WO2007005684A1 - System and method to determine a proxy login - Google Patents
System and method to determine a proxy login Download PDFInfo
- Publication number
- WO2007005684A1 WO2007005684A1 PCT/US2006/025722 US2006025722W WO2007005684A1 WO 2007005684 A1 WO2007005684 A1 WO 2007005684A1 US 2006025722 W US2006025722 W US 2006025722W WO 2007005684 A1 WO2007005684 A1 WO 2007005684A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- user
- proxy
- passcode
- computer
- instructions
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/41—User authentication where a single sign-on provides access to a plurality of computers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
Definitions
- this invention relates to a system and method
- sysadmins typically have a standard user account to
- system executes the initial login script and all further commands as if the
- the sysadmin may execute the su command to become another general user, e.g.,
- su otherjjser to debug a login issue or other user specific issue at that general
- the method further comprising the
- step of validating said passcode The method further comprising the step of
- the computer-program product further comprising instructions for validating said passcode.
- program product further comprising instructions for granting access to a secured
- proxy user comprising the step of instructions for accepting entry of a user
- memory to implement a method to determine a proxy login comprising means
- Figure 1 is a block diagram of a computer environment in which
- FIG. 20 Figure 2. a flow diagram for a proxy authentication schema.
- the presently preferred embodiment provides, among other things, a
- an operating system executes on a
- Generally program modules include routines, programs, objects, components,
- a device in the form of a computer 100, such as a desktop or laptop computer,
- the computer including a plurality of related peripheral devices (not depicted).
- the computer including a plurality of related peripheral devices (not depicted).
- 100 includes a microprocessor 105 and a bus 110 employed to connect and
- bus 110 may be any of several types of bus structures including a memory bus
- the computer 100 typically includes a user interface adapter
- interface devices such as a keyboard 120, mouse 125, and/or other interface
- the bus 110 also connects a display device
- the bus 110 also connects the microprocessor 105 to a memory 145, which can include ROM, RAM, etc.
- the computer 100 further includes a drive interface 150 that
- the storage device 155 can include a hard disk drive, not shown, for
- optical drive 160 or writing to a removable magnetic disk drive. Likewise the optical drive 160
- optical disk drive for reading from or writing to a
- removable optical disk such as a CD ROM or other optical media.
- the computer 100 can communicate via a communications channel
- the computer 100 may be
- LAN local area network
- wide area network wide area network
- WAN wide area network
- modules may be located in both local and remote memory storage devices. All
- the software programming code may also be
- non-volatile data storage device such as a hard-
- the code may be distributed on such media, or
- an operating system can be an operating system, a single application or process, for example, an
- a user with login credentials accesses a user with login credentials.
- Step 200 The user enters a user
- Step 205 Should the name and a user password, as is well understood in the art (Step 205). Should the name and a user password, as is well understood in the art (Step 205). Should the name and a user password, as is well understood in the art (Step 205). Should the name and a user password, as is well understood in the art (Step 205). Should the name and a user password, as is well understood in the art (Step 205). Should
- the user require access as a proxy user, the user can enter his or her user name
- Proxy user selection may be
- the proxy symbol may be followed by a proxy usemame
- proxy user name is another usemame.
- the proxy user name is another usemame.
- the user may chose the proxy user name from a drop-down list or another
- the user can be an administrator level user, or
- Step 215 user selection method is selected (Step 215), and if not the application
- Step 220 it validates the user's password (Step 220),
- Step 230 retrieves the user's login credentials (Step 230). The user is granted
- Step 230 retrieves the proxy user's login credentials (Step 230), and grants access
- the user may use the secured application as the proxy user.
- the user may now perform
- An apparatus of the presently preferred embodiment may
- programmable system including at least one programmable processor coupled to
- data storage system at least one input device, and at least one output device.
- the application program may be implemented in a high-level procedural or
- the language may be a compiled or interpreted
- a processor will receive instructions and data from a
- nonvolatile memory including by way of example semiconductor memory
Abstract
A system, method, and computer program for accessing a secured application by a proxy user, comprising the steps of identifying a proxy user by a first user name and a second user; and entering a first user passcode whereby said proxy user is able to perform operations as said second user, and appropriate means and computer-readable instructions.
