ATE334438T1 - Verfahren und anordnungen zum kontrollierten zugang zu ressourcen basiert auf einem authentifizierungsverfahren - Google Patents
Verfahren und anordnungen zum kontrollierten zugang zu ressourcen basiert auf einem authentifizierungsverfahrenInfo
- Publication number
- ATE334438T1 ATE334438T1 AT02008495T AT02008495T ATE334438T1 AT E334438 T1 ATE334438 T1 AT E334438T1 AT 02008495 T AT02008495 T AT 02008495T AT 02008495 T AT02008495 T AT 02008495T AT E334438 T1 ATE334438 T1 AT E334438T1
- Authority
- AT
- Austria
- Prior art keywords
- arrangements
- procedures
- authentication process
- resources based
- controlled access
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Databases & Information Systems (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US09/846,175 US7305701B2 (en) | 2001-04-30 | 2001-04-30 | Methods and arrangements for controlling access to resources based on authentication method |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| ATE334438T1 true ATE334438T1 (de) | 2006-08-15 |
Family
ID=25297148
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| AT02008495T ATE334438T1 (de) | 2001-04-30 | 2002-04-15 | Verfahren und anordnungen zum kontrollierten zugang zu ressourcen basiert auf einem authentifizierungsverfahren |
Country Status (6)
| Country | Link |
|---|---|
| US (1) | US7305701B2 (https=) |
| EP (1) | EP1255179B1 (https=) |
| JP (1) | JP4772256B2 (https=) |
| AT (1) | ATE334438T1 (https=) |
| AU (1) | AU785250B2 (https=) |
| DE (1) | DE60213314T2 (https=) |
Families Citing this family (45)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7035922B2 (en) * | 2001-11-27 | 2006-04-25 | Microsoft Corporation | Non-invasive latency monitoring in a store-and-forward replication system |
| US7636937B1 (en) * | 2002-01-11 | 2009-12-22 | Cisco Technology, Inc. | Method and apparatus for comparing access control lists for configuring a security policy on a network |
| JP2003304523A (ja) * | 2002-02-08 | 2003-10-24 | Ntt Docomo Inc | 情報配信システム、情報配信方法、情報配信サーバ、コンテンツ配信サーバ及び端末 |
| US7367044B2 (en) * | 2002-06-14 | 2008-04-29 | Clink Systems, Ltd. | System and method for network operation |
| US20040054790A1 (en) * | 2002-09-12 | 2004-03-18 | International Business Machines Corporation | Management of security objects controlling access to resources |
| US8117639B2 (en) | 2002-10-10 | 2012-02-14 | Rocksteady Technologies, Llc | System and method for providing access control |
| WO2004036371A2 (en) | 2002-10-16 | 2004-04-29 | Rocksteady Networks, Inc. | System and method for dynamic bandwidth provisioning |
| DE10249801B3 (de) * | 2002-10-24 | 2004-05-06 | Giesecke & Devrient Gmbh | Verfahren zum Ausführen einer gesicherten elektronischen Transaktion unter Verwendung eines tragbaren Datenträgers |
| JP2004157892A (ja) | 2002-11-08 | 2004-06-03 | Hitachi Ltd | 計算機システム、記憶装置、アクセス管理方法及びプログラム |
| JP2006508471A (ja) * | 2002-11-27 | 2006-03-09 | アールエスエイ セキュリティー インク | 識別認証システムおよび方法 |
| JP4639033B2 (ja) * | 2003-01-29 | 2011-02-23 | キヤノン株式会社 | 認証装置及び認証方法と認証プログラム |
| DE10307995B4 (de) * | 2003-02-25 | 2008-02-07 | Siemens Ag | Verfahren zum Signieren von Daten |
| US7480798B2 (en) * | 2003-06-05 | 2009-01-20 | International Business Machines Corporation | System and method for representing multiple security groups as a single data object |
| US7624438B2 (en) | 2003-08-20 | 2009-11-24 | Eric White | System and method for providing a secure connection between networked computers |
| US20070254631A1 (en) * | 2003-11-06 | 2007-11-01 | Intuwave Limited | Secure Multi-Entity Access to Resources on Mobile Telephones |
| US9489687B2 (en) * | 2003-12-04 | 2016-11-08 | Black Duck Software, Inc. | Methods and systems for managing software development |
| US8700533B2 (en) * | 2003-12-04 | 2014-04-15 | Black Duck Software, Inc. | Authenticating licenses for legally-protectable content based on license profiles and content identifiers |
| US7552093B2 (en) * | 2003-12-04 | 2009-06-23 | Black Duck Software, Inc. | Resolving license dependencies for aggregations of legally-protectable content |
| JP4665406B2 (ja) * | 2004-02-23 | 2011-04-06 | 日本電気株式会社 | アクセス制御管理方法、アクセス制御管理システムおよびアクセス制御管理機能付き端末装置 |
