Nok Labs, Inc. | System and method for efficient challenge-response authentication |
US12126613B2 (en) | 2021-09-17 | 2024-10-22 | Nok Nok Labs, Inc. | System and method for pre-registration of FIDO authenticators |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5655077A (en) | 1994-12-13 | 1997-08-05 | Microsoft Corporation | Method and system for authenticating access to heterogeneous computing services |
US5740361A (en) | 1996-06-03 | 1998-04-14 | Compuserve Incorporated | System for remote pass-phrase authentication |
US5774551A (en) * | 1995-08-07 | 1998-06-30 | Sun Microsystems, Inc. | Pluggable account management interface with unified login and logout and multiple user authentication services |
WO1998050843A1 (en) | 1997-05-02 | 1998-11-12 | Network Associates, Inc. | Process-level data security system |
US6035406A (en) * | 1997-04-02 | 2000-03-07 | Quintet, Inc. | Plurality-factor security system |
US6105132A (en) | 1997-02-20 | 2000-08-15 | Novell, Inc. | Computer network graded authentication system and method |
US6496937B1 (en) * | 1998-01-13 | 2002-12-17 | Nec Corp. | Password updating apparatus and recording medium used therefor |
-
2000
- 2000-12-07 US US09/731,623 patent/US7356704B2/en not_active Expired - Lifetime
-
2007
- 2007-12-04 US US11/950,007 patent/US7694336B2/en not_active Expired - Fee Related
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5655077A (en) | 1994-12-13 | 1997-08-05 | Microsoft Corporation | Method and system for authenticating access to heterogeneous computing services |
US5774551A (en) * | 1995-08-07 | 1998-06-30 | Sun Microsystems, Inc. | Pluggable account management interface with unified login and logout and multiple user authentication services |
US5740361A (en) | 1996-06-03 | 1998-04-14 | Compuserve Incorporated | System for remote pass-phrase authentication |
US6105132A (en) | 1997-02-20 | 2000-08-15 | Novell, Inc. | Computer network graded authentication system and method |
US6035406A (en) * | 1997-04-02 | 2000-03-07 | Quintet, Inc. | Plurality-factor security system |
WO1998050843A1 (en) | 1997-05-02 | 1998-11-12 | Network Associates, Inc. | Process-level data security system |
US6496937B1 (en) * | 1998-01-13 | 2002-12-17 | Nec Corp. | Password updating apparatus and recording medium used therefor |
Non-Patent Citations (1)
Title |
---|
John Savill "Where can I find a Unix su (substitute user) like utility?" InstantDoc #15120 (Dec. 10, 1999). * |
Cited By (41)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050160068A1 (en) * | 2003-12-26 | 2005-07-21 | Canon Kabushiki Kaisha | Method and apparatus for processing data |
US8011011B2 (en) * | 2003-12-26 | 2011-08-30 | Canon Kabushiki Kaisha | Method and apparatus for processing data |
US7945588B2 (en) * | 2007-05-10 | 2011-05-17 | Konica Minolta Business Technologies, Inc. | Image forming apparatus controlling use of medium inserted thereinto |
US20080281837A1 (en) * | 2007-05-10 | 2008-11-13 | Konica Minolta Business Technologies, Inc. | Image forming apparatus controlling use of medium inserted thereinto |
US9473512B2 (en) | 2008-07-21 | 2016-10-18 | Workshare Technology, Inc. | Methods and systems to implement fingerprint lookups across remote agents |
US8286171B2 (en) | 2008-07-21 | 2012-10-09 | Workshare Technology, Inc. | Methods and systems to fingerprint textual information using word runs |
US9614813B2 (en) | 2008-07-21 | 2017-04-04 | Workshare Technology, Inc. | Methods and systems to implement fingerprint lookups across remote agents |
US20100017850A1 (en) * | 2008-07-21 | 2010-01-21 | Workshare Technology, Inc. | Methods and systems to fingerprint textual information using word runs |
US20100064372A1 (en) * | 2008-07-21 | 2010-03-11 | Workshare Technology, Inc. | Methods and systems to implement fingerprint lookups across remote agents |
US8555080B2 (en) * | 2008-09-11 | 2013-10-08 | Workshare Technology, Inc. | Methods and systems for protect agents using distributed lightweight fingerprints |
US20100064347A1 (en) * | 2008-09-11 | 2010-03-11 | Workshare Technology, Inc. | Methods and systems for protect agents using distributed lightweight fingerprints |
US10963578B2 (en) | 2008-11-18 | 2021-03-30 | Workshare Technology, Inc. | Methods and systems for preventing transmission of sensitive data from a remote computer device |
US20100299727A1 (en) * | 2008-11-18 | 2010-11-25 | Workshare Technology, Inc. | Methods and systems for exact data match filtering |
US9092636B2 (en) | 2008-11-18 | 2015-07-28 | Workshare Technology, Inc. | Methods and systems for exact data match filtering |
US20100124354A1 (en) * | 2008-11-20 | 2010-05-20 | Workshare Technology, Inc. | Methods and systems for image fingerprinting |
US8406456B2 (en) | 2008-11-20 | 2013-03-26 | Workshare Technology, Inc. | Methods and systems for image fingerprinting |
US8620020B2 (en) | 2008-11-20 | 2013-12-31 | Workshare Technology, Inc. | Methods and systems for preventing unauthorized disclosure of secure information using image fingerprinting |
US8670600B2 (en) | 2008-11-20 | 2014-03-11 | Workshare Technology, Inc. | Methods and systems for image fingerprinting |
US20100310078A1 (en) * | 2009-06-03 | 2010-12-09 | Electronics And Telecommunications Research Institute | System for user-centric identity management and method thereof |
US8473847B2 (en) | 2009-07-27 | 2013-06-25 | Workshare Technology, Inc. | Methods and systems for comparing presentation slide decks |
US20110022960A1 (en) * | 2009-07-27 | 2011-01-27 | Workshare Technology, Inc. | Methods and systems for comparing presentation slide decks |
US20110320952A1 (en) * | 2010-06-23 | 2011-12-29 | Canon Kabushiki Kaisha | Network device capable of editing and configuring setting information, device controller, network system, and storage medium |