Description
SYSTEM AND METHOD TO DETERMINE A PROXY LOGIN
Priority of Application
[Para l ] The present application claims priority of U.S. provisional
application Serial No. 60/595,401 filed June 30. 2004, which is incorporated
herein by reference.
Technical Field
[Para 2] This invention relates generally to computer login access by an
authorized user. More specifically, this invention relates to a system and method
to determine a proxy login.
Background
[Para 3] In corporations around the world, engineers responsible for
computer systems, or some aspect of them, are known as system administrators,
or sysadmins. These sysadmins, typically have a standard user account to
access the computer system, and access to a super user account, known as
"root" in UNIX or "admin" in other Operating System vernacular, to give the
sysadmin access to all aspects of the computer system.
[Para 4] It is common practice for the sysadmin to login under the standard
user account, and then enter a substitute user ("su") command to the become
the admin user or any other user. While the sysadmin is the substitute user, the
system executes the initial login script and all further commands as if the
sysadmin were the substitute user in a separate shell.
[Para 5] A problem, though, is that this technique of becoming the
substitute user is a multi-step process and requires the sysadmin to already be
logged in. Furthermore, with the exception of becoming the super user, the
sysadmin may execute the su command to become another general user, e.g.,
su otherjjser, to debug a login issue or other user specific issue at that general
user's computer, for example.
[Para 6] Another problem occurs when the sysadmin designates a particular
general user to perform operations intended only for a different particular person
and has to login first to expose the super user shell so that he may login as the
particular person. For example, a temporary contractor needs to work on the
finance system for just a few short hours and the sysadmin first logs in under his
general user id, then executes the su command to become a user with access to
the finance system. Allowing this type of user designation can permit the
temporary contractor to exit out of the shell, and have complete access to an
unintended user id.
[Para 7] A known solution to this problem is having the sysadmin grant a
group permission to a temporary contractor. However the issue of performing
tasks as a particular user who is not the temporary contractor is not resolved by
this technique.
[Para 8] There is a need for a solution that can provide a sysadmin the
ability to execute a proxy login with an administrator-level password to give
access to a general user so that the general user may perform operations and
act like an authorized user on a temporary per-login basis.
[Para 9] There is also a need for a solution that can provide the ability for a
general user to grant proxy access to other non-admin level users, for example a
manager who requires updates of a financial system logs into the financial
system as a verified financial user where the manager directly has no
permissions to access said financial system.
Summary
[Para 10] To achieve the foregoing, and in accordance with the purpose of
the presently preferred embodiment as broadly described herein, the present
application provides a method of accessing a secured application by a proxy
user, comprising the steps of: identifying a proxy user by a first user name and a
second user; and entering a first user passcode whereby said proxy user is able
to perform operations as said second user. The method further comprising the
step of validating said passcode. The method further comprising the step of
granting access to a secured application according to said second user
credentials. The method, wherein said proxy user is identified by a
concatenation of said first user name and said second user name.
[Para 1 1 ] An advantage of the presently preferred embodiment is to provide
a method of accessing a secured application by a proxy user, comprising the step
of: accepting entry of a user passcode pair and a proxy username. The method,
further comprising the step of validating said passcode. The method, further
comprising the step of granting access to a secured application according to said
passcode.
[Para 1 2] Another advantage of the presently preferred embodiment is to
provide a computer-program product tangibly embodied in a machine readable
medium to perform a method to determine a proxy login, comprising:
instructions for identifying a proxy user by a first user name and a second user;
and instructions for entering a first user passcode whereby said proxy user is
able to perform operations as said second user. The computer-program product,
further comprising instructions for validating said passcode. The computer-
program product, further comprising instructions for granting access to a secured
application according to said second user credentials. The computer-program
product, wherein said proxy user is identified by a concatenation of said first
user name and said second user name.
[Para 1 3] And yet another advantage of the presently preferred embodiment
is to provide a computer-program product tangibly embodied in a machine
readable medium to perform a method of accessing a secured application by a
proxy user, comprising the step of instructions for accepting entry of a user
passcode pair and a proxy username. The computer-program product, further
comprising instructions for validating said passcode. The computer-program
product, further comprising instructions for granting access to a secured
application according to said passcode.
[Para 14] And still another advantage of the presently preferred embodiment
is to provide a data processing system having at least a processor and accessible
memory to implement a method to determine a proxy login, comprising means
for identifying a proxy user by a first user name and a second user; and means
for entering a first user passcode whereby said proxy user is able to perform
operations as said second user.
