ATE334438T1 - Verfahren und anordnungen zum kontrollierten zugang zu ressourcen basiert auf einem authentifizierungsverfahren - Google Patents

Verfahren und anordnungen zum kontrollierten zugang zu ressourcen basiert auf einem authentifizierungsverfahren

Info

Publication number
ATE334438T1
ATE334438T1 AT02008495T AT02008495T ATE334438T1 AT E334438 T1 ATE334438 T1 AT E334438T1 AT 02008495 T AT02008495 T AT 02008495T AT 02008495 T AT02008495 T AT 02008495T AT E334438 T1 ATE334438 T1 AT E334438T1
Authority
AT
Austria
Prior art keywords
arrangements
procedures
authentication process
resources based
controlled access
Prior art date
Application number
AT02008495T
Other languages
English (en)
Inventor
John E Brezak
Peter T Brundrett
Richard B Ward
Original Assignee
Microsoft Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Microsoft Corp filed Critical Microsoft Corp
Application granted granted Critical
Publication of ATE334438T1 publication Critical patent/ATE334438T1/de

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)
AT02008495T 2001-04-30 2002-04-15 Verfahren und anordnungen zum kontrollierten zugang zu ressourcen basiert auf einem authentifizierungsverfahren ATE334438T1 (de)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US09/846,175 US7305701B2 (en) 2001-04-30 2001-04-30 Methods and arrangements for controlling access to resources based on authentication method

Publications (1)

Publication Number Publication Date
ATE334438T1 true ATE334438T1 (de) 2006-08-15

Family

ID=25297148

Family Applications (1)

Application Number Title Priority Date Filing Date
AT02008495T ATE334438T1 (de) 2001-04-30 2002-04-15 Verfahren und anordnungen zum kontrollierten zugang zu ressourcen basiert auf einem authentifizierungsverfahren

Country Status (6)

Country Link
US (1) US7305701B2 (de)
EP (1) EP1255179B1 (de)
JP (1) JP4772256B2 (de)
AT (1) ATE334438T1 (de)
AU (1) AU785250B2 (de)
DE (1) DE60213314T2 (de)

