Targeted Patent: Patent: US8051098B2 Filed: 2001-04-19 Issued: 2011-11-01 Patent Holder: (Original Assignee) Teigel Processing AB LLC (Current Assignee) Alto Dynamics LLC ; Callahan Cellular LLC Inventor(s): Stephen F. Bisbee, Jack J. Moskowitz, Keith F. Becker, Ellis K. Peterson, Gordon W. Twaddell Title: Systems and methods for state-less authentication | Cross Reference / Shared Meaning between the Lines |
Charted Against: Patent: US6202151B1 Filed: 1997-05-09 Issued: 2001-03-13 Patent Holder: (Original Assignee) GTE Service Corp (Current Assignee) Verizon Patent and Licensing Inc Inventor(s): Clyde Musgrave, Robert S. Dulude Title: System and method for authenticating electronic transactions using biometric certificates |
[TRANSITIVE ID: 1] accessing, establishing, verifying | identifying, securing, monitoring, managing, enabling, processing, administering | [TRANSITIVE ID: 1] authenticating |
[FEATURE ID: 2] resources, secured transactions | users, applications, contexts, data, credentials, information, documents | [FEATURE ID: 2] electronic transactions |
[FEATURE ID: 3] common processing platform, time stamp, logon identifier | secret, token, nonce, credential, database, processor, pseudonym | [FEATURE ID: 3] transaction input device, public key, hash function, biometric digital signature, private key, network, biometric certificate management system, biometric database |
[TRANSITIVE ID: 4] comprising | of, including, by, having, utilizing, at, via | [TRANSITIVE ID: 4] involving, comprising, using |
[FEATURE ID: 5] user, resource | users, client, method, system, server, source, party | [FEATURE ID: 5] user |
[FEATURE ID: 6] logon component, user computing device, computing environment component | computer, component, controller, server, processor, module, network | [FEATURE ID: 6] system, biometric input device, registration authority, receiver, classifier |
[FEATURE ID: 7] interactive information exchange | authentication, identity, identifier, account | [FEATURE ID: 7] iris |
[FEATURE ID: 8] logon information, access limitations specific, resources such | information, parameters, credentials, indicia, characteristics, metadata, details | [FEATURE ID: 8] transaction data, biometric data, pre-registered biometric data |
[TRANSITIVE ID: 9] provided | published, communicated, made, issued, delivered, transferred, passed | [TRANSITIVE ID: 9] transmitted |
[FEATURE ID: 10] security context, stateless security context | signature, fingerprint, message, key, response, password, parameter | [FEATURE ID: 10] physical condition, biometric certificate, hash value signal, transaction signal |
[FEATURE ID: 11] necessary, operable | used, operative, arranged, adapted, effective, usable, sufficient | [FEATURE ID: 11] configured |
[FEATURE ID: 12] authorization communications | interaction, operation, authentication, activity | [FEATURE ID: 12] electronic transaction |
[FEATURE ID: 13] claim | figure, the claim, claimed, embodiment, item, clause, clair | [FEATURE ID: 13] claim |
[FEATURE ID: 14] information | input, identifier, authorization, authentication, identification | [FEATURE ID: 14] authentication decision signal |
[FEATURE ID: 15] unique identifier | template, record, fingerprint, signature | [FEATURE ID: 15] visual image |
[FEATURE ID: 16] apparatus | engine, entity, accelerator, authenticator, interface, agent | [FEATURE ID: 16] electronic transaction generator |
1 . A method of accessing [TRANSITIVE ID: 1] any of a plurality of resources [FEATURE ID: 2] wherein at least some of the resources do not share a common processing platform [FEATURE ID: 3] , the method comprising [TRANSITIVE ID: 4] : establishing [TRANSITIVE ID: 1] a secure communication session between a user [FEATURE ID: 5] computing device and a logon component [FEATURE ID: 6] , wherein the secure communication session comprises a temporary , interactive information exchange [FEATURE ID: 7] that is set up and then torn down ; verifying [TRANSITIVE ID: 1] logon information [FEATURE ID: 8] provided [TRANSITIVE ID: 9] by the user computing device to the logon component using the secure communication session and responsively generating a security context [FEATURE ID: 10] to be employed by the user computing device that is : unique to a user of the user computing device ; necessary [FEATURE ID: 11] to access any of the plurality of resources without requiring any follow - on authorization communications [FEATURE ID: 12] between the accessed resource [FEATURE ID: 5] and the logon component . 2 . The method of claim [FEATURE ID: 13] 1 wherein verifying the logon information comprises comparing the logon information to previously stored information [FEATURE ID: 14] that identifies the user . 3 . The method of claim 1 wherein a security context that is unique to the user comprises , at least in part , a unique identifier [FEATURE ID: 15] as corresponds to the user . 4 . The method of claim 1 wherein the security context comprises a stateless security context [FEATURE ID: 10] . 5 . The method of claim 1 wherein generating a security context to be employed by the user computing device [FEATURE ID: 6] comprises generating a security context that will support contemporaneously accessing at least two of the plurality of resources . 6 . The method of claim 1 wherein generating a security context comprises generating a security context that automatically preserves access limitations specific [FEATURE ID: 8] to the user as corresponds to varying ones of the plurality of resources such [FEATURE ID: 8] that the user ' s degree of access to a given accessed resource can vary notwithstanding a common use of the security context . 7 . The method of claim 1 wherein generating a security context comprises generating a time - limited security context . 8 . The method of claim 7 wherein generating a time - limited security context comprises including a time stamp [FEATURE ID: 3] in the security context . 9 . An apparatus [FEATURE ID: 16] comprising : at least one trusted computing environment component [FEATURE ID: 6] configured to facilitate : establishing a secure communication session between a user computing device and a logon component , wherein the secure communication session comprises a temporary , interactive information exchange that is set up and then torn down ; verifying logon information provided by the user computing device to the logon component using the secure communication session and responsively generating a security context that is : unique to a user of the user computing device ; necessary to access any of the plurality of resources without requiring any follow - on authorization communications between the accessed resource and the logon component . 10 . The apparatus of claim 9 wherein the security context comprises , at least in part , a unique identifier as corresponds to the user . 11 . The apparatus of claim 9 wherein the security context comprises a stateless security context . 12 . The apparatus of claim 9 wherein the security context is operable [FEATURE ID: 11] to support contemporaneously accessing at least two of the plurality of resources . 13 . The apparatus of claim 9 wherein the security context automatically preserves access limitations specific to the user as corresponds to varying ones of the plurality of resources such that the user ' s degree of access to a given accessed resource can permissibly vary notwithstanding a common use of the security context . 14 . The apparatus of claim 9 wherein the security context comprises a time - limited security context . 15 . The apparatus of claim 14 wherein the time - limited security context includes a time stamp . 16 . A method to facilitate accessing protected on - line resources via corresponding secured transactions [FEATURE ID: 2] , comprising : at a user computing device : presenting , to other than the on - line resources , at least a logon identifier [FEATURE ID: 3] |