[Para 1 5] And still yet another advantage of the presently preferred
embodiment is to provide a data processing system having at least a processor
and accessible memory to implement a method of accessing a secured
application by a proxy user, comprising means for accepting entry of a user
passcode pair and a proxy username.
[Para 16] Other advantages of the presently preferred embodiment will be
set forth in part in the description and in the drawings that follow, and, in part
will be learned by practice of the invention.
[Para 1 7] The presently preferred embodiment will now be described with
reference made to the following Figures that form a part hereof. It is
understood that other embodiments may be utilized and changes may be made
without departing from the scope of the present invention.
Brief Description of the Drawings
[Para 1 8] A presently preferred embodiment will hereinafter be described in
conjunction with the appended drawings, wherein like designations denote like
elements, and:
[Para 1 9] Figure 1 is a block diagram of a computer environment in which
the presently preferred embodiment may be practiced; and
[Para 20] Figure 2. a flow diagram for a proxy authentication schema.
Detailed Description of the Preferred Embodiments
[Para 21 ] The numerous innovative teachings of the present application will
be described with particular reference to the presently preferred embodiments.
It should be understood, however, that this class of embodiments provides only
a few examples of the many advantageous uses of the innovative teachings
herein. The presently preferred embodiment provides, among other things, a
system and method to determine a proxy login. Now therefore, in accordance
with the presently preferred embodiment, an operating system executes on a
computer, such as a general-purpose personal computer. Figure 1 and the
following discussion are intended to provide a brief, general description of a
suitable computing environment in which the presently preferred embodiment
may be implemented. Although not required, the presently preferred
embodiment will be described in the general context of computer-executable
instructions, such as program modules, being executed by a personal computer.
Generally program modules include routines, programs, objects, components,
data structures, etc., that perform particular tasks or implementation particular
abstract data types, and the presently preferred embodiment may be performed
in any of a variety of known computing environments.
[Para 22] With reference to Figure 1, an exemplary system for implementing
the presently preferred embodiment includes a general-purpose computing
device in the form of a computer 100, such as a desktop or laptop computer,
including a plurality of related peripheral devices (not depicted). The computer
100 includes a microprocessor 105 and a bus 110 employed to connect and
enable communication between the microprocessor 105 and a plurality of
components of the computer 100 in accordance with known techniques. The
bus 110 may be any of several types of bus structures including a memory bus
or memory controller, a peripheral bus, and a local bus using any of a variety of
bus architectures. The computer 100 typically includes a user interface adapter
115, which connects the microprocessor 105 via the bus 110 to one or more
interface devices, such as a keyboard 120, mouse 125, and/or other interface
devices 130, which can be any user interface device, such as a touch sensitive
screen, digitized pen entry pad, etc. The bus 110 also connects a display device
135, such as an LCD screen or monitor, to the microprocessor 105 via a display
adapter 140. The bus 110 also connects the microprocessor 105 to a memory
145, which can include ROM, RAM, etc.
[Para 23] The computer 100 further includes a drive interface 150 that
couples at least one storage device 155 and/or at least one optical drive 160 to
the bus. The storage device 155 can include a hard disk drive, not shown, for
reading and writing to a disk, a magnetic disk drive, not shown, for reading from
or writing to a removable magnetic disk drive. Likewise the optical drive 160
can include an optical disk drive, not shown, for reading from or writing to a
removable optical disk such as a CD ROM or other optical media. The
aforementioned drives and associated computer-readable media provide non-
volatile storage of computer readable instructions, data structures, program
modules, and other data for the computer 100.
[Para 24] The computer 100 can communicate via a communications channel
165 with other computers or networks of computers. The computer 100 may be
associated with such other computers in a local area network (LAN) or a wide
area network (WAN), or it can be a client in a client/server arrangement with
another computer, etc. Furthermore, the presently preferred embodiment may
also be practiced in distributed computing environments where tasks are
performed by remote processing devices that are linked through a
communications network. In a distributed computing environment, program
modules may be located in both local and remote memory storage devices. All
of these configurations, as well as the appropriate communications hardware and
software, are known in the art.