Families Citing this family (45)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7035922B2 (en) * 2001-11-27 2006-04-25 Microsoft Corporation Non-invasive latency monitoring in a store-and-forward replication system
US7636937B1 (en) * 2002-01-11 2009-12-22 Cisco Technology, Inc. Method and apparatus for comparing access control lists for configuring a security policy on a network
JP2003304523A (ja) * 2002-02-08 2003-10-24 Ntt Docomo Inc 情報配信システム、情報配信方法、情報配信サーバ、コンテンツ配信サーバ及び端末
US7367044B2 (en) * 2002-06-14 2008-04-29 Clink Systems, Ltd. System and method for network operation
US20040054790A1 (en) * 2002-09-12 2004-03-18 International Business Machines Corporation Management of security objects controlling access to resources
US8117639B2 (en) 2002-10-10 2012-02-14 Rocksteady Technologies, Llc System and method for providing access control
US7587512B2 (en) 2002-10-16 2009-09-08 Eric White System and method for dynamic bandwidth provisioning
DE10249801B3 (de) * 2002-10-24 2004-05-06 Giesecke & Devrient Gmbh Verfahren zum Ausführen einer gesicherten elektronischen Transaktion unter Verwendung eines tragbaren Datenträgers
JP2004157892A (ja) 2002-11-08 2004-06-03 Hitachi Ltd 計算機システム、記憶装置、アクセス管理方法及びプログラム
US7502933B2 (en) * 2002-11-27 2009-03-10 Rsa Security Inc. Identity authentication system and method
JP4639033B2 (ja) * 2003-01-29 2011-02-23 キヤノン株式会社 認証装置及び認証方法と認証プログラム
DE10307995B4 (de) * 2003-02-25 2008-02-07 Siemens Ag Verfahren zum Signieren von Daten
US7480798B2 (en) * 2003-06-05 2009-01-20 International Business Machines Corporation System and method for representing multiple security groups as a single data object
US7624438B2 (en) 2003-08-20 2009-11-24 Eric White System and method for providing a secure connection between networked computers
WO2005046272A1 (en) * 2003-11-06 2005-05-19 Intuwave Limited Secure multi-entity access to resources on mobile telephones
US8700533B2 (en) * 2003-12-04 2014-04-15 Black Duck Software, Inc. Authenticating licenses for legally-protectable content based on license profiles and content identifiers
US9489687B2 (en) * 2003-12-04 2016-11-08 Black Duck Software, Inc. Methods and systems for managing software development
US7552093B2 (en) * 2003-12-04 2009-06-23 Black Duck Software, Inc. Resolving license dependencies for aggregations of legally-protectable content
JP4665406B2 (ja) 2004-02-23 2011-04-06 日本電気株式会社 アクセス制御管理方法、アクセス制御管理システムおよびアクセス制御管理機能付き端末装置
DE602004010879T2 (de) * 2004-03-01 2008-12-11 Hitachi, Ltd. System zur Befehlsverwaltung durch einen Verwaltungsagent
US7610621B2 (en) * 2004-03-10 2009-10-27 Eric White System and method for behavior-based firewall modeling
US7509625B2 (en) 2004-03-10 2009-03-24 Eric White System and method for comprehensive code generation for system management
US8543710B2 (en) 2004-03-10 2013-09-24 Rpx Corporation Method and system for controlling network access
US7665130B2 (en) 2004-03-10 2010-02-16 Eric White System and method for double-capture/double-redirect to a different location
US7590728B2 (en) 2004-03-10 2009-09-15 Eric White System and method for detection of aberrant network behavior by clients of a network access gateway
US8219807B1 (en) * 2004-12-17 2012-07-10 Novell, Inc. Fine grained access control for linux services
US8271785B1 (en) 2004-12-20 2012-09-18 Novell, Inc. Synthesized root privileges
US8214398B1 (en) 2005-02-16 2012-07-03 Emc Corporation Role based access controls
US7797245B2 (en) * 2005-03-18 2010-09-14 Black Duck Software, Inc. Methods and systems for identifying an area of interest in protectable content
US8887233B2 (en) * 2005-04-08 2014-11-11 Netapp, Inc. Cookie-based acceleration of an authentication protocol
US20060253534A1 (en) * 2005-05-09 2006-11-09 Milheron Patrick M Symmetric networking to support flexible teaching
US8074214B2 (en) 2005-05-19 2011-12-06 Oracle International Corporation System for creating a customized software installation on demand
US8352935B2 (en) 2005-05-19 2013-01-08 Novell, Inc. System for creating a customized software distribution based on user requirements
US7155213B1 (en) * 2005-09-16 2006-12-26 James R. Almeda Remote control system
US8676973B2 (en) * 2006-03-07 2014-03-18 Novell Intellectual Property Holdings, Inc. Light-weight multi-user browser
US7730480B2 (en) * 2006-08-22 2010-06-01 Novell, Inc. System and method for creating a pattern installation by cloning software installed another computer
US8010803B2 (en) 2006-10-12 2011-08-30 Black Duck Software, Inc. Methods and apparatus for automated export compliance
US7681045B2 (en) * 2006-10-12 2010-03-16 Black Duck Software, Inc. Software algorithm identification
US8850553B2 (en) * 2008-09-12 2014-09-30 Microsoft Corporation Service binding
US20100299738A1 (en) * 2009-05-19 2010-11-25 Microsoft Corporation Claims-based authorization at an identity provider
US8312157B2 (en) * 2009-07-16 2012-11-13 Palo Alto Research Center Incorporated Implicit authentication
US8776204B2 (en) * 2010-03-12 2014-07-08 Alcatel Lucent Secure dynamic authority delegation
US9582673B2 (en) 2010-09-27 2017-02-28 Microsoft Technology Licensing, Llc Separation of duties checks from entitlement sets
US20120227098A1 (en) * 2011-03-03 2012-09-06 Microsoft Corporation Sharing user id between operating system and application
US9183361B2 (en) 2011-09-12 2015-11-10 Microsoft Technology Licensing, Llc Resource access authorization