1 . A system [FEATURE ID: 6] for authenticating [TRANSITIVE ID: 1] electronic transactions [FEATURE ID: 2] involving [TRANSITIVE ID: 4] a user [FEATURE ID: 5] , comprising [TRANSITIVE ID: 4] : a transaction input device [FEATURE ID: 3] configured [TRANSITIVE ID: 11] to receive transaction data [FEATURE ID: 8] relating to an electronic transaction [FEATURE ID: 12] ; a biometric input device [FEATURE ID: 6] configured to generate biometric data [FEATURE ID: 8] corresponding to a physical condition [FEATURE ID: 10] of the user ; a biometric certificate generator configured to generate a biometric certificate [FEATURE ID: 10] from the transaction data , the biometric data , and a public key [FEATURE ID: 3] corresponding to the user ; a hash function generator configured to generate a hash value signal [FEATURE ID: 10] from the biometric certificate using [TRANSITIVE ID: 4] a hash function [FEATURE ID: 3] ; a registration authority [FEATURE ID: 6] configured to generate a biometric digital signature [FEATURE ID: 3] from the hash value signal and a private key [FEATURE ID: 3] corresponding to the user ; an electronic transaction generator [FEATURE ID: 16] configured to generate a transaction signal [FEATURE ID: 10] , corresponding to the electronic transaction to be transmitted [TRANSITIVE ID: 9] over a network [FEATURE ID: 3] , from the biometric digital signature and the transaction data ; a receiver [FEATURE ID: 6] configured to receive the transaction signal from the network and process the received transaction signal to extract the biometric certificate ; and a biometric certificate management system [FEATURE ID: 3] configured to certify the electronic transaction as being from the user , including : a biometric data extractor configured to isolate the biometric data from the extracted biometric certificate , and a classifier [FEATURE ID: 6] configured to retrieve pre-registered biometric data [FEATURE ID: 8] corresponding to the user from a biometric database [FEATURE ID: 3] , compare the biometric data to the pre-registered biometric data , generate an authentication decision signal [FEATURE ID: 14] based on the comparison , and provide the authentication decision signal to the receiver to permit the receiver to determine whether the electronic transaction involves the user . 2 . The system of claim [FEATURE ID: 13] 1 , wherein the biometric input device includes at least one of : an iris reader configured to obtain a visual image [FEATURE ID: 15] of an iris [FEATURE ID: 7] |
Targeted Patent: Patent: US8051098B2 Filed: 2001-04-19 Issued: 2011-11-01 Patent Holder: (Original Assignee) Teigel Processing AB LLC (Current Assignee) Alto Dynamics LLC ; Callahan Cellular LLC Inventor(s): Stephen F. Bisbee, Jack J. Moskowitz, Keith F. Becker, Ellis K. Peterson, Gordon W. Twaddell Title: Systems and methods for state-less authentication | Cross Reference / Shared Meaning between the Lines |
Charted Against: Patent: US6192361B1 Filed: 1997-12-23 Issued: 2001-02-20 Patent Holder: (Original Assignee) Alcatel USA Sourcing Inc (Current Assignee) Alcatel USA Sourcing Inc Inventor(s): Peter Sung-An Huang Title: Full group privileges access system providing user access security protection for a telecommunications switching system |
[TRANSITIVE ID: 1] accessing, establishing | managing, implementing, maintaining, supporting, controlling, enabling, securing | [TRANSITIVE ID: 1] providing, having |
[FEATURE ID: 2] resources | data, entities, files, properties, information, users, applications | [FEATURE ID: 2] user identification, functions |
[TRANSITIVE ID: 3] share | maintain, use, operate, utilize, provide, implement, support | [TRANSITIVE ID: 3] access, execute, access |
[FEATURE ID: 4] common processing platform, logon identifier | database, network, firewall, host, client, system, browser | [FEATURE ID: 4] computer, server, first communication link, system security manager client building block, system security manager server building block, runtime library |
[TRANSITIVE ID: 5] comprising | including, comprises, involving, includes, compromising, having, of | [TRANSITIVE ID: 5] comprising |
[FEATURE ID: 6] logon component, interactive information exchange | computer, system, server, processor, network, controller, client | [FEATURE ID: 6] authorized, computer operable, server operable, second communication link, computer user, computer users |
[FEATURE ID: 7] logon information | information, communication, data, access, messages | [FEATURE ID: 7] communications |
[FEATURE ID: 8] security context | message, signal, key, request, code | [FEATURE ID: 8] command |
[FEATURE ID: 9] resource | users, element, party, network, application, computer, server | [FEATURE ID: 9] system, user |
[FEATURE ID: 10] claim | claimed, embodiment, item, clause, clair, figure, paragraph | [FEATURE ID: 10] claim |
[FEATURE ID: 11] part | partial, use, portion thereof, parts, general, selected portions, its entirety | [FEATURE ID: 11] part |
[FEATURE ID: 12] unique identifier | number, file, device, user, value | [FEATURE ID: 12] function |
[FEATURE ID: 13] user computing device | process, apparatus, computer, machine, network, server, platform | [FEATURE ID: 13] full group privileges access mechanism |
[FEATURE ID: 14] access limitations specific, degree, access, secured transactions | authentication, accessibility, permission, entitlement, credentials, privilege, use | [FEATURE ID: 14] security protection, authority, ability |
[FEATURE ID: 15] apparatus | application, environment, interface, infrastructure, agent, arrangement | [FEATURE ID: 15] application program |
[FEATURE ID: 16] computing environment component | module, system, computer, processor, controller | [FEATURE ID: 16] system manager building block |
1 . A method of accessing [TRANSITIVE ID: 1] any of a plurality of resources [FEATURE ID: 2] wherein at least some of the resources do not share [TRANSITIVE ID: 3] a common processing platform [FEATURE ID: 4] , the method comprising [TRANSITIVE ID: 5] : establishing [TRANSITIVE ID: 1] a secure communication session between a user computing device and a logon component [FEATURE ID: 6] , wherein the secure communication session comprises a temporary , interactive information exchange [FEATURE ID: 6] that is set up and then torn down ; verifying logon information [FEATURE ID: 7] provided by the user computing device to the logon component using the secure communication session and responsively generating a security context [FEATURE ID: 8] to be employed by the user computing device that is : unique to a user of the user computing device ; necessary to access any of the plurality of resources without requiring any follow - on authorization communications between the accessed resource [FEATURE ID: 9] and the logon component . 2 . The method of claim [FEATURE ID: 10] 1 wherein verifying the logon information comprises comparing the logon information to previously stored information that identifies the user . 3 . The method of claim 1 wherein a security context that is unique to the user comprises , at least in part [FEATURE ID: 11] , a unique identifier [FEATURE ID: 12] as corresponds to the user . 4 . The method of claim 1 wherein the security context comprises a stateless security context . 5 . The method of claim 1 wherein generating a security context to be employed by the user computing device [FEATURE ID: 13] comprises generating a security context that will support contemporaneously accessing at least two of the plurality of resources . 6 . The method of claim 1 wherein generating a security context comprises generating a security context that automatically preserves access limitations specific [FEATURE ID: 14] to the user as corresponds to varying ones of the plurality of resources such that the user ' s degree [FEATURE ID: 14] of access [FEATURE ID: 14] to a given accessed resource can vary notwithstanding a common use of the security context . 7 . The method of claim 1 wherein generating a security context comprises generating a time - limited security context . 8 . The method of claim 7 wherein generating a time - limited security context comprises including a time stamp in the security context . 9 . An apparatus [FEATURE ID: 15] comprising : at least one trusted computing environment component [FEATURE ID: 16] configured to facilitate : establishing a secure communication session between a user computing device and a logon component , wherein the secure communication session comprises a temporary , interactive information exchange that is set up and then torn down ; verifying logon information provided by the user computing device to the logon component using the secure communication session and responsively generating a security context that is : unique to a user of the user computing device ; necessary to access any of the plurality of resources without requiring any follow - on authorization communications between the accessed resource and the logon component . 10 . The apparatus of claim 9 wherein the security context comprises , at least in part , a unique identifier as corresponds to the user . 11 . The apparatus of claim 9 wherein the security context comprises a stateless security context . 12 . The apparatus of claim 9 wherein the security context is operable to support contemporaneously accessing at least two of the plurality of resources . 13 . The apparatus of claim 9 wherein the security context automatically preserves access limitations specific to the user as corresponds to varying ones of the plurality of resources such that the user ' s degree of access to a given accessed resource can permissibly vary notwithstanding a common use of the security context . 14 . The apparatus of claim 9 wherein the security context comprises a time - limited security context . 15 . The apparatus of claim 14 wherein the time - limited security context includes a time stamp . 16 . A method to facilitate accessing protected on - line resources via corresponding secured transactions [FEATURE ID: 14] , comprising : at a user computing device : presenting , to other than the on - line resources , at least a logon identifier [FEATURE ID: 4] |
1 . A full group privileges access mechanism [FEATURE ID: 13] for providing [TRANSITIVE ID: 1] security protection [FEATURE ID: 14] for a telecommunications switching system [FEATURE ID: 9] which is accessible by authorized [TRANSITIVE ID: 6] users using a computer [FEATURE ID: 4] , comprising [TRANSITIVE ID: 5] : a server [FEATURE ID: 4] having [TRANSITIVE ID: 1] an application program [FEATURE ID: 15] to access [TRANSITIVE ID: 3] the telecommunications switching system ; a computer operable [FEATURE ID: 6] to communicate with the server over a first communication link [FEATURE ID: 4] , the server operable [FEATURE ID: 6] to provide the application program to the computer upon request , the computer operable to execute [TRANSITIVE ID: 3] the application program , the computer operable to establish communications [FEATURE ID: 7] with the telecommunications switching system over a second communication link [FEATURE ID: 6] according to the application program ; storage files in the telecommunications switching system containing first information and second information associated with authorized user identification [FEATURE ID: 2] ; a system manager building block [FEATURE ID: 16] in the telecommunications switching system in communication with said computer , said system manager building block also being in communication with said storage files in order to access [FEATURE ID: 3] said first information for determining if a computer user [FEATURE ID: 6] is an authorized user , and in order to modify said first information ; a system security manager client building block [FEATURE ID: 4] in the telecommunications switching system in communication with said system manager building block ; and a system security manager server building block [FEATURE ID: 4] in the telecommunications switching system in communication with said system security manager client building block , said system security manager client building block and said system security manager server building block being jointly in communication with said storage files in order to access said second information , and in order to modify said second information , wherein said system manager building block provides communication between said computer and said system security manager client building block , and wherein said system security manager client building block provides communication between said system manager building block and said system security manager server building block . 2 . The full group privileges access mechanism of claim [FEATURE ID: 10] 1 , wherein said storage files containing said first and second information are configured to be maintained at least in part [FEATURE ID: 11] in a runtime library [FEATURE ID: 4] . 3 . The full group privileges access mechanism of claim 2 , wherein said system manager building block further comprises said runtime library . 4 . The full group privileges access mechanism of claim 1 , wherein the telecommunications switching system provides functions [FEATURE ID: 2] which can be accessed by said authorized users and commands which can be executed by said authorized users , and wherein said second information represents authority [FEATURE ID: 14] of an associated authorized user [FEATURE ID: 9] to access each said function [FEATURE ID: 12] and execute each said command [FEATURE ID: 8] , and controls the ability [FEATURE ID: 14] of the computer users [FEATURE ID: 6] |
Targeted Patent: Patent: US8051098B2 Filed: 2001-04-19 Issued: 2011-11-01 Patent Holder: (Original Assignee) Teigel Processing AB LLC (Current Assignee) Alto Dynamics LLC ; Callahan Cellular LLC Inventor(s): Stephen F. Bisbee, Jack J. Moskowitz, Keith F. Becker, Ellis K. Peterson, Gordon W. Twaddell Title: Systems and methods for state-less authentication | Cross Reference / Shared Meaning between the Lines |
Charted Against: Patent: US6185685B1 Filed: 1997-12-11 Issued: 2001-02-06 Patent Holder: (Original Assignee) International Business Machines Corp (Current Assignee) International Business Machines Corp Inventor(s): Stephen P. Morgan, Lance W. Russell, Benjamin Clay Reed Title: Security method and system for persistent storage and communications on computer network systems and computer network systems employing the same |
[FEATURE ID: 1] method, authorization communications, user computing device, ones | process, system, procedure, methods, aspects, operation, password method | [FEATURE ID: 1] login method, method, steps |
[TRANSITIVE ID: 2] accessing | using, identifying, calculating, providing, maintaining, implementing, selecting | [TRANSITIVE ID: 2] having, computing, decrypting |
[FEATURE ID: 3] resources, secured transactions | devices, users, networks, nodes, contexts, data, media | [FEATURE ID: 3] client computers, further transmissions |
[TRANSITIVE ID: 4] share | use, include, provide, control, maintain, have, support | [TRANSITIVE ID: 4] enhance, access |
[FEATURE ID: 5] common processing platform, computing, device, logon component, logon information, security context, resource, information, unique identifier, time stamp, apparatus, computing environment component, logon identifier | user, system, client, computer, server, host, password | [FEATURE ID: 5] network computer system, server computer, client computer, persistent storage device, control program, login ID, password PW, first client computer, key |
[TRANSITIVE ID: 6] comprising | having, involving, by, implementing, comprises, includes, compromising | [TRANSITIVE ID: 6] comprising, including |
[TRANSITIVE ID: 7] establishing, verifying | requesting, obtaining, providing, identifying, communicating, reading, storing | [TRANSITIVE ID: 7] receiving, transmitting |
[FEATURE ID: 8] secure communication session | network, channel, link | [FEATURE ID: 8] communication network |
[FEATURE ID: 9] user | source, subscriber, customer, users | [FEATURE ID: 9] user |
[FEATURE ID: 10] interactive information exchange | authentication, password, identifier, secret, key | [FEATURE ID: 10] encryption key |
[TRANSITIVE ID: 11] set | locked, booted, started | [TRANSITIVE ID: 11] operated |
[FEATURE ID: 12] stateless security context | password, cipher, cryptogram, secret | [FEATURE ID: 12] decryption key |
[FEATURE ID: 13] access limitations specific, access | authentication, confidentiality, privacy, trust, control, visibility, accessibility | [FEATURE ID: 13] security |
[FEATURE ID: 14] common use | function, modification, value, portion | [FEATURE ID: 14] hash value H |
1 . A method [FEATURE ID: 1] of accessing [TRANSITIVE ID: 2] any of a plurality of resources [FEATURE ID: 3] wherein at least some of the resources do not share [TRANSITIVE ID: 4] a common processing platform [FEATURE ID: 5] , the method comprising [TRANSITIVE ID: 6] : establishing [TRANSITIVE ID: 7] a secure communication session [FEATURE ID: 8] between a user [FEATURE ID: 9] computing [TRANSITIVE ID: 5] device [FEATURE ID: 5] and a logon component [FEATURE ID: 5] , wherein the secure communication session comprises a temporary , interactive information exchange [FEATURE ID: 10] that is set [TRANSITIVE ID: 11] up and then torn down ; verifying [TRANSITIVE ID: 7] logon information [FEATURE ID: 5] provided by the user computing device to the logon component using the secure communication session and responsively generating a security context [FEATURE ID: 5] to be employed by the user computing device that is : unique to a user of the user computing device ; necessary to access any of the plurality of resources without requiring any follow - on authorization communications [FEATURE ID: 1] between the accessed resource [FEATURE ID: 5] and the logon component . 2 . The method of claim 1 wherein verifying the logon information comprises comparing the logon information to previously stored information [FEATURE ID: 5] that identifies the user . 3 . The method of claim 1 wherein a security context that is unique to the user comprises , at least in part , a unique identifier [FEATURE ID: 5] as corresponds to the user . 4 . The method of claim 1 wherein the security context comprises a stateless security context [FEATURE ID: 12] . 5 . The method of claim 1 wherein generating a security context to be employed by the user computing device [FEATURE ID: 1] comprises generating a security context that will support contemporaneously accessing at least two of the plurality of resources . 6 . The method of claim 1 wherein generating a security context comprises generating a security context that automatically preserves access limitations specific [FEATURE ID: 13] to the user as corresponds to varying ones [FEATURE ID: 1] of the plurality of resources such that the user ' s degree of access [FEATURE ID: 13] to a given accessed resource can vary notwithstanding a common use [FEATURE ID: 14] of the security context . 7 . The method of claim 1 wherein generating a security context comprises generating a time - limited security context . 8 . The method of claim 7 wherein generating a time - limited security context comprises including a time stamp [FEATURE ID: 5] in the security context . 9 . An apparatus [FEATURE ID: 5] comprising : at least one trusted computing environment component [FEATURE ID: 5] configured to facilitate : establishing a secure communication session between a user computing device and a logon component , wherein the secure communication session comprises a temporary , interactive information exchange that is set up and then torn down ; verifying logon information provided by the user computing device to the logon component using the secure communication session and responsively generating a security context that is : unique to a user of the user computing device ; necessary to access any of the plurality of resources without requiring any follow - on authorization communications between the accessed resource and the logon component . 10 . The apparatus of claim 9 wherein the security context comprises , at least in part , a unique identifier as corresponds to the user . 11 . The apparatus of claim 9 wherein the security context comprises a stateless security context . 12 . The apparatus of claim 9 wherein the security context is operable to support contemporaneously accessing at least two of the plurality of resources . 13 . The apparatus of claim 9 wherein the security context automatically preserves access limitations specific to the user as corresponds to varying ones of the plurality of resources such that the user ' s degree of access to a given accessed resource can permissibly vary notwithstanding a common use of the security context . 14 . The apparatus of claim 9 wherein the security context comprises a time - limited security context . 15 . The apparatus of claim 14 wherein the time - limited security context includes a time stamp . 16 . A method to facilitate accessing protected on - line resources via corresponding secured transactions [FEATURE ID: 3] , comprising : at a user computing device : presenting , to other than the on - line resources , at least a logon identifier [FEATURE ID: 5] |
1 . A login method [FEATURE ID: 1] to enhance [TRANSITIVE ID: 4] security [FEATURE ID: 13] in a network computer system [FEATURE ID: 5] having [TRANSITIVE ID: 2] at least one server computer [FEATURE ID: 5] coupled over a communication network [FEATURE ID: 8] to a plurality of client computers [FEATURE ID: 3] , wherein each client computer [FEATURE ID: 5] is coupled to directly access [TRANSITIVE ID: 4] a persistent storage device [FEATURE ID: 5] and wherein each client computer is operated [TRANSITIVE ID: 11] by a control program [FEATURE ID: 5] after login , the method [FEATURE ID: 1] comprising [TRANSITIVE ID: 6] the steps [FEATURE ID: 1] of : receiving [TRANSITIVE ID: 7] a login ID [FEATURE ID: 5] and password PW [FEATURE ID: 5] from a user [FEATURE ID: 9] at a first one of said client computers ; computing [FEATURE ID: 2] , at said first client computer [FEATURE ID: 5] , a hash value H [FEATURE ID: 14] 1 PW of the password PW ; transmitting [TRANSITIVE ID: 7] a first - stage login request including [TRANSITIVE ID: 6] ID from said first client computer to a first one of said server computers ; receiving said first - stage login request at said first server computer ; providing , at said first server computer , a key [FEATURE ID: 5] - exchange key KEK ; encrypting KEK at said first server computer ; transmitting a first - stage login response , including the encrypted KEK , from said first server computer to said first client computer ; receiving said first - stage login response at said first client computer ; decrypting [FEATURE ID: 2] , at said first client computer , the encrypted KEK , to yield KEK ; providing , at said first client computer , a first split key SK 1 ; encrypting , at said first client computer , key SK 1 , using KEK as an encryption key [FEATURE ID: 10] , to yield ESK 1 ; transmitting a second - stage login request , including ESK 1 , from said first client computer to said first server computer ; receiving said second - stage login request at said first server computer ; decrypting , at said first server computer , ESK 1 , using KEK as a decryption key [FEATURE ID: 12] , to yield SK 1 ; providing , at said first server computer , a second split key SK 2 ; combining , at said first server computer , the first and second split keys SK 1 an SK 2 , to yield session key SK ; encrypting , at said first server computer , the second split key SK 2 , using KEK as an encryption key , to yield ESK 2 ; transmitting a second - stage login response , including ESK 2 , from said first server computer to said first client computer ; receiving the second - stage login response at said first client computer ; decrypting , at said first client computer , ESK 2 received with the second - stage login response , using KEK as a decryption key , to yield SK 2 ; combining , at said first client computer , the first and second split keys SK 1 and SK 2 , to yield sessions key SK ; encrypting further transmissions [FEATURE ID: 3] |
Targeted Patent: Patent: US8051098B2 Filed: 2001-04-19 Issued: 2011-11-01 Patent Holder: (Original Assignee) Teigel Processing AB LLC (Current Assignee) Alto Dynamics LLC ; Callahan Cellular LLC Inventor(s): Stephen F. Bisbee, Jack J. Moskowitz, Keith F. Becker, Ellis K. Peterson, Gordon W. Twaddell Title: Systems and methods for state-less authentication | Cross Reference / Shared Meaning between the Lines |
Charted Against: Patent: US6185683B1 Filed: 1995-02-13 Issued: 2001-02-06 Patent Holder: (Original Assignee) Intertrust Technologies Corp (Current Assignee) Intertrust Technologies Corp Inventor(s): Karl L. Ginter, Victor H. Shear, Francis J. Spahn, David M. Van Wie, Robert P. Weber Title: Trusted and secure techniques, systems and methods for item delivery and execution |
[TRANSITIVE ID: 1] accessing, verifying | monitoring, using, processing, securing, recording, requesting, handling | [TRANSITIVE ID: 1] governing, receiving |
[FEATURE ID: 2] common processing platform, computing, device, interactive information exchange, unique identifier, stateless security context, time stamp, computing environment component, logon identifier | user, token, key, code, policy, password, license | [FEATURE ID: 2] first apparatus, memory, first secure container rule, secure container rule, second secure container rule, second apparatus, third apparatus different, digital certificate, digital signature |
[TRANSITIVE ID: 3] comprising, establishing | providing, having, of, executing, implementing, with, maintaining | [TRANSITIVE ID: 3] including, storing |
[FEATURE ID: 4] user | method, using, subscriber, customer, users, single user | [FEATURE ID: 4] user |
[FEATURE ID: 5] logon component | network, user, controller, platform, computer | [FEATURE ID: 5] processor |
[FEATURE ID: 6] logon information | data, instructions, secure containers, the, indicia, messages, contents | [FEATURE ID: 6] information, receipt information |
[FEATURE ID: 7] security context | value, policy, message, parameter, condition, code | [FEATURE ID: 7] rule |
[FEATURE ID: 8] necessary, operable | configured, adapted, required, and, provided, needed, utilized | [FEATURE ID: 8] used |
[FEATURE ID: 9] authorization communications, access limitations specific, access | authentication, authority, entitlement, interaction, rights, permission, interest | [FEATURE ID: 9] access |
[FEATURE ID: 10] resource | element, environment, content, object, asset, application, idea | [FEATURE ID: 10] item, aspect |
[FEATURE ID: 11] claim | claimed, embodiment, item, clause, clam, paragraph, figure | [FEATURE ID: 11] claim |
[FEATURE ID: 12] information | logic, authorization, software, knowledge, metadata, code | [FEATURE ID: 12] audit information |
[FEATURE ID: 13] part | partial, some, parts, 10 part | [FEATURE ID: 13] part |
[FEATURE ID: 14] user computing device | device, network, apparatus, software, platform, method, machine | [FEATURE ID: 14] system, hardware |
[FEATURE ID: 15] apparatus | authenticator, element, interface, entity | [FEATURE ID: 15] electronic seal |
1 . A method of accessing [TRANSITIVE ID: 1] any of a plurality of resources wherein at least some of the resources do not share a common processing platform [FEATURE ID: 2] , the method comprising [TRANSITIVE ID: 3] : establishing [TRANSITIVE ID: 3] a secure communication session between a user [FEATURE ID: 4] computing [TRANSITIVE ID: 2] device [FEATURE ID: 2] and a logon component [FEATURE ID: 5] , wherein the secure communication session comprises a temporary , interactive information exchange [FEATURE ID: 2] that is set up and then torn down ; verifying [TRANSITIVE ID: 1] logon information [FEATURE ID: 6] provided by the user computing device to the logon component using the secure communication session and responsively generating a security context [FEATURE ID: 7] to be employed by the user computing device that is : unique to a user of the user computing device ; necessary [FEATURE ID: 8] to access any of the plurality of resources without requiring any follow - on authorization communications [FEATURE ID: 9] between the accessed resource [FEATURE ID: 10] and the logon component . 2 . The method of claim [FEATURE ID: 11] 1 wherein verifying the logon information comprises comparing the logon information to previously stored information [FEATURE ID: 12] that identifies the user . 3 . The method of claim 1 wherein a security context that is unique to the user comprises , at least in part [FEATURE ID: 13] , a unique identifier [FEATURE ID: 2] as corresponds to the user . 4 . The method of claim 1 wherein the security context comprises a stateless security context [FEATURE ID: 2] . 5 . The method of claim 1 wherein generating a security context to be employed by the user computing device [FEATURE ID: 14] comprises generating a security context that will support contemporaneously accessing at least two of the plurality of resources . 6 . The method of claim 1 wherein generating a security context comprises generating a security context that automatically preserves access limitations specific [FEATURE ID: 9] to the user as corresponds to varying ones of the plurality of resources such that the user ' s degree of access [FEATURE ID: 9] to a given accessed resource can vary notwithstanding a common use of the security context . 7 . The method of claim 1 wherein generating a security context comprises generating a time - limited security context . 8 . The method of claim 7 wherein generating a time - limited security context comprises including a time stamp [FEATURE ID: 2] in the security context . 9 . An apparatus [FEATURE ID: 15] comprising : at least one trusted computing environment component [FEATURE ID: 2] configured to facilitate : establishing a secure communication session between a user computing device and a logon component , wherein the secure communication session comprises a temporary , interactive information exchange that is set up and then torn down ; verifying logon information provided by the user computing device to the logon component using the secure communication session and responsively generating a security context that is : unique to a user of the user computing device ; necessary to access any of the plurality of resources without requiring any follow - on authorization communications between the accessed resource and the logon component . 10 . The apparatus of claim 9 wherein the security context comprises , at least in part , a unique identifier as corresponds to the user . 11 . The apparatus of claim 9 wherein the security context comprises a stateless security context . 12 . The apparatus of claim 9 wherein the security context is operable [FEATURE ID: 8] to support contemporaneously accessing at least two of the plurality of resources . 13 . The apparatus of claim 9 wherein the security context automatically preserves access limitations specific to the user as corresponds to varying ones of the plurality of resources such that the user ' s degree of access to a given accessed resource can permissibly vary notwithstanding a common use of the security context . 14 . The apparatus of claim 9 wherein the security context comprises a time - limited security context . 15 . The apparatus of claim 14 wherein the time - limited security context includes a time stamp . 16 . A method to facilitate accessing protected on - line resources via corresponding secured transactions , comprising : at a user computing device : presenting , to other than the on - line resources , at least a logon identifier [FEATURE ID: 2] |
1 . A system [FEATURE ID: 14] including [TRANSITIVE ID: 3] : a first apparatus [FEATURE ID: 2] including , user controls , a communications port , a processor [FEATURE ID: 5] , a memory [FEATURE ID: 2] storing [TRANSITIVE ID: 3] : a first secure container containing a governed item [FEATURE ID: 10] , the first secure container governed item being at least in part [FEATURE ID: 13] encrypted ; a first secure container rule [FEATURE ID: 2] at least in part governing [TRANSITIVE ID: 1] an aspect [FEATURE ID: 10] of access [FEATURE ID: 9] to or use of said first secure container governed item ; and a second secure container , the second secure container containing audit information [FEATURE ID: 12] ; and hardware [FEATURE ID: 14] or software used [TRANSITIVE ID: 8] for receiving [TRANSITIVE ID: 1] and opening secure containers , said secure containers each including the capacity to contain a governed item , a secure container rule [FEATURE ID: 2] being associated with each of said secure containers ; a protected processing environment at least in part protecting information [FEATURE ID: 6] contained in said protected processing environment from tampering by a user [FEATURE ID: 4] of said first apparatus , said protected processing environment including hardware or software used for applying said first secure container rule and a second secure container rule [FEATURE ID: 2] in combination to at least in part govern at least one aspect of access to or use of a governed item contained in a secure container ; and hardware or software used for transmission of secure containers to other apparatuses or for the receipt of secure containers from other apparatuses . 2 . A system including : a first apparatus including , user controls , a communications port , a processor , a memory storing : a first secure container containing a governed item , the first secure container governed item being at least in part encrypted ; the first secure container having been received from a second apparatus [FEATURE ID: 2] ; a first secure container rule at least in part governing an aspect of access to or use of said first secure container governed item , the first secure container rule , the first secure container rule having been received from a third apparatus different [FEATURE ID: 2] from said second apparatus ; and hardware or software used for receiving and opening secure containers , said secure containers each including the capacity to contain a governed item , a secure container rule being associated with each of said secure containers ; a protected processing environment at least in part protecting information contained in said protected processing environment from tampering by a user of said first apparatus , said protected processing environment including hardware or software used for applying said first secure container rule and a second secure container rule in combination to at least in part govern at least one aspect of access to or use of a governed item contained in a secure container ; and hardware or software used for transmission of secure containers to other apparatuses or for the receipt of secure containers from other apparatuses . 3 . A system including : a first apparatus including , user controls , a communications port , a processor , a memory storing : a first secure container containing a governed item , the first secure container governed item being at least in part encrypted ; a first secure container rule at least in part governing an aspect of access to or use of said first secure container governed item ; and a second secure container containing a digital certificate [FEATURE ID: 2] ; hardware or software used for receiving and opening secure containers , said secure containers each including the capacity to contain a governed item , a secure container rule being associated with each of said secure containers ; a protected processing environment at least in part protecting information contained in said protected processing environment from tampering by a user of said first apparatus , said protected processing environment including hardware or software used for applying said first secure container rule and a second secure container rule in combination to at least in part govern at least one aspect of access to or use of a governed item contained in a secure container ; and hardware or software used for transmission of secure containers to other apparatuses or for the receipt of secure containers from other apparatuses . 