[Para 25] Software programming code that embodies the presently preferred
embodiment is typically stored in the memory 145 of the computer 100. In the
client/server arrangement, such software programming code may be stored with
memory associated with a server. The software programming code may also be
embodied on any of a variety of non-volatile data storage device, such as a hard-
drive, a diskette or a CD-ROM. The code may be distributed on such media, or
may be distributed to users from the memory of one computer system over a
network of some type to other computer systems for use by users of such other
systems. The techniques and methods for embodying software program code on
physical media and/or distributing software code via networks are well known
and will not be further discussed herein.
[Para 26] Referring to Figure 2, which depicts a flow diagram for a proxy
authentication schema to a secured application, where the secured application
can be an operating system, a single application or process, for example, an
accounting program or any other. A user with login credentials accesses a
secured application via a login method (Step 200). The user enters a user
name and a user password, as is well understood in the art (Step 205). Should
the user require access as a proxy user, the user can enter his or her user name
followed by a proxy user selection method. Proxy user selection may be
indicated by use of a proxy symbol, such as an "=" or "=>". In the presently
preferred embodiment, the proxy symbol may be followed by a proxy usemame,
where the proxy user name is another usemame. In an alternate embodiment,
the user may chose the proxy user name from a drop-down list or another
selection method (Step 210). The user can be an administrator level user, or
"admin" user, or someone to whom rights have been granted to act on another's
behalf, like a delegate.
[Para 27] The presently preferred embodiment determines whether the proxy
user selection method is selected (Step 215), and if not the application
performs the following: it validates the user's password (Step 220),
authenticates the user utilizing techniques well understood in the industry (Step
225), retrieves the user's login credentials (Step 230). The user is granted
access along with the credentials to the user (Step 235), so that the user may
use the secured application.
[Para 28] If, however, the proxy user selection method is present, the
application performs the following: it validates the user's password (Step 240),
logs an entry that records the user logging in as the proxy user(Step 245),
authenticates the user utilizing techniques well understood in the industry (Step
225), retrieves the proxy user's login credentials (Step 230), and grants access
along with the proxy user's credentials to the user (Step 235), so that the user
may use the secured application as the proxy user. The user may now perform
operations in the secured application without the need to know or reset the
proxy user's password.
[Para 29] The presently preferred embodiment may be implemented in digital
electronic circuitry, or in computer hardware, firmware, software, or in
combinations thereof. An apparatus of the presently preferred embodiment may
be implemented in a computer program product tangibly embodied in a
machine-readable storage device for execution by a programmable processor;
and method steps of the presently preferred embodiment may be performed by
a programmable processor executing a program of instructions to perform
functions of the presently preferred embodiment by operating on input data and
generating output.
[Para 30] The presently preferred embodiment may advantageously be
implemented in one or more computer programs that are executable on a
programmable system including at least one programmable processor coupled to
receive data and instructions from, and to transmit data and instructions to, a
data storage system, at least one input device, and at least one output device.
The application program may be implemented in a high-level procedural or
object-oriented programming language, or in assembly or machine language if
desired; and in any case, the language may be a compiled or interpreted
language.
[Para 31 ] Generally, a processor will receive instructions and data from a
read-only memory and/or a random access memory. Storage devices suitable for
tangibly embodying computer program instructions and data include all forms of
nonvolatile memory, including by way of example semiconductor memory
devices, such as EPROM, EEPROM, and flash memory devices; magnetic disks
such as internal hard disks and removable disks; magneto-optical disks; and CD-
ROM disks. Any of the foregoing may be supplemented by, or incorporated in,
specially-designed ASICs (application-specific integrated circuits).
[Para 32] A number of embodiments have been described. It will be
understood that various modifications may be made without departing from the
spirit and scope of the presently preferred embodiment. Therefore, other
implementations are within the scope of the following claims.
Claims
1. A method of accessing a secured application by a proxy user, comprising
the steps of:
identifying a proxy user by a first user name and a second user; and
entering a first user passcode whereby said proxy user is able to perform
operations as said second user.
2. The method of claim 1, further comprising the step of validating said
passcode.
3. The method of claim 1, further comprising the step of granting access to
a secured application according to said second user credentials.
4. The method of claim 1, wherein said proxy user is identified by a
concatenation of said first user name and said second user name.
5. A method of accessing a secured application by a proxy user, comprising
the steps of:
accepting entry of a user passcode pair and a proxy username.
