CA2604579A1 - Method, system, and program product for connecting a client to a network - Google Patents

Method, system, and program product for connecting a client to a network Download PDF

Info

Publication number
CA2604579A1
CA2604579A1 CA002604579A CA2604579A CA2604579A1 CA 2604579 A1 CA2604579 A1 CA 2604579A1 CA 002604579 A CA002604579 A CA 002604579A CA 2604579 A CA2604579 A CA 2604579A CA 2604579 A1 CA2604579 A1 CA 2604579A1
Authority
CA
Canada
Prior art keywords
software
client
credential
software modules
list
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
CA002604579A
Other languages
English (en)
French (fr)
Inventor
Guy Simon Denton
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
International Business Machines Corp
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of CA2604579A1 publication Critical patent/CA2604579A1/en
Abandoned legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Transfer Between Computers (AREA)
  • Stored Programmes (AREA)
  • Computer And Data Communications (AREA)
CA002604579A 2005-04-28 2006-03-30 Method, system, and program product for connecting a client to a network Abandoned CA2604579A1 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US11/119,436 2005-04-28
US11/119,436 US20060248578A1 (en) 2005-04-28 2005-04-28 Method, system, and program product for connecting a client to a network
PCT/EP2006/061172 WO2006114361A1 (en) 2005-04-28 2006-03-30 Method, system, and program product for connecting a client to a network

Publications (1)

Publication Number Publication Date
CA2604579A1 true CA2604579A1 (en) 2006-11-02

Family

ID=36607495

Family Applications (1)

Application Number Title Priority Date Filing Date
CA002604579A Abandoned CA2604579A1 (en) 2005-04-28 2006-03-30 Method, system, and program product for connecting a client to a network

Country Status (10)

Country Link
US (1) US20060248578A1 (https=)
EP (1) EP1875712A1 (https=)
JP (1) JP2008539482A (https=)
CN (1) CN101129043A (https=)
AU (1) AU2006239379A1 (https=)
BR (1) BRPI0610974B1 (https=)
CA (1) CA2604579A1 (https=)
MX (1) MX2007013310A (https=)
TW (1) TW200705207A (https=)
WO (1) WO2006114361A1 (https=)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2407904B1 (en) * 2010-07-13 2017-11-22 BlackBerry Limited Method for authenticating device capabilities to a verified third party
US8397274B2 (en) 2010-07-13 2013-03-12 Research In Motion Limited Method for authenticating device capabilities to a verified third party
GB2487533A (en) * 2011-01-21 2012-08-01 Lionel Wolovitz Access control with application specific rules and access requests including application identifiers
US9226117B2 (en) * 2011-09-30 2015-12-29 Sierra Wireless, Inc. Dynamic assignment of cell broadcast message identifiers
US9445302B2 (en) 2012-06-14 2016-09-13 Sierra Wireless, Inc. Method and system for wireless communication with machine-to-machine devices
US9380430B2 (en) 2012-06-14 2016-06-28 Sierra Wireless, Inc. Method and system for wireless communication with machine-to-machine devices
US8924443B2 (en) * 2012-10-05 2014-12-30 Gary Robin Maze Document management systems and methods
CN108345782B (zh) * 2017-01-25 2021-02-12 杨建纲 智能型硬件安全载具