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5414844A (en) * 1990-05-24 1995-05-09 International Business Machines Corporation Method and system for controlling public access to a plurality of data objects within a data processing system
US6163383A (en) * 1996-04-17 2000-12-19 Fuji Xerox Co., Ltd. Method for providing print output security in a multinetwork environment
US5787177A (en) * 1996-08-01 1998-07-28 Harris Corporation Integrated network security access control system
US6052468A (en) * 1998-01-15 2000-04-18 Dew Engineering And Development Limited Method of securing a cryptographic key
US6711681B1 (en) * 1999-05-05 2004-03-23 Sun Microsystems, Inc. Cryptographic authorization with prioritized authentication
US6687823B1 (en) 1999-05-05 2004-02-03 Sun Microsystems, Inc. Cryptographic authorization with prioritized and weighted authentication
US6915426B1 (en) * 1999-07-23 2005-07-05 Networks Associates Technology, Inc. System and method for enabling authentication at different authentication strength-performance levels
US6609198B1 (en) * 1999-08-05 2003-08-19 Sun Microsystems, Inc. Log-on service providing credential level change without loss of session continuity
US7086085B1 (en) * 2000-04-11 2006-08-01 Bruce E Brown Variable trust levels for authentication
US6959336B2 (en) * 2001-04-07 2005-10-25 Secure Data In Motion, Inc. Method and system of federated authentication service for interacting between agent and client and communicating with other components of the system to choose an appropriate mechanism for the subject from among the plurality of authentication mechanisms wherein the subject is selected from humans, client applications and applets

Also Published As

Publication number Publication date
JP2003030149A (ja) 2003-01-31
EP1255179B1 (de) 2006-07-26
EP1255179A3 (de) 2004-08-11
AU785250B2 (en) 2006-12-07
DE60213314D1 (de) 2006-09-07
EP1255179A2 (de) 2002-11-06
AU3299402A (en) 2002-10-31
US7305701B2 (en) 2007-12-04
JP4772256B2 (ja) 2011-09-14
US20020162030A1 (en) 2002-10-31
DE60213314T2 (de) 2007-04-19

Similar Documents

Publication Publication Date Title
ATE334438T1 (de) Verfahren und anordnungen zum kontrollierten zugang zu ressourcen basiert auf einem authentifizierungsverfahren
CN106295388B (zh) 一种数据脱敏方法和装置
CA2735600C (en) System and method for detection of malware
ATE522039T1 (de) Vorrichtung und verfahren zur verarbeitung von verschlüsselten daten
CN100590634C (zh) 用于对用户进行身份验证的方法和装置
ATE469476T1 (de) Verfahren und vorrichtung zum tarnen von daten, informationen und funktionstransformationen
ATE282990T1 (de) System und verfahren zur biometrischen authentifizierung eines benutzers mit einer chipkarte
KR950020247A (ko) 정보요소, 요소 인터페이스, 식별요소 및 엑세스 승인방법
DE60317488D1 (de) Indexstruktur von metadaten, verfahren zum bereitstellen von indizes von metadaten und metadatensuchverfahren und vorrichtung, die die indizes von metadaten verwenden
WO2001033390A3 (en) Method and apparatus for populating a form with data
ID20227A (id) Perangkat dan metode penulisan pesan dalam kode, perangkat dan metode penguraian pesan dalam kode demikian juga perangkat dan metode pemrosesan informasi
WO2001077788A3 (en) Method and system for secure access_control
ATE536601T1 (de) Individuelles zertifikationsverfahren
PT1285409E (pt) Processo de identificacao ou autenticacao biometrico
DE60314871D1 (de) Verfahren zur authentifizierung eines anwenders bei einem zugang zu einem dienst eines diensteanbieters
DE60200081D1 (de) Sichere Benutzer- und Datenauthenifizierung über ein Kommunikationsnetzwerk
KR20060021816A (ko) 데이터 처리 방법, 데이터 처리 시스템 및 컴퓨터 판독가능 매체
JP2009246800A (ja) 暗号データ管理システム、および暗号データ管理方法
GB2289965A (en) Secure personal indentification instument and method for creating same
EP1492106A3 (de) Verfahren und Vorrichtung zum Authentifizieren einer Datenverarbeitungsvorrichtung mit einem Aufzeichnungsgerät
DE60213197D1 (de) Verfahren zur Aufstellung einer nutzbaren Infrastruktur mit öffentlichen Schlüsseln
WO2004034180A3 (en) Processes and systems for enabling secure and controlled distribution and use of information
EP1380965A4 (de) Metadaten-erzeugungsvorrichtung und metadaten-erzeugungsverfahren
RU2583759C1 (ru) Система контроля доступа к файлам на основе их автоматической разметки с размещением учетных данных субъекта доступа в создаваемом файле
CN1570962A (zh) 基于图形码子母印章族信息关联机制的软证件防伪方法

Legal Events

Date Code Title Description
RER Ceased as to paragraph 5 lit. 3 law introducing patent treaties