6. The method of claim 5, further comprising the step of validating said
passcode.
7. The method of claim 5, further comprising the step of granting access to
a secured application according to said passcode.
8. A computer-program product tangibly embodied in a machine readable
medium to perform a method to determine a proxy login,
comprising:
instructions for identifying a proxy user by a first user name and a
second user; and instructions for entering a first user passcode whereby said proxy user is
able to perform operations as said second user.
9. The computer-program product of claim 8, further comprising instructions
for validating said passcode.
10. The computer-program product of claim 8, further comprising instructions
for granting access to a secured application according to said
second user credentials.
11. The computer-program product of claim 8, wherein said proxy user is
identified by a concatenation of said first user name and said
second user name.
12. A computer-program product tangibly embodied in a machine readable
medium to perform a method of accessing a secured application
by a proxy user, comprising:
instructions for accepting entry of a user passcode pair and a proxy
usemame.
13. The computer-program product of claim 12, further comprising
instructions for validating said passcode.
14. The computer-program product of claim 12, further comprising
instructions for granting access to a secured application according
to said passcode.
15. A data processing system having at least a processor and accessible
memory to implement a method to determine a proxy login,
comprising:
means for identifying a proxy user by a first user name and a second user; and
means for entering a first user passcode whereby said proxy user is able
to perform operations as said second user.
16. A data processing system having at least a processor and accessible
memory to implement a method of accessing a secured application
by a proxy user, comprising:
means for accepting entry of a user passcode pair and a proxy username.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP06786054A EP1897022A1 (en) | 2005-06-30 | 2006-06-29 | System and method to determine a proxy login |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US59540105P | 2005-06-30 | 2005-06-30 | |
US60/595,401 | 2005-06-30 | ||
US11/427,300 | 2006-06-28 | ||
US11/427,300 US20070016793A1 (en) | 2005-06-30 | 2006-06-28 | System and method to determine a proxy login |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2007005684A1 true WO2007005684A1 (en) | 2007-01-11 |
Family
ID=37116941
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2006/025722 WO2007005684A1 (en) | 2005-06-30 | 2006-06-29 | System and method to determine a proxy login |
Country Status (3)
Country | Link |
---|---|
US (1) | US20070016793A1 (en) |
EP (1) | EP1897022A1 (en) |
WO (1) | WO2007005684A1 (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9426142B2 (en) * | 2010-06-07 | 2016-08-23 | Salesforce.Com, Inc. | Systems and methods for logging into an application on a second domain from a first domain in a multi-tenant database system environment |
US11144620B2 (en) * | 2018-06-26 | 2021-10-12 | Counseling and Development, Inc. | Systems and methods for establishing connections in a network following secure verification of interested parties |
Family Cites Families (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6065120A (en) * | 1997-12-09 | 2000-05-16 | Phone.Com, Inc. | Method and system for self-provisioning a rendezvous to ensure secure access to information in a database from multiple devices |
US7802174B2 (en) * | 2000-12-22 | 2010-09-21 | Oracle International Corporation | Domain based workflows |
US7349912B2 (en) * | 2000-12-22 | 2008-03-25 | Oracle International Corporation | Runtime modification of entries in an identity system |
US7380008B2 (en) * | 2000-12-22 | 2008-05-27 | Oracle International Corporation | Proxy system |
US7213249B2 (en) * | 2000-12-22 | 2007-05-01 | Oracle International Corporation | Blocking cache flush requests until completing current pending requests in a local server and remote server |
US6675261B2 (en) * | 2000-12-22 | 2004-01-06 | Oblix, Inc. | Request based caching of data store data |
US7415607B2 (en) * | 2000-12-22 | 2008-08-19 | Oracle International Corporation | Obtaining and maintaining real time certificate status |
US7711818B2 (en) * | 2000-12-22 | 2010-05-04 | Oracle International Corporation | Support for multiple data stores |
