System and method for secure network state management and single sign-on
    1.
    发明申请
    System and method for secure network state management and single sign-on 审中-公开
    用于安全网络状态管理和单点登录的系统和方法

    公开(公告)号:US20050154887A1

    公开(公告)日:2005-07-14

    申请号:US10755835

    申请日:2004-01-12

    IPC分类号: G06F11/30 G06F21/00 H04L9/00

    CPC分类号: G06F21/41 G06F2221/2151

    摘要: State management (cookie) data is encrypted so that access control data included in the cookie is unable to be modified by the user. A hashing algorithm is performed using various fields in the cookie data and the hash value is encrypted. The hash value is combined with other data such as the user identifier and a time stamp and encrypted to form a cookie value. When a request is received, the cookie data is checked. If the token value is not in the server's cache then the token is authenticated facilitating movement of the client between servers. If the cookie does not exist or is timed out, then the user is authenticated using traditional means.

    摘要翻译: 状态管理(cookie)数据被加密,使得包含在cookie中的访问控制数据不能被用户修改。 使用Cookie数据中的各种字段执行散列算法,并且哈希值被加密。 哈希值与诸如用户标识符和时间戳的其他数据组合,并被加密以形成cookie值。 收到请求后,将检查Cookie数据。 如果令牌值不在服务器的缓存中,那么令牌被认证便于客户端在服务器之间移动。 如果cookie不存在或超时,那么用户将使用传统手段进行身份验证。

    Declarative trust model between reverse proxy server and websphere application server
    2.
    发明申请
    Declarative trust model between reverse proxy server and websphere application server 审中-公开
    反向代理服务器和Websphere应用服务器之间的声明信任模型

    公开(公告)号:US20050154886A1

    公开(公告)日:2005-07-14

    申请号:US10755828

    申请日:2004-01-12

    IPC分类号: H04L9/00 H04L29/06

    摘要: A method and system for providing a declarative trust association model that formalizes the way trust is established and requires corresponding authentication information to be presented in a standard format. Consequently, the application server may provide a guaranteed level of protection. The mechanism of the present invention provides a framework that allows an application server to enforce a trust evaluation and allows reverse proxy security server to assert a client's security identity, as well as other client security credential information. A known trust association interceptor model is extended to allow the reverse proxy security server to assert the authenticated user's security attributes. Such security attributes include, for example, group information, authentication strength, and location (i.e., where does the user enter the request, intranet vs. internet, IP address, etc.,). The security attributes can be used in making authorization decisions.

    摘要翻译: 一种用于提供声明性信任关联模型的方法和系统,其形式化信任建立的方式,并且需要以标准格式呈现相应的认证信息。 因此,应用服务器可以提供有保证的保护级别。 本发明的机制提供了一种框架,其允许应用服务器执行信任评估,并允许反向代理安全服务器断言客户端的安全身份以及其他客户端安全凭证信息。 扩展了一个已知的信任关联拦截器模型,以允许反向代理安全服务器断言经过身份验证的用户的安全属性。 这样的安全属性包括例如组信息,认证强度和位置(即,用户进入请求,内联网与互联网,IP地址等在哪里)。 安全属性可用于作出授权决定。

    Application server object-level security for distributed computing domains
    3.
    发明授权
    Application server object-level security for distributed computing domains 有权
    分布式计算域的应用服务器对象级安全性

    公开(公告)号:US07810132B2

    公开(公告)日:2010-10-05

    申请号:US12123693

    申请日:2008-05-20

    CPC分类号: G06F21/31

    摘要: Objects on application servers are distributed to one or more application servers; a user is allowed to declare in a list which objects residing on each application server are to be protected; the list is read by an interceptor; responsive to exportation of a Common Object Request Broker Architecture (“CORBA”) compliant Interoperable Object Reference (“IOR”) for a listed object, the interceptor associates one or more application server security flags with interfaces to the listed objects by tagging components of the IOR with one or more security flags; and one or more security operations are performed by an application server according to the security flags tagged to the IOR when a client accesses an application server-stored object, the security operations including an operation besides establishing secure communications between the client process and the server-stored object.

