scispace - formally typeset
Search or ask a question
Institution

Entrust

OtherRoyal Leamington Spa, United Kingdom
About: Entrust is a other organization based out in Royal Leamington Spa, United Kingdom. It is known for research contribution in the topics: Public-key cryptography & Login. The organization has 53 authors who have published 40 publications receiving 2064 citations.

Papers
More filters
Patent
Teresa Win1, Emilio Belmonte1
12 Feb 1999
TL;DR: In this paper, a single secure sign-on gives a user access to authorized Web resources, based on the user's role in the organization that controls the Web resources; the information resources are stored on a protected Web server.
Abstract: A single secure sign-on gives a user access to authorized Web resources, based on the user's role in the organization that controls the Web resources. The information resources are stored on a protected Web server. A user of a client or browser logs in to the system. A runtime module on the protected server receives the login request and intercepts all other request by the client to use a resource. The runtime module connects to an access server that can determine whether a particular user is authentic and which resources the user is authorized to access. User information is associated with roles and functional groups of an organization to which the user belongs; the roles are associated with access privileges. The access server connects to a registry server that stores information about users, roles, functional groups, resources, and associations among them. The access server and registry server exchange encrypted information that authorized the user to use the resource. The user is presented with a customized Web page showing only those resources that the user may access. Thereafter, the access server can resolve requests to use other resources without contacting the registry server. The registry server controls a flexible, extensible, additive data model stored in a database that describes the user, the resources, roles of the user, and functional groups in the enterprise that are associated with the user.

406 citations

Patent
23 Aug 2000
TL;DR: In this paper, a multi-domain resource (208) access control mechanism uses a single access control system to manage access by users to resources that belong to multiple domains, where a first server for a first domain (242) transmits a data token to a client seeking access to a resource in a second domain (262).
Abstract: A multi-domain resource (208) access control mechanism uses a single access control system to manage access by users to resources that belong to multiple domains. A first server for a first domain (242) transmits a data token to a client seeking access to a resource in a second domain. The client transmit the data token to a second server (262) in the other domain. The second server uses the data token to verify that the user is authentic, that is, authorized to access resources protected by the access control system (220).

241 citations

Patent
28 Jul 1999
TL;DR: In this paper, a session manager in cooperation with a topology mechanism enables a client to securely interact with a plurality of access servers and associated runtime elements using the plurality of sessions that are coordinated and tracked.
Abstract: In a system that controls access to information resources, a session manager in cooperation with a topology mechanism enables a client to securely interact with a plurality of access servers and associated runtime elements using a plurality of sessions that are coordinated and tracked. The information resources are stored on protected servers. Access to each of the protected servers is controlled by one of the access servers. Client session information is stored in a session manager that is bound to and associated with the runtime of the access server, and the topology mechanism. In operation, a user of a client or browser logs in to an access server and then submits a request for a resource of a protected server associated with a different access server. A runtime module on the access server receives the request and asks the session manager to validate the session. The session manager determines whether the client is involved in an authenticated session with any access server in the system. If so, the client is permitted to access the resources without logging in to the specific access server that is associated with the protected server. In this way, the client can access multiple resources of multiple protected servers, in a stateless network system, without logging in to each of the access servers that controls each of the protected servers.

221 citations

Patent
12 Dec 2005
TL;DR: In this article, the authors proposed a method and apparatus that provides first or second factor authentication by providing selectability of a plurality of second-factor authentication policies associated with an authentication article.
Abstract: A method and apparatus provides first or second factor authentication by providing selectability of a plurality of second factor authentication policies associated with a second factor authentication article. The first or second factor authentication article includes authentication information, such as a plurality of data elements in different cells or locations on the authentication article, which can be located by using corresponding location information. The method and apparatus provides second factor authentication based on the first or second factor authentication article by enforcing at least one of the plurality of selected authentication policies.

188 citations

Patent
Mario Lim1
01 Oct 1999
TL;DR: In this paper, a method and apparatus for selectively authenticating and authorizing a client seeking access to one or more protected computer systems over a network is provided, where a proxy security server is requested to authenticate the client using information identifying the client.
Abstract: A method and apparatus are provided for selectively authenticating and authorizing a client seeking access to one or more protected computer systems over a network. A request of a client to access one of the computer systems is received. A proxy security server is requested to authenticate the client using information identifying the client. An authorization of the client from the proxy security server is received, based on authentication results received from a remote security server that is coupled to the proxy security server. In response, access rights of the client are established, based on one or more access information records received from remote security server through the proxy security server. As a result, one or more legacy security servers may be easily integrated into an application access system without complicated modifications to the application access system.

145 citations


Network Information
Related Institutions (5)
Storage Technology Corporation
1.2K papers, 27.3K citations

75% related

MIPS Technologies
290 papers, 7.3K citations

75% related

Institut Eurécom
3.7K papers, 113K citations

74% related

INESC-ID
2.6K papers, 37.6K citations

72% related

Swedish Institute of Computer Science
1.3K papers, 56K citations

72% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
20192
20171
20162
20153
20141
20131