| EP1571797B1 (en) * | 2004-03-01 | 2007-12-26 | Hitachi, Ltd. | Command processing system by a management agent |
| US7665130B2 (en) | 2004-03-10 | 2010-02-16 | Eric White | System and method for double-capture/double-redirect to a different location |
| US7590728B2 (en) | 2004-03-10 | 2009-09-15 | Eric White | System and method for detection of aberrant network behavior by clients of a network access gateway |
| US7509625B2 (en) | 2004-03-10 | 2009-03-24 | Eric White | System and method for comprehensive code generation for system management |
| US7610621B2 (en) | 2004-03-10 | 2009-10-27 | Eric White | System and method for behavior-based firewall modeling |
| US8543710B2 (en) | 2004-03-10 | 2013-09-24 | Rpx Corporation | Method and system for controlling network access |
| US8219807B1 (en) * | 2004-12-17 | 2012-07-10 | Novell, Inc. | Fine grained access control for linux services |
| US8271785B1 (en) | 2004-12-20 | 2012-09-18 | Novell, Inc. | Synthesized root privileges |
| US7490072B1 (en) | 2005-02-16 | 2009-02-10 | Novell, Inc. | Providing access controls |
| US7797245B2 (en) * | 2005-03-18 | 2010-09-14 | Black Duck Software, Inc. | Methods and systems for identifying an area of interest in protectable content |
| US8887233B2 (en) * | 2005-04-08 | 2014-11-11 | Netapp, Inc. | Cookie-based acceleration of an authentication protocol |
| US20060253534A1 (en) * | 2005-05-09 | 2006-11-09 | Milheron Patrick M | Symmetric networking to support flexible teaching |
| US8074214B2 (en) | 2005-05-19 | 2011-12-06 | Oracle International Corporation | System for creating a customized software installation on demand |
| US8352935B2 (en) | 2005-05-19 | 2013-01-08 | Novell, Inc. | System for creating a customized software distribution based on user requirements |
| US7155213B1 (en) * | 2005-09-16 | 2006-12-26 | James R. Almeda | Remote control system |
| US8676973B2 (en) * | 2006-03-07 | 2014-03-18 | Novell Intellectual Property Holdings, Inc. | Light-weight multi-user browser |
| US7730480B2 (en) * | 2006-08-22 | 2010-06-01 | Novell, Inc. | System and method for creating a pattern installation by cloning software installed another computer |
| US7681045B2 (en) * | 2006-10-12 | 2010-03-16 | Black Duck Software, Inc. | Software algorithm identification |
| US8010803B2 (en) | 2006-10-12 | 2011-08-30 | Black Duck Software, Inc. | Methods and apparatus for automated export compliance |
| US8850553B2 (en) * | 2008-09-12 | 2014-09-30 | Microsoft Corporation | Service binding |
| US20100299738A1 (en) * | 2009-05-19 | 2010-11-25 | Microsoft Corporation | Claims-based authorization at an identity provider |
| US8312157B2 (en) * | 2009-07-16 | 2012-11-13 | Palo Alto Research Center Incorporated | Implicit authentication |
| US8776204B2 (en) * | 2010-03-12 | 2014-07-08 | Alcatel Lucent | Secure dynamic authority delegation |
| US9582673B2 (en) | 2010-09-27 | 2017-02-28 | Microsoft Technology Licensing, Llc | Separation of duties checks from entitlement sets |
| US20120227098A1 (en) * | 2011-03-03 | 2012-09-06 | Microsoft Corporation | Sharing user id between operating system and application |
| US9183361B2 (en) | 2011-09-12 | 2015-11-10 | Microsoft Technology Licensing, Llc | Resource access authorization |
Family Cites Families (10)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5414844A (en) * | 1990-05-24 | 1995-05-09 | International Business Machines Corporation | Method and system for controlling public access to a plurality of data objects within a data processing system |
| US6163383A (en) * | 1996-04-17 | 2000-12-19 | Fuji Xerox Co., Ltd. | Method for providing print output security in a multinetwork environment |
| US5787177A (en) * | 1996-08-01 | 1998-07-28 | Harris Corporation | Integrated network security access control system |
| US6052468A (en) * | 1998-01-15 | 2000-04-18 | Dew Engineering And Development Limited | Method of securing a cryptographic key |
| US6711681B1 (en) * | 1999-05-05 | 2004-03-23 | Sun Microsystems, Inc. | Cryptographic authorization with prioritized authentication |
| US6687823B1 (en) | 1999-05-05 | 2004-02-03 | Sun Microsystems, Inc. | Cryptographic authorization with prioritized and weighted authentication |