    摘要翻译: 应用程序服务器上的对象分发到一个或多个应用程序服务器; 允许用户在列表中声明哪些驻留在每个应用服务器上的对象将被保护; 列表由拦截器读取; 响应于为列出的对象导出通用对象请求代理体系结构(“CORBA”)兼容的可互操作对象引用(“IOR”),拦截器通过标记所列对象的组件将一个或多个应用程序服务器安全标志与列出的对象的接口相关联 IOR带有一个或多个安全标志; 并且当客户端访问应用服务器存储的对象时,应用服务器根据标记为IOR的安全标志执行一个或多个安全操作,该安全操作包括除客户端进程和服务器端之间建立安全通信之外的操作, 存储对象。

    Application Server Object-level Security for Distributed Computing Domains
    4.
    发明申请
    Application Server Object-level Security for Distributed Computing Domains 有权
    分布式计算域的应用服务器对象级安全性

    公开(公告)号:US20080222697A1

    公开(公告)日:2008-09-11

    申请号:US12123693

    申请日:2008-05-20

    IPC分类号: G06F21/00

    CPC分类号: G06F21/31

    摘要: Objects on application servers may be defined into classes which receive different levels of security protection, such as definition of user objects and administrative objects. Domain-wide security may be enforced on administrative objects, which user object security may be configured separately for each application server in a domain. In a CORBA architecture, IOR's for shared objects which are to be secured on a domain-wide basis, such as administrative objects, are provided with tagged components during IOR creation and exporting to a name server. Later, when the IOR is used by a client, the client invokes necessary security measures such as authentication, authorization and transport protection according to the tagged components.

    摘要翻译: 应用服务器上的对象可以被定义为接收不同级别的安全保护的类,例如用户对象和管理对象的定义。 可以在管理对象上实施全域安全性,可以为域中的每个应用程序服务器单独配置哪些用户对象安全性。 在CORBA体系结构中,IOR对于在域范围内进行安全保护的共享对象(如管理对象)在IOR创建和导出到名称服务器期间提供了已标记组件。 之后,当客户端使用IOR时,客户机根据标记的组件调用必要的安全措施,如认证,授权和传输保护。

    Application server object-level security for distributed computing domains
    5.
    发明授权
    Application server object-level security for distributed computing domains 有权
    分布式计算域的应用服务器对象级安全性

    公开(公告)号:US07448066B2

    公开(公告)日:2008-11-04

    申请号:US10246909

    申请日:2002-09-19

    CPC分类号: G06F21/31

    摘要: Objects on application servers may be defined into classes which receive different levels of security protection, such as definition of user objects and administrative objects. Domain-wide security may be enforced on administrative objects, which user object security may be configured separately for each application server in a domain. In a CORBA architecture, IOR's for shared objects which are to be secured on a domain-wide basis, such as administrative objects, are provided with tagged components during IOR creation and exporting to a name server. Later, when the IOR is used by a client, the client invokes necessary security measures such as authentication, authorization and transport protection according to the tagged components.

    摘要翻译: 应用服务器上的对象可以被定义为接收不同级别的安全保护的类,例如用户对象和管理对象的定义。 可以在管理对象上实施全域安全性,可以为域中的每个应用程序服务器单独配置哪些用户对象安全性。 在CORBA体系结构中,IOR对于在域范围内进行安全保护的共享对象(如管理对象)在IOR创建和导出到名称服务器期间提供了已标记组件。 之后,当客户端使用IOR时,客户机根据标记的组件调用必要的安全措施,如认证,授权和传输保护。

    Method and apparatus for handling custom token propagation without Java serialization
    6.
    发明申请
    Method and apparatus for handling custom token propagation without Java serialization 审中-公开
    用于在没有Java序列化的情况下处理自定义令牌传播的方法和装置

    公开(公告)号:US20060005234A1

    公开(公告)日:2006-01-05

    申请号:US10882118

    申请日:2004-06-30

    IPC分类号: G06F15/16

    CPC分类号: H04L63/0815 H04L29/06

    摘要: A method, apparatus and computer instructions for handling propagation of custom tokens without using Java™ serialization. A service provider may plug in a first login module to add a marker token to a subject for later use by an application at run time. The marker token is then serialized by the mechanism of the present invention by invoking a get bytes method on the token. The present invention then propagates the token downstream if the token is marked forwardable. At a target server, a second login module may be plugged in to deserialize a byte array from a list of tokens and perform custom operation on the byte array retrieved from a token holder.

