ATE334438T1 - Verfahren und anordnungen zum kontrollierten zugang zu ressourcen basiert auf einem authentifizierungsverfahren - Google Patents

Verfahren und anordnungen zum kontrollierten zugang zu ressourcen basiert auf einem authentifizierungsverfahren

Info

Publication number
ATE334438T1
ATE334438T1 AT02008495T AT02008495T ATE334438T1 AT E334438 T1 ATE334438 T1 AT E334438T1 AT 02008495 T AT02008495 T AT 02008495T AT 02008495 T AT02008495 T AT 02008495T AT E334438 T1 ATE334438 T1 AT E334438T1
Authority
AT
Austria
Prior art keywords
arrangements
procedures
authentication process
resources based
controlled access
Prior art date
Application number
AT02008495T
Other languages
English (en)
Inventor
John E Brezak
Peter T Brundrett
Richard B Ward
Original Assignee
Microsoft Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Microsoft Corp filed Critical Microsoft Corp
Application granted granted Critical
Publication of ATE334438T1 publication Critical patent/ATE334438T1/de

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)
AT02008495T 2001-04-30 2002-04-15 Verfahren und anordnungen zum kontrollierten zugang zu ressourcen basiert auf einem authentifizierungsverfahren ATE334438T1 (de)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US09/846,175 US7305701B2 (en) 2001-04-30 2001-04-30 Methods and arrangements for controlling access to resources based on authentication method

Publications (1)

Publication Number Publication Date
ATE334438T1 true ATE334438T1 (de) 2006-08-15

Family

ID=25297148

Family Applications (1)

Application Number Title Priority Date Filing Date
AT02008495T ATE334438T1 (de) 2001-04-30 2002-04-15 Verfahren und anordnungen zum kontrollierten zugang zu ressourcen basiert auf einem authentifizierungsverfahren

Country Status (6)

Country Link
US (1) US7305701B2 (de)
EP (1) EP1255179B1 (de)
JP (1) JP4772256B2 (de)
AT (1) ATE334438T1 (de)
AU (1) AU785250B2 (de)
DE (1) DE60213314T2 (de)