US10025759B2 (en) | 2010-11-29 | 2018-07-17 | Workshare Technology, Inc. | Methods and systems for monitoring documents exchanged over email applications |
US11042736B2 (en) | 2010-11-29 | 2021-06-22 | Workshare Technology, Inc. | Methods and systems for monitoring documents exchanged over computer networks |
US10445572B2 (en) | 2010-11-29 | 2019-10-15 | Workshare Technology, Inc. | Methods and systems for monitoring documents exchanged over email applications |
US10963584B2 (en) | 2011-06-08 | 2021-03-30 | Workshare Ltd. | Method and system for collaborative editing of a remotely stored document |
US11386394B2 (en) | 2011-06-08 | 2022-07-12 | Workshare, Ltd. | Method and system for shared document approval |
US10574729B2 (en) | 2011-06-08 | 2020-02-25 | Workshare Ltd. | System and method for cross platform document sharing |
US9613340B2 (en) | 2011-06-14 | 2017-04-04 | Workshare Ltd. | Method and system for shared document approval |
US11030163B2 (en) | 2011-11-29 | 2021-06-08 | Workshare, Ltd. | System for tracking and displaying changes in a set of related electronic documents |
US10880359B2 (en) | 2011-12-21 | 2020-12-29 | Workshare, Ltd. | System and method for cross platform document sharing |
US10783326B2 (en) | 2013-03-14 | 2020-09-22 | Workshare, Ltd. | System for tracking changes in a collaborative document editing environment |
US9170990B2 (en) | 2013-03-14 | 2015-10-27 | Workshare Limited | Method and system for document retrieval with selective document comparison |
US12038885B2 (en) | 2013-03-14 | 2024-07-16 | Workshare, Ltd. | Method and system for document versions encoded in a hierarchical representation |
US11341191B2 (en) | 2013-03-14 | 2022-05-24 | Workshare Ltd. | Method and system for document retrieval with selective document comparison |
US11567907B2 (en) | 2013-03-14 | 2023-01-31 | Workshare, Ltd. | Method and system for comparing document versions encoded in a hierarchical representation |
US10911492B2 (en) | 2013-07-25 | 2021-02-02 | Workshare Ltd. | System and method for securing documents prior to transmission |
US9948676B2 (en) | 2013-07-25 | 2018-04-17 | Workshare, Ltd. | System and method for securing documents prior to transmission |
US10133723B2 (en) | 2014-12-29 | 2018-11-20 | Workshare Ltd. | System and method for determining document version geneology |
US11182551B2 (en) | 2014-12-29 | 2021-11-23 | Workshare Ltd. | System and method for determining document version geneology |
US11763013B2 (en) | 2015-08-07 | 2023-09-19 | Workshare, Ltd. | Transaction document management system and method |
Also Published As
Publication number | Publication date |
---|---|
US20080104697A1 (en) | 2008-05-01 |
US7694336B2 (en) | 2010-04-06 |
US20020073320A1 (en) | 2002-06-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7356704B2 (en) | Aggregated authenticated identity apparatus for and method therefor | |
US6243816B1 (en) | Single sign-on (SSO) mechanism personal key manager | |
US7117529B1 (en) | Identification and authentication management | |
EP2238711B1 (en) | Selective authorization based on authentication input attributes | |
KR100920871B1 (en) | Methods and systems for authentication of a user for sub-locations of a network location | |
EP1255179B1 (en) | Methods and arrangements for controlling access to resources based on authentication method | |
US7231661B1 (en) | Authorization services with external authentication | |
US8463819B2 (en) | Centralized enterprise security policy framework | |
US6910041B2 (en) | Authorization model for administration | |
US7630974B2 (en) | Multi-language support for enterprise identity and access management | |
US20060259960A1 (en) | Server, method and program product for management of password policy information | |
US20020078386A1 (en) | Incorporating password change policy into a single sign-on environment | |
US9077704B2 (en) | Multiple authentication support in a shared environment | |
US20020091745A1 (en) | Localized access | |
US20040162997A1 (en) | Systems and methods for integrating access control with a namespace | |
US20070169174A1 (en) | User authentication for computer systems | |
US20110145915A1 (en) | Method for managing authentication procedures for a user | |
US7647628B2 (en) | Authentication to a second application using credentials authenticated to a first application | |
CN110417820A (en) | Processing method, device and the readable storage medium storing program for executing of single-node login system | |
CN101208702A (en) | Computer-Enforced Authentication and Authorization Architecture | |
JP2017033339A (en) | Service provision system, information processing device, program and service use information creation method | |
KR20060048819A (en) | Method and system for controlling access to trusted network nodes | |
EP4084401A1 (en) | Method and apparatus for securely managing computer process access to network resources through delegated system credentials | |
US20080229396A1 (en) | Issuing a command and multiple user credentials to a remote system | |
JP2006119719A (en) | Computer system and user authentication method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FEPP | Fee payment procedure |
Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
FPAY | Fee payment |
Year of fee payment: 8 |
|
AS | Assignment |
Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:RINKEVICH, DEBORA;GARRISON, JOHN MICHAEL;REEL/FRAME:049713/0647 Effective date: 20001204 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 12TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1553); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 12 |