Family Cites Families (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB8827967D0 (en) * 1988-11-30 1989-01-05 Ward I M Die-free drawing
US5258802A (en) * 1989-04-30 1993-11-02 Minolta Camera Kabushiki Kaisha Camera system which compensates for defocusing during operation
JP3187114B2 (ja) * 1992-01-30 2001-07-11 旭光学工業株式会社 パワーフォーカスリミッター
US5999711A (en) * 1994-07-18 1999-12-07 Microsoft Corporation Method and system for providing certificates holding authentication and authorization information for users/machines
US5987611A (en) * 1996-12-31 1999-11-16 Zone Labs, Inc. System and methodology for managing internet access on a per application basis for client computers connected to the internet
US6216112B1 (en) * 1998-05-27 2001-04-10 William H. Fuller Method for software distribution and compensation with replenishable advertisements
US6279001B1 (en) * 1998-05-29 2001-08-21 Webspective Software, Inc. Web service
US6418472B1 (en) * 1999-01-19 2002-07-09 Intel Corporation System and method for using internet based caller ID for controlling access to an object stored in a computer
US7225244B2 (en) * 2000-05-20 2007-05-29 Ciena Corporation Common command interface
US7210167B2 (en) * 2001-01-08 2007-04-24 Microsoft Corporation Credential management
GB2372413A (en) * 2001-02-20 2002-08-21 Hewlett Packard Co Digital credential exchange
US20030051164A1 (en) * 2001-05-18 2003-03-13 Patton Patricia Carol System and method for authentication of network users with preprocessing generating a verified personal profile for use on a publicly accessed global networked computer system and a system and method for producing the exchange of such secure identification
US6873988B2 (en) * 2001-07-06 2005-03-29 Check Point Software Technologies, Inc. System and methods providing anti-virus cooperative enforcement
US20040107360A1 (en) * 2002-12-02 2004-06-03 Zone Labs, Inc. System and Methodology for Policy Enforcement
US7134140B2 (en) * 2001-09-27 2006-11-07 Mcafee, Inc. Token-based authentication for network connection
US7237258B1 (en) * 2002-02-08 2007-06-26 Mcafee, Inc. System, method and computer program product for a firewall summary interface
US20030177364A1 (en) * 2002-03-15 2003-09-18 Walsh Robert E. Method for authenticating users
US7340770B2 (en) * 2002-05-15 2008-03-04 Check Point Software Technologies, Inc. System and methodology for providing community-based security policies
US20040083296A1 (en) * 2002-10-25 2004-04-29 Metral Max E. Apparatus and method for controlling user access
US7210034B2 (en) * 2003-01-30 2007-04-24 Intel Corporation Distributed control of integrity measurement using a trusted fixed token
GB2405232B (en) * 2003-08-21 2007-01-03 Hewlett Packard Development Co A method of and apparatus for controlling access to data
US20050050184A1 (en) * 2003-08-29 2005-03-03 International Business Machines Corporation Method, system, and storage medium for providing life-cycle management of grid services
US7581111B2 (en) * 2004-02-17 2009-08-25 Hewlett-Packard Development Company, L.P. System, method and apparatus for transparently granting access to a selected device using an automatically generated credential
JP5038887B2 (ja) * 2004-04-15 2012-10-03 クリアパス・ネットワークス・インコーポレーテッド ネットワークを管理するシステムおよび方法
US7721328B2 (en) * 2004-10-01 2010-05-18 Salesforce.Com Inc. Application identity design
US20060130144A1 (en) * 2004-12-14 2006-06-15 Delta Insights, Llc Protecting computing systems from unauthorized programs
US8024488B2 (en) * 2005-03-02 2011-09-20 Cisco Technology, Inc. Methods and apparatus to validate configuration of computerized devices
US7900253B2 (en) * 2005-03-08 2011-03-01 Xceedid Corporation Systems and methods for authorization credential emulation

Also Published As

Publication number Publication date
JP2008539482A (ja) 2008-11-13
AU2006239379A1 (en) 2006-11-02
WO2006114361A1 (en) 2006-11-02
MX2007013310A (es) 2007-12-13
US20060248578A1 (en) 2006-11-02
CN101129043A (zh) 2008-02-20
TW200705207A (en) 2007-02-01
EP1875712A1 (en) 2008-01-09
BRPI0610974A2 (pt) 2010-08-03
BRPI0610974B1 (pt) 2019-09-17

Similar Documents

Publication Publication Date Title
US6438550B1 (en) Method and apparatus for client authentication and application configuration via smart cards
US7627896B2 (en) Security system providing methodology for cooperative enforcement of security policies during SSL sessions
US6510236B1 (en) Authentication framework for managing authentication requests from multiple authentication devices
US9197420B2 (en) Using information in a digital certificate to authenticate a network of a wireless access point
CN101227468B (zh) 用于认证用户到网络的方法、设备和系统
US8041955B2 (en) Grid mutual authorization through proxy certificate generation
US8220032B2 (en) Methods, devices, and computer program products for discovering authentication servers and establishing trust relationships therewith
US8209394B2 (en) Device-specific identity
WO2022144024A1 (en) Attribute-based encryption keys as key material for key-hash message authentication code user authentication and authorization
US20120291114A1 (en) Single sign-on between applications
US20070101401A1 (en) Method and apparatus for super secure network authentication
KR20040049272A (ko) 네트워크 위치의 하위 위치에 대한 사용자의 인증을 위한방법 및 시스템
CN111241523A (zh) 认证处理方法、装置、设备和存储介质
US10812272B1 (en) Identifying computing processes on automation servers
JP7513584B2 (ja) 方法、コンピュータプログラム製品、およびシステム(共有認証クレデンシャルの管理)
US7308578B2 (en) Method and apparatus for authorizing execution for applications in a data processing system
US20060248578A1 (en) Method, system, and program product for connecting a client to a network
Tiwari et al. Design and Implementation of Enhanced Security Algorithm for Hybrid Cloud using Kerberos
HK1113879A (en) Method, system, and program product for connecting a client to a network
Bhatia et al. Geon/telescience security infrastructure
Ahuja et al. A JADE implemented mobile agent based host platform security
Lahmer Towards a Virtual Domain based Authentication Solution for the MapReduce Application
KR101066729B1 (ko) 네트워크 위치의 하위 위치에 대한 사용자의 인증을 위한 방법 및 시스템
Foltz et al. Enterprise Security with Endpoint Agents
CN115001701A (zh) 用于授权认证的方法及装置、存储介质及电子设备

Legal Events

Date Code Title Description
EEER Examination request
FZDE Discontinued

Effective date: 20180807