US6816871B2 (en) * | 2000-12-22 | 2004-11-09 | Oblix, Inc. | Delivering output XML with dynamically selectable processing |
US7937655B2 (en) * | 2000-12-22 | 2011-05-03 | Oracle International Corporation | Workflows with associated processes |
US7698433B2 (en) * | 2001-03-20 | 2010-04-13 | Verizon Business Global Llc | User aliases in communication system |
US7502833B2 (en) * | 2001-05-11 | 2009-03-10 | International Business Machines Corporation | Method for dynamically integrating remote portlets into portals |
US7225256B2 (en) * | 2001-11-30 | 2007-05-29 | Oracle International Corporation | Impersonation in an access system |
US20030105820A1 (en) * | 2001-12-03 | 2003-06-05 | Jeffrey Haims | Method and apparatus for facilitating online communication |
US20050198300A1 (en) * | 2003-12-29 | 2005-09-08 | Li Gong | Data logging framework |
US7975287B2 (en) * | 2006-02-01 | 2011-07-05 | Research In Motion Limited | System and method for validating a user of an account using a wireless device |
-
2006
- 2006-06-28 US US11/427,300 patent/US20070016793A1/en not_active Abandoned
- 2006-06-29 WO PCT/US2006/025722 patent/WO2007005684A1/en active Application Filing
- 2006-06-29 EP EP06786054A patent/EP1897022A1/en not_active Ceased
Non-Patent Citations (4)
Title |
---|
HARDJONO T ET AL: "Fixed-path proxy-logins with assured termination", COMPUTING AND INFORMATION, 1993. PROCEEDINGS ICCI '93., FIFTH INTERNATIONAL CONFERENCE ON SUDBURY, ONT., CANADA 27-29 MAY 1993, LOS ALAMITOS, CA, USA,IEEE COMPUT. SOC, 27 May 1993 (1993-05-27), pages 111 - 115, XP010096562, ISBN: 0-8186-4212-2 * |
KARGER P A: "AUTHENTICATION AND DISCRETIONARY ACCESS CONTROL IN COMPUTER NETWORKS", COMPUTER NETWORKS AND ISDN SYSTEMS, NORTH HOLLAND PUBLISHING. AMSTERDAM, NL, vol. 10, no. 1, August 1985 (1985-08-01), pages 27 - 37, XP000813021, ISSN: 0169-7552 * |
See also references of EP1897022A1 * |
VARADHARAJAN V ET AL: "An analysis of the proxy problem in distributed systems", PROCEEDINGS OF THE SYMPOSIUM ON RESEARCH IN SECURITY AND PRIVACY. OAKLAND, MAY 20 - 22, 1991, LOS ALAMITOS, IEEE COMP. SOC. PRESS, US, vol. SYMP. 12, 20 May 1991 (1991-05-20), pages 255 - 275, XP010024228, ISBN: 0-8186-2168-0 * |
Also Published As
Publication number | Publication date |
---|---|
US20070016793A1 (en) | 2007-01-18 |
EP1897022A1 (en) | 2008-03-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7117529B1 (en) | Identification and authentication management | |
US7356704B2 (en) | Aggregated authenticated identity apparatus for and method therefor | |
US8397026B2 (en) | Partition access control system and method for controlling partition access | |
US8146138B2 (en) | Access unit switching through physical mediation | |
US20040230836A1 (en) | Hardware implementation of process-based security protocol | |
US8381279B2 (en) | Constraining a login to a subset of access rights | |
US20110231940A1 (en) | Credential-based access to data | |
US20110055913A1 (en) | Multi-Level Authentication | |
US9886590B2 (en) | Techniques for enforcing application environment based security policies using role based access control | |
US20050050324A1 (en) | Administrative system for smart card technology | |
US7895645B2 (en) | Multiple user credentials | |
US20040088563A1 (en) | Computer access authorization | |
US20090254982A1 (en) | Methods, programs and a system of providing remote access | |
US20070016791A1 (en) | Issuing a command and multiple user credentials to a remote system | |
US8171530B2 (en) | Computer access security | |
AU2018388459B2 (en) | Consolidated identity | |
RU2634182C1 (en) | Method of contradiction to unfair applications rates | |
US20070016793A1 (en) | System and method to determine a proxy login | |
EP1712989A1 (en) | A computer system, integrable software component and software application | |
Bassil | Windows and Linux operating systems from a security perspective | |
EP2839404B1 (en) | Method and computer device for handling com objects | |
US20080301781A1 (en) | Method, system and computer program for managing multiple role userid | |
US7653630B2 (en) | Method and apparatus for facilitating privileged object stores in a database | |
Ferle | Account Access and Security | |
JP2009093596A (en) | Single sign-on server and single sign-on program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2006786054 Country of ref document: EP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |