scispace - formally typeset
Patent

Access control subsystem and method for distributed computer system using locally cached authentication credentials

Reads0
Chats0
TLDR
In this article, a distributed computer system has a trusted computing base that includes an authentication agent for authenticating requests received from principals at other nodes in the system, and the server process is provided with a local cache of authentication data that identifies requesters whose previous request messages have been authenticated.
Abstract
A distributed computer system has a number of computers coupled thereto at distinct nodes. The computer at each node of the distributed system has a trusted computing base that includes an authentication agent for authenticating requests received from principals at other nodes in the system. Requests are transmitted to servers as messages that include a first identifier provided by the requester and a second identifier provided by the authentication agent of the requester node. Each server process is provided with a local cache of authentication data that identifies requesters whose previous request messages have been authenticated. When a request is received, the server checks the request's first and second identifiers against the entries in its local cache. If there is a match, then the request is known to be authentic. Otherwise, the server node's authentication agent is called to obtain authentication credentials from the requester's node to authenticate the request message. The principal identifier of the requester and the received credentials are stored in a local cache by the server node's authentication agent. The server process also stores a record in its local cache indicating that request messages from the specified requester are known to be authentic, thereby expediting the process of authenticating received requests.

read more

Citations
More filters
Patent

Systems and Methods for Secure Transaction Management and Electronic Rights Protection

TL;DR: In this article, the authors proposed a secure content distribution method for a configurable general-purpose electronic commercial transaction/distribution control system, which includes a process for encapsulating digital information in one or more digital containers, a process of encrypting at least a portion of digital information, a protocol for associating at least partially secure control information for managing interactions with encrypted digital information and/or digital container, and a process that delivering one or multiple digital containers to a digital information user.
Patent

System for controlling access and distribution of digital property

TL;DR: In this article, a method and device are provided for controlling access to data, where portions of the data are protected and rules concerning access rights to data are determined, and a method is also provided for distributing data for subsequent controlled use of those data.
Patent

Internet server access control and monitoring systems

TL;DR: In this paper, the authors describe a system for controlling and monitoring access to network servers that includes client-server sessions over the Internet, where when the user attempts to access an access-controlled file, the server subjects the request to a secondary server which determines whether the client has an authorization or valid account.
Patent

System for controlling the distribution and use of digital works

TL;DR: In this article, a system for controlling use and distribution of digital works, in which the owner of a digital work attaches usage rights to that work, is presented, where each right has associated with it certain optional specifications which outline the conditions and fees upon which the right may be exercised.
Patent

Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information

TL;DR: In this article, a matching and classification utility system comprising a kind of Commerce Utility System is used to perform the matching, narrowcasting, classifying and/or selecting process, non-limiting examples of which include software objects.
References
More filters
Patent

International commodity trade exchange

Sibley
TL;DR: An International Commodity Trade Exchange (ICTE) as mentioned in this paper is an international commodity trade exchange having a central exchange post for providing international commodity information and a plurality of local exchanges in at least two countries around the world.
Patent

Distributed security auditing subsystem for an operating system

TL;DR: The distributed auditing subsystem as discussed by the authors runs in a UNIX-like operating system environment with a hierarchical file system and provides an audit trail of accesses to the objects it protects and maintains and protects that audit trail from modification or unauthorized access or destruction.
Patent

Computer file protection system

TL;DR: In this article, the authors present a system for protecting the security of computer files, which is installed on the host computer bus so that it resides in the control logic, address, and data signal path between the computer storage device and central processing unit.
Patent

Software protection system

TL;DR: In this paper, a protection system for controlling the operation of a digital computer as to a particular program wherein a program "lock" interfaces with the computer and authorizes the operation in response only to a selected relation between a program, a number in the lock, and a third number, a "key", supplied to the lock and which bears a selected relations to both the program number and lock number.
Patent

A method for utilizing an encrypted key as a key identifier in a data packet in a computer network

TL;DR: In this paper, a shared key is negotiated between two nodes and then encrypted under each nodes' master key, which is then used to decrypt encrypted data in the data packet and the encrypted key of the receiving node is placed in the packet to be sent by the transmitting node.