    摘要翻译: 用于处理自定义令牌的传播而不使用Java(TM)序列化的方法,设备和计算机指令。 服务提供商可以插入第一登录模块以将标记标记添加到主体以供运行时应用程序稍后使用。 然后通过在令牌上调用get bytes方法,通过本发明的机制对标记标记进行序列化。 然后,如果令牌被标记为可向导,则本发明在下游传播令牌。 在目标服务器上,可以插入第二登录模块以反序列化令牌列表中的字节数组,并对从令牌持有者检索的字节数组执行自定义操作。

    METHOD AND APPARATUS FOR PREVENTING ROGUE IMPLEMENTATIONS OF A SECURITY-SENSITIVE CLASS INTERFACE

    公开(公告)号:US20080034202A1

    公开(公告)日:2008-02-07

    申请号:US11867015

    申请日:2007-10-04

    IPC分类号: H04L9/00

    CPC分类号: G06F21/64

    摘要: A method and apparatus for preventing rogue implementations of a security-sensitive class interface are provided. With the method and apparatus, a unique identifier (UID) is created by a server process when the server process is started. Anytime the server process, i.e. a server runtime environment, instantiates a new credential object following start-up of the server process, the encrypted UID is placed into a private field within the new credential object. In addition, the UID is encrypted and stored in a private class of the server runtime environment. A verification class is provided within the server runtime environment which includes one or more methods that receive the credential object as a parameter and return true or false as to the validity of the credential object. These one or more methods determine the validity of the credential object by retrieving the encrypted UID from the private class stored in the server runtime environment, decrypting the UID and comparing it to the decrypted UID stored in the private field of the credential object. If the two UIDs match, a determination is made that the credential object was created by the server runtime environment rather than a rogue application. If the two UIDs do not match, or if there is no UID in the credential object, then a false result will be returned by the verification class.

    Dynamic cache lookup based on dynamic data

    公开(公告)号:US20060020813A1

    公开(公告)日:2006-01-26

    申请号:US10881962

    申请日:2004-06-30

    IPC分类号: H04L9/00

    摘要: A system and method for tracking user security credentials in a distributed computing environment. The security credentials of an authenticated user includes not just his unique user identifier, but also a set of security attributes such as the time of authentication, the location where the user is authenticated (i.e., intranet user v. internet user), the authentication strength, and so on. The security attributes are used in access control decisions. The same user can be given different authorization if he has a different security attribute value. Security credentials may be generated either by WebSphere security code or by third party security provider code. This invention stores the user credentials in a distributed cache and provides a system and method to compute the unique key based on the dynamic security credentials for cache lookup

    Credential Delegation Using Identity Assertion
    10.
    发明申请
    Credential Delegation Using Identity Assertion 失效
    凭证授权使用身份证明

    公开(公告)号:US20080196097A1

    公开(公告)日:2008-08-14

    申请号:US12105257

    申请日:2008-04-17

    IPC分类号: G06F21/00 H04L9/32

    CPC分类号: H04L63/0807 H04L63/205

    摘要: Run-as credentials delegation using identity assertion is presented. A server receives a request from a client that includes the client's user identifier and password. The server authenticates the client and stores the client's user identifier without the corresponding password in a client credential storage area. The server determines if a run-as command is specified to communicate with a downstream server. If a run-as command is specified, the server retrieves a corresponding run-as identity which identifies whether a client credential type, a server credential type, or a specific identifier credential type should be used in the run-as command. The server retrieves an identified credential corresponding to the identified credential type, and sends the identified credential in an identity assertion token to a downstream server.

    摘要翻译: 呈现使用身份断言的运行凭证委派。 服务器从客户端收到包含客户端用户标识和密码的请求。 服务器对客户端进行身份验证,并将客户端的用户标识符存储在客户端凭证存储区域中,而没有相应的密码。 服务器确定是否指定了run-as命令来与下游服务器进行通信。 如果指定了run-as命令,则服务器将检索相应的运行身份,该身份标识在run-as命令中是否应使用客户端凭据类型,服务器凭据类型或特定标识符凭据类型。 服务器检索与所识别的证书类型相对应的已识别证书,并且将识别的身份认证令牌发送到下游服务器。