DISTRIBUTED COMPUTER SYSTEMS WITH TIME-DEPENDENT CREDENTIALS

    公开(公告)号:US20130061301A1

    公开(公告)日:2013-03-07

    申请号:US13224257

    申请日:2011-09-01

    IPC分类号: G06F21/00

    CPC分类号: H04L63/0846

    摘要: A distributed system in which time-dependent credentials are supplied by controllers that operate according to different local times. Errors that might arise from the controllers generating inconsistent credentials because of time skew are avoided by identifying credentials generated during transition intervals in which different ones of the controllers may generate different credentials at the same absolute time. During a transition interval, controllers and other devices may use credentials differentially based on the nature of the authentication function. Each controller may periodically renew its credentials based on self-scheduled renewals or based on requests from other devices, such that renewal times are offset by random delays to avoid excessive network traffic. Controllers may determine which credential is valid for any given time, based on a cryptographically secure key associated with that time and information identifying the entity that is associated with that credential.

    System and methods providing enhanced security model
    43.
    发明授权
    System and methods providing enhanced security model 有权
    系统和方法提供增强的安全模型

    公开(公告)号:US07971230B2

    公开(公告)日:2011-06-28

    申请号:US11830680

    申请日:2007-07-30

    IPC分类号: G06F17/30

    摘要: The present invention relates to a system and methodology to facilitate security for data items residing within (or associated with) a hierarchical database or storage structure. A database security system is provided having a hierarchical data structure associated with one or more data items. The system includes a security component that applies a security policy to the data items from a global location or region associated with a database. Various components and processes are employed to enable explicit and/or inherited security properties to be received by and propagated to the data items depending on the type of data structure encountered or processed.

    摘要翻译: 本发明涉及一种促进位于分层数据库或存储结构内(或与之相关联的)数据项的安全性的系统和方法。 提供了具有与一个或多个数据项相关联的分层数据结构的数据库安全系统。 该系统包括将安全策略应用于与数据库相关联的全球位置或区域的数据项的安全组件。 采用各种组件和过程来使显式和/或继承的安全属性由数据项接收和传播到数据项,这取决于遇到或处理的数据结构的类型。

    Pass-thru for client authentication
    46.
    发明授权
    Pass-thru for client authentication 失效
    通过客户端验证

    公开(公告)号:US07644275B2

    公开(公告)日:2010-01-05

    申请号:US10413799

    申请日:2003-04-15

    IPC分类号: H04L9/00

    摘要: This disclosure pertains generally to client authentication. One aspect of the disclosure relates to a first server for presenting evidence to a Domain Controller (DC) of a first authentication context being submitted from a client to the first server to obtain a delegable credential, wherein the credential can be used to request a second authentication context from that client to a second server. Another aspect relates to the first server providing a pass-thru with evidence to a DC. The evidence relates to a first authentication context being submitted from a client to the first server that it obtained a delegable credential. The pass-thru is used in combination with the credential to request a second authentication context from the client to a second server.

    摘要翻译: 本公开通常涉及客户端认证。 本公开的一个方面涉及一种用于向第一认证上下文的域控制器(DC)呈现证据的第一服务器,该第一认证上下文从客户端提交到第一服务器以获得可委托的证书,其中该凭证可用于请求第二认证上下文 认证上下文从该客户端到第二个服务器。 另一方面涉及第一台服务器向DC提供证据。 证据涉及从客户端向第一服务器提交的第一个身份验证上下文,它获取了一个可委托凭证。 通过与凭证组合使用以从客户端请求第二认证上下文到第二服务器。

    ACCESS CONTROL NEGATION USING NEGATIVE GROUPS
    49.
    发明申请
    ACCESS CONTROL NEGATION USING NEGATIVE GROUPS 有权
    使用负面组的访问控制

    公开(公告)号:US20080301780A1

    公开(公告)日:2008-12-04

    申请号:US11756393

    申请日:2007-05-31

    IPC分类号: G06F17/00

    CPC分类号: G06F21/6218

    摘要: The subject disclosure pertains to systems and methods that facilitate managing groups entities for access control. A negative group is defined using a base group, where the negative group associated with a base group includes any entities not included in the base group. Negative groups can be implemented using certificates rather than explicit lists of negative group members. A certificate can provide evidence of membership in the negative group and can be presented for evaluation to obtain access to resources. Subtraction groups can also be used to manage access to resources. A subtraction group can be defined as the members of a first group, excluding any members of a second group.

    摘要翻译: 本发明涉及便于管理组实体以进行访问控制的系统和方法。 使用基组定义负组,其中与基组关联的负组包括未包括在基组中的任何实体。 负组可以使用证书而不是负组成员的显式列表来实现。 证书可以提供负组织成员的证据,并可以提供评估以获得资源。 减法组也可用于管理对资源的访问。 减法组可以定义为第一组的成员,不包括第二组的任何成员。