Families Citing this family (45)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7035922B2 (en) * 2001-11-27 2006-04-25 Microsoft Corporation Non-invasive latency monitoring in a store-and-forward replication system
US7636937B1 (en) * 2002-01-11 2009-12-22 Cisco Technology, Inc. Method and apparatus for comparing access control lists for configuring a security policy on a network
JP2003304523A (ja) * 2002-02-08 2003-10-24 Ntt Docomo Inc 情報配信システム、情報配信方法、情報配信サーバ、コンテンツ配信サーバ及び端末
US7367044B2 (en) * 2002-06-14 2008-04-29 Clink Systems, Ltd. System and method for network operation
US20040054790A1 (en) * 2002-09-12 2004-03-18 International Business Machines Corporation Management of security objects controlling access to resources
US8117639B2 (en) 2002-10-10 2012-02-14 Rocksteady Technologies, Llc System and method for providing access control
US7587512B2 (en) 2002-10-16 2009-09-08 Eric White System and method for dynamic bandwidth provisioning
DE10249801B3 (de) * 2002-10-24 2004-05-06 Giesecke & Devrient Gmbh Verfahren zum Ausführen einer gesicherten elektronischen Transaktion unter Verwendung eines tragbaren Datenträgers
JP2004157892A (ja) 2002-11-08 2004-06-03 Hitachi Ltd 計算機システム、記憶装置、アクセス管理方法及びプログラム
AU2003293125A1 (en) * 2002-11-27 2004-06-23 Rsa Security Inc Identity authentication system and method
JP4639033B2 (ja) * 2003-01-29 2011-02-23 キヤノン株式会社 認証装置及び認証方法と認証プログラム
DE10307995B4 (de) * 2003-02-25 2008-02-07 Siemens Ag Verfahren zum Signieren von Daten
US7480798B2 (en) * 2003-06-05 2009-01-20 International Business Machines Corporation System and method for representing multiple security groups as a single data object
US7624438B2 (en) 2003-08-20 2009-11-24 Eric White System and method for providing a secure connection between networked computers
GB2408121B (en) * 2003-11-06 2006-03-15 Intuwave Ltd Secure multi-entity access to resources on mobile telephones
US8700533B2 (en) * 2003-12-04 2014-04-15 Black Duck Software, Inc. Authenticating licenses for legally-protectable content based on license profiles and content identifiers
US9489687B2 (en) * 2003-12-04 2016-11-08 Black Duck Software, Inc. Methods and systems for managing software development
US7552093B2 (en) * 2003-12-04 2009-06-23 Black Duck Software, Inc. Resolving license dependencies for aggregations of legally-protectable content
JP4665406B2 (ja) 2004-02-23 2011-04-06 日本電気株式会社 アクセス制御管理方法、アクセス制御管理システムおよびアクセス制御管理機能付き端末装置
DE602004010879T2 (de) * 2004-03-01 2008-12-11 Hitachi, Ltd. System zur Befehlsverwaltung durch einen Verwaltungsagent
US7665130B2 (en) 2004-03-10 2010-02-16 Eric White System and method for double-capture/double-redirect to a different location
US7509625B2 (en) 2004-03-10 2009-03-24 Eric White System and method for comprehensive code generation for system management
US7610621B2 (en) 2004-03-10 2009-10-27 Eric White System and method for behavior-based firewall modeling
US8543710B2 (en) 2004-03-10 2013-09-24 Rpx Corporation Method and system for controlling network access
US7590728B2 (en) 2004-03-10 2009-09-15 Eric White System and method for detection of aberrant network behavior by clients of a network access gateway
US8219807B1 (en) * 2004-12-17 2012-07-10 Novell, Inc. Fine grained access control for linux services
US8271785B1 (en) 2004-12-20 2012-09-18 Novell, Inc. Synthesized root privileges
US8214398B1 (en) 2005-02-16 2012-07-03 Emc Corporation Role based access controls
US7797245B2 (en) * 2005-03-18 2010-09-14 Black Duck Software, Inc. Methods and systems for identifying an area of interest in protectable content
US8887233B2 (en) * 2005-04-08 2014-11-11 Netapp, Inc. Cookie-based acceleration of an authentication protocol
US20060253534A1 (en) * 2005-05-09 2006-11-09 Milheron Patrick M Symmetric networking to support flexible teaching
US8074214B2 (en) 2005-05-19 2011-12-06 Oracle International Corporation System for creating a customized software installation on demand
US8352935B2 (en) 2005-05-19 2013-01-08 Novell, Inc. System for creating a customized software distribution based on user requirements
US7155213B1 (en) 2005-09-16 2006-12-26 James R. Almeda Remote control system
US8676973B2 (en) * 2006-03-07 2014-03-18 Novell Intellectual Property Holdings, Inc. Light-weight multi-user browser
US7730480B2 (en) * 2006-08-22 2010-06-01 Novell, Inc. System and method for creating a pattern installation by cloning software installed another computer
US7681045B2 (en) * 2006-10-12 2010-03-16 Black Duck Software, Inc. Software algorithm identification
US8010803B2 (en) 2006-10-12 2011-08-30 Black Duck Software, Inc. Methods and apparatus for automated export compliance
US8850553B2 (en) * 2008-09-12 2014-09-30 Microsoft Corporation Service binding
US20100299738A1 (en) * 2009-05-19 2010-11-25 Microsoft Corporation Claims-based authorization at an identity provider
US8312157B2 (en) * 2009-07-16 2012-11-13 Palo Alto Research Center Incorporated Implicit authentication
US8776204B2 (en) * 2010-03-12 2014-07-08 Alcatel Lucent Secure dynamic authority delegation
US9582673B2 (en) 2010-09-27 2017-02-28 Microsoft Technology Licensing, Llc Separation of duties checks from entitlement sets
US20120227098A1 (en) * 2011-03-03 2012-09-06 Microsoft Corporation Sharing user id between operating system and application
US9183361B2 (en) 2011-09-12 2015-11-10 Microsoft Technology Licensing, Llc Resource access authorization

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5414844A (en) * 1990-05-24 1995-05-09 International Business Machines Corporation Method and system for controlling public access to a plurality of data objects within a data processing system
US6163383A (en) * 1996-04-17 2000-12-19 Fuji Xerox Co., Ltd. Method for providing print output security in a multinetwork environment
US5787177A (en) * 1996-08-01 1998-07-28 Harris Corporation Integrated network security access control system
US6052468A (en) * 1998-01-15 2000-04-18 Dew Engineering And Development Limited Method of securing a cryptographic key
US6687823B1 (en) * 1999-05-05 2004-02-03 Sun Microsystems, Inc. Cryptographic authorization with prioritized and weighted authentication
US6711681B1 (en) * 1999-05-05 2004-03-23 Sun Microsystems, Inc. Cryptographic authorization with prioritized authentication
US6915426B1 (en) * 1999-07-23 2005-07-05 Networks Associates Technology, Inc. System and method for enabling authentication at different authentication strength-performance levels
US6609198B1 (en) * 1999-08-05 2003-08-19 Sun Microsystems, Inc. Log-on service providing credential level change without loss of session continuity
US7086085B1 (en) * 2000-04-11 2006-08-01 Bruce E Brown Variable trust levels for authentication
US6959336B2 (en) * 2001-04-07 2005-10-25 Secure Data In Motion, Inc. Method and system of federated authentication service for interacting between agent and client and communicating with other components of the system to choose an appropriate mechanism for the subject from among the plurality of authentication mechanisms wherein the subject is selected from humans, client applications and applets

Also Published As

Publication number Publication date
AU785250B2 (en) 2006-12-07
JP2003030149A (ja) 2003-01-31
EP1255179A3 (de) 2004-08-11
US7305701B2 (en) 2007-12-04
DE60213314T2 (de) 2007-04-19
AU3299402A (en) 2002-10-31
EP1255179A2 (de) 2002-11-06
DE60213314D1 (de) 2006-09-07
US20020162030A1 (en) 2002-10-31
EP1255179B1 (de) 2006-07-26
JP4772256B2 (ja) 2011-09-14

Similar Documents

Publication Publication Date Title
ATE334438T1 (de) Verfahren und anordnungen zum kontrollierten zugang zu ressourcen basiert auf einem authentifizierungsverfahren
CN106295388B (zh) 一种数据脱敏方法和装置
CA2735600C (en) System and method for detection of malware
RU2376628C2 (ru) Устройство обработки информации, носитель записи информации, способ обработки информации и компьютерная программа
US8732820B2 (en) Method for inputting usernames and passwords to access or use different assets
ATE522039T1 (de) Vorrichtung und verfahren zur verarbeitung von verschlüsselten daten
ATE388564T1 (de) Verfahren und systeme zur steuerung des umfangs der delegierung von authentifizierungsdaten
ATE282990T1 (de) System und verfahren zur biometrischen authentifizierung eines benutzers mit einer chipkarte
KR950020247A (ko) 정보요소, 요소 인터페이스, 식별요소 및 엑세스 승인방법
DE60236498D1 (de) Verfahren und vorrichtung zum tarnen von daten, informationen und funktionstransformationen
DE60214993D1 (de) Firewall zur dynamishen Zugangsgewährung und -verweigerung auf Netzwerkressourcen
EP2482222A3 (de) Programm für einen sicheren Prozessor
DK1285409T3 (da) Fremgangsmåde ved biometrisk identificering og autentificering
WO2001033390A3 (en) Method and apparatus for populating a form with data
DE60200081D1 (de) Sichere Benutzer- und Datenauthenifizierung über ein Kommunikationsnetzwerk
KR20060021816A (ko) 데이터 처리 방법, 데이터 처리 시스템 및 컴퓨터 판독가능 매체
JP2008242851A (ja) 認証印刷システム、認証印刷方法
GB2289965A (en) Secure personal indentification instument and method for creating same
TW200606861A (en) Information processor, information recording medium, information processing method, and computer program
EP1492106A3 (de) Verfahren und Vorrichtung zum Authentifizieren einer Datenverarbeitungsvorrichtung mit einem Aufzeichnungsgerät
ATE445216T1 (de) Aufzeichnungsmedium, konfigurationsverfahren für diesbezügliche steuerinformationen, aufzeichnungs-und wiedergabeverfahren und vorrichtung dafür
EP1380965A4 (de) Metadaten-erzeugungsvorrichtung und metadaten-erzeugungsverfahren
ATE369005T1 (de) Verteilen einer mediadatei mit meta-informationen
JP2002183095A5 (de)
CN1570962A (zh) 基于图形码子母印章族信息关联机制的软证件防伪方法

Legal Events

Date Code Title Description
RER Ceased as to paragraph 5 lit. 3 law introducing patent treaties