| US6915426B1 (en) * | 1999-07-23 | 2005-07-05 | Networks Associates Technology, Inc. | System and method for enabling authentication at different authentication strength-performance levels |
| US6609198B1 (en) * | 1999-08-05 | 2003-08-19 | Sun Microsystems, Inc. | Log-on service providing credential level change without loss of session continuity |
| US7086085B1 (en) * | 2000-04-11 | 2006-08-01 | Bruce E Brown | Variable trust levels for authentication |
| US6959336B2 (en) * | 2001-04-07 | 2005-10-25 | Secure Data In Motion, Inc. | Method and system of federated authentication service for interacting between agent and client and communicating with other components of the system to choose an appropriate mechanism for the subject from among the plurality of authentication mechanisms wherein the subject is selected from humans, client applications and applets |
-
2001
- 2001-04-30 US US09/846,175 patent/US7305701B2/en not_active Expired - Fee Related
-
2002
- 2002-04-08 AU AU32994/02A patent/AU785250B2/en not_active Ceased
- 2002-04-15 DE DE60213314T patent/DE60213314T2/de not_active Expired - Lifetime
- 2002-04-15 EP EP02008495A patent/EP1255179B1/en not_active Expired - Lifetime
- 2002-04-15 AT AT02008495T patent/ATE334438T1/de not_active IP Right Cessation
- 2002-04-30 JP JP2002129343A patent/JP4772256B2/ja not_active Expired - Fee Related
Also Published As
| Publication number | Publication date |
|---|---|
| EP1255179B1 (en) | 2006-07-26 |
| AU3299402A (en) | 2002-10-31 |
| DE60213314T2 (de) | 2007-04-19 |
| DE60213314D1 (de) | 2006-09-07 |
| JP2003030149A (ja) | 2003-01-31 |
| EP1255179A3 (en) | 2004-08-11 |
| EP1255179A2 (en) | 2002-11-06 |
| US7305701B2 (en) | 2007-12-04 |
| US20020162030A1 (en) | 2002-10-31 |
| JP4772256B2 (ja) | 2011-09-14 |
| AU785250B2 (en) | 2006-12-07 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| ATE334438T1 (de) | Verfahren und anordnungen zum kontrollierten zugang zu ressourcen basiert auf einem authentifizierungsverfahren | |
| RU2376628C2 (ru) | Устройство обработки информации, носитель записи информации, способ обработки информации и компьютерная программа | |
| JP5562961B2 (ja) | マルウェア検知のシステムおよび方法 | |
| US20240371510A1 (en) | Digital content labeling based on correlated person behaviors | |
| US8732820B2 (en) | Method for inputting usernames and passwords to access or use different assets | |
| ATE282990T1 (de) | System und verfahren zur biometrischen authentifizierung eines benutzers mit einer chipkarte | |
| DE60200081D1 (de) | Sichere Benutzer- und Datenauthenifizierung über ein Kommunikationsnetzwerk | |
| SG93859A1 (en) | Original data circulation method, system, apparatus, and computer readable medium | |
| JP2003030149A5 (https=) | ||
| ATE338400T1 (de) | Universeller sicherer datenaustausch für kryptographischen modulen | |
| GB2289965A (en) | Secure personal indentification instument and method for creating same | |
| KR20060021816A (ko) | 데이터 처리 방법, 데이터 처리 시스템 및 컴퓨터 판독가능 매체 | |
| CN101118585A (zh) | 用于对用户进行身份验证的方法和装置 | |
| ATE516650T1 (de) | Verfahren und vorrichtung zur zugangskontrolle persönlicher information | |
| KR20210109164A (ko) | 블록체인을 이용한 최초 저작권자 인증 시스템 및 그 방법 | |
| EP1492106A3 (en) | A method to authenticate a data processing apparatus having a recording device and apparatuses therefor | |
| ATE410020T1 (de) | Verfahren und system zur sicheren konfiguration eines client-gerätes | |
| DE60213197D1 (de) | Verfahren zur Aufstellung einer nutzbaren Infrastruktur mit öffentlichen Schlüsseln | |
| CN103460218A (zh) | 用于受保护的电子文档的公共提供的方法 | |
| ATE445216T1 (de) | Aufzeichnungsmedium, konfigurationsverfahren für diesbezügliche steuerinformationen, aufzeichnungs-und wiedergabeverfahren und vorrichtung dafür | |
| ATE387809T1 (de) | Vorrichtung und verfahren zur bildverarbeitung, und bildverarbeitungsprogramm speicherndes speichermedium | |
| JP2005309780A (ja) | Icカード及び権限委譲制御方法 | |
| EP1380965A4 (en) | METADATA CREATION APPARATUS AND METADATA CREATION METHOD | |
| ATE369005T1 (de) | Verteilen einer mediadatei mit meta-informationen | |
| DE69937196D1 (de) | Verfahren und vorrichtung zur sicheren verteilung von authentifizierungsdaten an umherstreifende teilnehmer |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| RER | Ceased as to paragraph 5 lit. 3 law introducing patent treaties |