4 . A system as in claim [FEATURE ID: 11] 3 , said memory storing a rule [FEATURE ID: 7] associated with said second secure container , said rule associated with said second secure container at least in part governing at least one aspect of access to or use of said digital certificate . 5 . A system including : a first apparatus including , user controls , a communications port , a processor , a memory storing , a first secure container containing a governed item , the first secure container governed item being at least in part encrypted ; a first secure container rule at least in part governing an aspect of access to or use of said first secure container governed item ; and a second secure container containing a digital signature [FEATURE ID: 2] , the second secure container being different from said first secure container ; hardware or software used for receiving and opening secure containers , said secure containers each including the capacity to contain a governed item , a secure container rule being associated with each of said secure containers ; a protected processing environment at least in part protecting information contained in said protected processing environment from tampering by a user of said first apparatus , said protected processing environment including hardware or software used for applying said first secure container rule and a second secure container rule in combination to at least in part govern at least one aspect of access to or use of a governed item contained in a secure container ; and hardware or software used for transmission of secure containers to other apparatuses or for the receipt of secure containers from other apparatuses . 6 . A system as in claim 5 , said memory storing a rule at least in part governing an aspect of access to or use of said digital signature . 7 . A system including : a first apparatus including , user controls , a communications port , a processor , a memory storing : a first secure container containing a governed item , the first secure econainer governed item being at least in part encrypted ; a first secure container rule at least in part governing an aspect of access to or use of said first secure container governed item ; and an electronic seal [FEATURE ID: 15] including receipt information [FEATURE ID: 6] |
Targeted Patent: Patent: US8051098B2 Filed: 2001-04-19 Issued: 2011-11-01 Patent Holder: (Original Assignee) Teigel Processing AB LLC (Current Assignee) Alto Dynamics LLC ; Callahan Cellular LLC Inventor(s): Stephen F. Bisbee, Jack J. Moskowitz, Keith F. Becker, Ellis K. Peterson, Gordon W. Twaddell Title: Systems and methods for state-less authentication | Cross Reference / Shared Meaning between the Lines |
Charted Against: Patent: US6185681B1 Filed: 1998-05-07 Issued: 2001-02-06 Patent Holder: (Original Assignee) MAZ TECHNOLOGIES Inc; MAZ TECHNOLOGIES Inc A CALIFORNIA Corp (Current Assignee) RPX Corp Inventor(s): Stephen Zizzi Title: Method of transparent encryption and decryption for an electronic document management system |
[FEATURE ID: 1] method | dynamic method, way, system method, wireless method, process, methods, system | [FEATURE ID: 1] method |
[TRANSITIVE ID: 2] accessing, establishing, verifying | identifying, providing, activating, creating, generating, processing, receiving | [TRANSITIVE ID: 2] encrypting, including, issuing, using, trapping, obtaining, authentication |
[FEATURE ID: 3] resources | users, parameters, documents, files | [FEATURE ID: 3] user identification |
[FEATURE ID: 4] common processing platform, device, unique identifier, stateless security context, time stamp, logon identifier | user, computer, token, password, memory, browser, file | [FEATURE ID: 4] general purpose computer, user input device, document, SQL database, SQL database server, SQL database client, encryption key values, portable data storage device, smart card, biometric recognition system, characteristic, database |
[TRANSITIVE ID: 5] comprising | including, involves, providing, encompassing, of, by, having | [TRANSITIVE ID: 5] comprising |
[FEATURE ID: 6] user | method, subscriber, customer, client | [FEATURE ID: 6] user |
[TRANSITIVE ID: 7] computing | computer, device, user | [TRANSITIVE ID: 7] smart card reader |
[FEATURE ID: 8] logon component | scanner, memory, network, mouse, database, keyboard, cache | [FEATURE ID: 8] display, crypto module, processor, data reader device |
[FEATURE ID: 9] interactive information exchange, access limitations specific, access, secured transactions | authentication, identity, authorization, permission, credentials, security, context | [FEATURE ID: 9] encryption key value, control, access module, user authentication, information |
[TRANSITIVE ID: 10] torn | closed, set, shut | [TRANSITIVE ID: 10] close |
[FEATURE ID: 11] logon information | information, indicia, identification, inputs, authorization, parameters, feedback | [FEATURE ID: 11] encryption key name, unique information |
[FEATURE ID: 12] security context | message, signal, key, request | [FEATURE ID: 12] command |
[FEATURE ID: 13] necessary | used, operable, executable | [FEATURE ID: 13] running |
[FEATURE ID: 14] resource, user computing device, apparatus, computing environment component | application, interface, object, element, environment, entity, agent | [FEATURE ID: 14] electronic document, application program, event, electronic document management system |
[FEATURE ID: 15] claim | step, clam, paragraph, the claim, of claim, figure, preceding claim | [FEATURE ID: 15] claim |
[FEATURE ID: 16] information | input, identifier, identification | [FEATURE ID: 16] indicator |
[FEATURE ID: 17] ones, resources such, other | instances, resources, one, numbers, characteristics, others, limitations | [FEATURE ID: 17] plural encryption key values |
[FEATURE ID: 18] operable | employed, specified, utilized, used, provided, generated | [FEATURE ID: 18] open |
1 . A method [FEATURE ID: 1] of accessing [TRANSITIVE ID: 2] any of a plurality of resources [FEATURE ID: 3] wherein at least some of the resources do not share a common processing platform [FEATURE ID: 4] , the method comprising [TRANSITIVE ID: 5] : establishing [TRANSITIVE ID: 2] a secure communication session between a user [FEATURE ID: 6] computing [TRANSITIVE ID: 7] device [FEATURE ID: 4] and a logon component [FEATURE ID: 8] , wherein the secure communication session comprises a temporary , interactive information exchange [FEATURE ID: 9] that is set up and then torn [TRANSITIVE ID: 10] down ; verifying [TRANSITIVE ID: 2] logon information [FEATURE ID: 11] provided by the user computing device to the logon component using the secure communication session and responsively generating a security context [FEATURE ID: 12] to be employed by the user computing device that is : unique to a user of the user computing device ; necessary [FEATURE ID: 13] to access any of the plurality of resources without requiring any follow - on authorization communications between the accessed resource [FEATURE ID: 14] and the logon component . 2 . The method of claim [FEATURE ID: 15] 1 wherein verifying the logon information comprises comparing the logon information to previously stored information [FEATURE ID: 16] that identifies the user . 3 . The method of claim 1 wherein a security context that is unique to the user comprises , at least in part , a unique identifier [FEATURE ID: 4] as corresponds to the user . 4 . The method of claim 1 wherein the security context comprises a stateless security context [FEATURE ID: 4] . 5 . The method of claim 1 wherein generating a security context to be employed by the user computing device [FEATURE ID: 14] comprises generating a security context that will support contemporaneously accessing at least two of the plurality of resources . 6 . The method of claim 1 wherein generating a security context comprises generating a security context that automatically preserves access limitations specific [FEATURE ID: 9] to the user as corresponds to varying ones [FEATURE ID: 17] of the plurality of resources such [FEATURE ID: 17] that the user ' s degree of access [FEATURE ID: 9] to a given accessed resource can vary notwithstanding a common use of the security context . 7 . The method of claim 1 wherein generating a security context comprises generating a time - limited security context . 8 . The method of claim 7 wherein generating a time - limited security context comprises including a time stamp [FEATURE ID: 4] in the security context . 9 . An apparatus [FEATURE ID: 14] comprising : at least one trusted computing environment component [FEATURE ID: 14] configured to facilitate : establishing a secure communication session between a user computing device and a logon component , wherein the secure communication session comprises a temporary , interactive information exchange that is set up and then torn down ; verifying logon information provided by the user computing device to the logon component using the secure communication session and responsively generating a security context that is : unique to a user of the user computing device ; necessary to access any of the plurality of resources without requiring any follow - on authorization communications between the accessed resource and the logon component . 10 . The apparatus of claim 9 wherein the security context comprises , at least in part , a unique identifier as corresponds to the user . 11 . The apparatus of claim 9 wherein the security context comprises a stateless security context . 12 . The apparatus of claim 9 wherein the security context is operable [FEATURE ID: 18] to support contemporaneously accessing at least two of the plurality of resources . 13 . The apparatus of claim 9 wherein the security context automatically preserves access limitations specific to the user as corresponds to varying ones of the plurality of resources such that the user ' s degree of access to a given accessed resource can permissibly vary notwithstanding a common use of the security context . 14 . The apparatus of claim 9 wherein the security context comprises a time - limited security context . 15 . The apparatus of claim 14 wherein the time - limited security context includes a time stamp . 16 . A method to facilitate accessing protected on - line resources via corresponding secured transactions [FEATURE ID: 9] , comprising : at a user computing device : presenting , to other [FEATURE ID: 17] than the on - line resources , at least a logon identifier [FEATURE ID: 4] |
1 . A method [FEATURE ID: 1] of encrypting [TRANSITIVE ID: 2] an electronic document [FEATURE ID: 14] which is open [FEATURE ID: 18] in an application program [FEATURE ID: 14] running [TRANSITIVE ID: 13] in a general purpose computer [FEATURE ID: 4] , the general purpose computer including [TRANSITIVE ID: 2] a display [FEATURE ID: 8] , a user input device [FEATURE ID: 4] , a crypto module [FEATURE ID: 8] and a processor [FEATURE ID: 8] , the method comprising [TRANSITIVE ID: 5] : ( a ) from within the application program running in the general purpose computer , a user [FEATURE ID: 6] issuing [TRANSITIVE ID: 2] one of a “ close [FEATURE ID: 10] , ” “ save ” or “ save as ” command [FEATURE ID: 12] for the document [FEATURE ID: 4] using [TRANSITIVE ID: 2] the user input device ; ( b ) automatically translating the command into an event [FEATURE ID: 14] ; ( c ) the crypto module automatically trapping [TRANSITIVE ID: 2] the event ; ( d ) the crypto module automatically obtaining [TRANSITIVE ID: 2] an encryption key value [FEATURE ID: 9] ; ( e ) the crypto module automatically encrypting the document using the encryption key value ; ( f ) the crypto module automatically passing control [FEATURE ID: 9] to an electronic document management system [FEATURE ID: 14] ; and ( g ) the electronic document management system executing the issued “ close , ” “ save ” or “ save as ” command ; whereby the electronic document is automatically encrypted . 2 . A method of encrypting a document as set forth in claim [FEATURE ID: 15] 1 wherein the electronic document management system comprises a SQL database [FEATURE ID: 4] , a SQL database server [FEATURE ID: 4] and a SQL database client [FEATURE ID: 4] , the SQL database client being disposed in the general purpose computer . 3 . A method of encrypting a document as set forth in claim 1 where step ( d ) comprises the steps of the crypto module determining if the document should be encrypted , and if not , then skipping step ( e ) , and if so , then : the crypto module retrieving an encryption key name [FEATURE ID: 11] associated with the document ; and the crypto module retrieving the encryption key value associated with the encryption key name . 4 . A method of encrypting a document as set forth in claim 3 , wherein there are plural encryption key values [FEATURE ID: 17] and at least one encryption key value is associated with the user , the method further comprising the steps of : the user submitting to an access module [FEATURE ID: 9] for user authentication [FEATURE ID: 9] ; if the access module does not authenticate the user , then always skipping steps ( d ) and ( e ) ; else in step ( d ) , the crypto module retrieving the encryption key value associated with the encryption key name and the user . 5 . A method of encrypting a document as set forth in claim 4 , the general purpose computer further comprising a data reader device [FEATURE ID: 8] for reading user identification [FEATURE ID: 3] and encryption key values [FEATURE ID: 4] from a portable data storage device [FEATURE ID: 4] , the method further comprising the user presenting the portable data storage device to the data reader device , wherein the access module utilizes information [FEATURE ID: 9] stored in the portable data storage device to authenticate the user , and the encryption key value associated with the user is stored in the portable data storage device . 6 . A method of encrypting a document as set forth in claim 5 , wherein the data reader device comprises a smart card reader [FEATURE ID: 7] and the portable data storage device comprises a smart card [FEATURE ID: 4] . 7 . A method of encrypting a document as set forth in claim 5 , wherein the data reader device comprises a biometric recognition system [FEATURE ID: 4] and the portable data storage device comprises the user , wherein the access module utilizes unique information [FEATURE ID: 11] about the user for authentication [FEATURE ID: 2] , and the encryption key value is derived from at least one characteristic [FEATURE ID: 4] of the user . 8 . A method of encrypting a document as set forth in claim 1 wherein the electronic document management system comprises a database [FEATURE ID: 4] , the database including an indicator [FEATURE ID: 16] |
Targeted Patent: Patent: US8051098B2 Filed: 2001-04-19 Issued: 2011-11-01 Patent Holder: (Original Assignee) Teigel Processing AB LLC (Current Assignee) Alto Dynamics LLC ; Callahan Cellular LLC Inventor(s): Stephen F. Bisbee, Jack J. Moskowitz, Keith F. Becker, Ellis K. Peterson, Gordon W. Twaddell Title: Systems and methods for state-less authentication | Cross Reference / Shared Meaning between the Lines |
Charted Against: Patent: US6178511B1 Filed: 1998-04-30 Issued: 2001-01-23 Patent Holder: (Original Assignee) International Business Machines Corp (Current Assignee) International Business Machines Corp Inventor(s): Richard Jay Cohen, Richard Allen Forsberg, Paul A. Kallfelz, Jr., John Robert Meckstroth, Christopher James Pascoe, Andrea Lynn Snow-Weaver Title: Coordinating user target logons in a single sign-on (SSO) environment |
[FEATURE ID: 1] method, secure communication session, security context, information, access | process, procedure, session, manner, configuration, service, network | [FEATURE ID: 1] method, logon process, steps, logon attempt, step, subsequent session, operation, computer enterprise |
[TRANSITIVE ID: 2] accessing, comprising, establishing, verifying | implementing, providing, using, involving, enabling, including, obtaining | [TRANSITIVE ID: 2] comprising, having, storing, identifying |
[FEATURE ID: 3] resources, resource, user computing device, ones, resources such, line resources | data, systems, information, users, properties, services, credentials | [FEATURE ID: 3] multiple target resources, target resources, applications, target resource, different logon processes, configuration directives, methods, associated methods |
[TRANSITIVE ID: 4] share | provide, utilize, operate, define, access, support, implement | [TRANSITIVE ID: 4] require |
[FEATURE ID: 5] common processing platform, device, logon component, unique identifier, stateless security context, time stamp, apparatus, computing environment component, logon identifier | service, token, system, configuration, process, client, computer | [FEATURE ID: 5] computer enterprise environment, access, particular application, user, target application, configuration directive, user id, password, change password operation, particular configuration directive, application, session |
[FEATURE ID: 6] user, common use | definition, source, configuration, customer, function, client | [FEATURE ID: 6] provider |
[TRANSITIVE ID: 7] computing | communication, processing, user | [TRANSITIVE ID: 7] user information |
[TRANSITIVE ID: 8] comprises | permits, represents, requires, defines, specifies, facilitates, indicates | [TRANSITIVE ID: 8] enables |
[FEATURE ID: 9] interactive information exchange | identity, identifier, authentication | [FEATURE ID: 9] specific information |
[FEATURE ID: 10] logon information | information, login, access, indicia, details, parameters, authorization | [FEATURE ID: 10] logon, respect, state information |
[FEATURE ID: 11] unique, limited security context | corresponding, dedicated, particular, different, sensitive, defined, based | [FEATURE ID: 11] given, specific |
[FEATURE ID: 12] necessary, operable | effective, used, appropriate, configured, available, operative, sufficient | [FEATURE ID: 12] required |
[FEATURE ID: 13] follow | instant, logged, signing, power | [FEATURE ID: 13] single sign |
[FEATURE ID: 14] authorization communications | synchronization, authentication, communication | [FEATURE ID: 14] access |
[FEATURE ID: 15] claim | step, claimed, embodiment, item, clam, fig, figure | [FEATURE ID: 15] claim |
[FEATURE ID: 16] access limitations specific | permission, entitlement, credentials | [FEATURE ID: 16] authority |
[FEATURE ID: 17] secured transactions | sessions, identities, devices, accounts | [FEATURE ID: 17] users |
1 . A method [FEATURE ID: 1] of accessing [TRANSITIVE ID: 2] any of a plurality of resources [FEATURE ID: 3] wherein at least some of the resources do not share [TRANSITIVE ID: 4] a common processing platform [FEATURE ID: 5] , the method comprising [TRANSITIVE ID: 2] : establishing [TRANSITIVE ID: 2] a secure communication session [FEATURE ID: 1] between a user [FEATURE ID: 6] computing [TRANSITIVE ID: 7] device [FEATURE ID: 5] and a logon component [FEATURE ID: 5] , wherein the secure communication session comprises [TRANSITIVE ID: 8] a temporary , interactive information exchange [FEATURE ID: 9] that is set up and then torn down ; verifying [TRANSITIVE ID: 2] logon information [FEATURE ID: 10] provided by the user computing device to the logon component using the secure communication session and responsively generating a security context [FEATURE ID: 1] to be employed by the user computing device that is : unique [FEATURE ID: 11] to a user of the user computing device ; necessary [FEATURE ID: 12] to access any of the plurality of resources without requiring any follow [FEATURE ID: 13] - on authorization communications [FEATURE ID: 14] between the accessed resource [FEATURE ID: 3] and the logon component . 2 . The method of claim [FEATURE ID: 15] 1 wherein verifying the logon information comprises comparing the logon information to previously stored information [FEATURE ID: 1] that identifies the user . 3 . The method of claim 1 wherein a security context that is unique to the user comprises , at least in part , a unique identifier [FEATURE ID: 5] as corresponds to the user . 4 . The method of claim 1 wherein the security context comprises a stateless security context [FEATURE ID: 5] . 5 . The method of claim 1 wherein generating a security context to be employed by the user computing device [FEATURE ID: 3] comprises generating a security context that will support contemporaneously accessing at least two of the plurality of resources . 6 . The method of claim 1 wherein generating a security context comprises generating a security context that automatically preserves access limitations specific [FEATURE ID: 16] to the user as corresponds to varying ones [FEATURE ID: 3] of the plurality of resources such [FEATURE ID: 3] that the user ' s degree of access [FEATURE ID: 1] to a given accessed resource can vary notwithstanding a common use [FEATURE ID: 6] of the security context . 7 . The method of claim 1 wherein generating a security context comprises generating a time - limited security context [FEATURE ID: 11] . 8 . The method of claim 7 wherein generating a time - limited security context comprises including a time stamp [FEATURE ID: 5] in the security context . 9 . An apparatus [FEATURE ID: 5] comprising : at least one trusted computing environment component [FEATURE ID: 5] configured to facilitate : establishing a secure communication session between a user computing device and a logon component , wherein the secure communication session comprises a temporary , interactive information exchange that is set up and then torn down ; verifying logon information provided by the user computing device to the logon component using the secure communication session and responsively generating a security context that is : unique to a user of the user computing device ; necessary to access any of the plurality of resources without requiring any follow - on authorization communications between the accessed resource and the logon component . 10 . The apparatus of claim 9 wherein the security context comprises , at least in part , a unique identifier as corresponds to the user . 11 . The apparatus of claim 9 wherein the security context comprises a stateless security context . 12 . The apparatus of claim 9 wherein the security context is operable [FEATURE ID: 12] to support contemporaneously accessing at least two of the plurality of resources . 13 . The apparatus of claim 9 wherein the security context automatically preserves access limitations specific to the user as corresponds to varying ones of the plurality of resources such that the user ' s degree of access to a given accessed resource can permissibly vary notwithstanding a common use of the security context . 14 . The apparatus of claim 9 wherein the security context comprises a time - limited security context . 15 . The apparatus of claim 14 wherein the time - limited security context includes a time stamp . 16 . A method to facilitate accessing protected on - line resources [FEATURE ID: 3] via corresponding secured transactions [FEATURE ID: 17] , comprising : at a user computing device : presenting , to other than the on - line resources , at least a logon identifier [FEATURE ID: 5] |
1 . A method [FEATURE ID: 1] of single sign [FEATURE ID: 13] - on to multiple target resources [FEATURE ID: 3] in a computer enterprise environment [FEATURE ID: 5] , wherein at least some target resources [FEATURE ID: 3] normally require [TRANSITIVE ID: 4] a given [TRANSITIVE ID: 11] logon process [FEATURE ID: 1] to access [TRANSITIVE ID: 5] applications [FEATURE ID: 3] on the target resource [FEATURE ID: 3] , comprising [TRANSITIVE ID: 2] the steps [FEATURE ID: 1] of : for each of a set of target resources having [TRANSITIVE ID: 2] different logon processes [FEATURE ID: 3] , storing [TRANSITIVE ID: 2] configuration directives [FEATURE ID: 3] identifying [TRANSITIVE ID: 2] the given logon process and methods [FEATURE ID: 3] required [TRANSITIVE ID: 12] to access a particular application [FEATURE ID: 5] on the target resource ; for each of a set of users [FEATURE ID: 17] , storing user [FEATURE ID: 5] - specific information [FEATURE ID: 9] that enables [TRANSITIVE ID: 8] the user to access and logon [TRANSITIVE ID: 10] to one or more of the target resources ; and during a logon attempt [FEATURE ID: 1] by a given user with respect [FEATURE ID: 10] to a target application [FEATURE ID: 5] on one of the set of target resources , coordinating given user information [FEATURE ID: 7] with at least one given configuration directive [FEATURE ID: 5] to enable the given user to logon to the target application without specifying the given logon process . 2 . The method as described in claim [FEATURE ID: 15] 1 further including the step [FEATURE ID: 1] of validating a user id [FEATURE ID: 5] / password [FEATURE ID: 5] of the given user during the logon attempt . 3 . The method as described in claim 1 further including the step of storing state information [FEATURE ID: 10] associating the given user with the given target application . 4 . The method as described in claim 3 further including the step of using the state information stored to facilitate access [FEATURE ID: 14] to the target application in a subsequent session [FEATURE ID: 1] . 5 . The method as described in claim 3 further including the step of using the state information to determine whether the given user has authority [FEATURE ID: 16] to perform a given operation [FEATURE ID: 1] . 6 . The method as described in claim 5 wherein the given operation is a change password operation [FEATURE ID: 5] . 7 . The method as described in claim 6 further including the step of performing the given operation . 8 . The method as described in claim 1 wherein a particular configuration directive [FEATURE ID: 5] is generated by a provider [FEATURE ID: 6] of a given target application . 9 . A method of enabling single sign - on access to a target application on a target resource in a distributed computer enterprise [FEATURE ID: 1] , comprising the steps of : generating a configuration directive identifying a given logon process and any associated methods [FEATURE ID: 3] required to access the target application on the target resource ; for each of a set of users , storing user - specific [FEATURE ID: 11] and application [FEATURE ID: 5] - specific information that enables the user to access and logon to one or more target resources ; and during a session [FEATURE ID: 5] |
Targeted Patent: Patent: US8051098B2 Filed: 2001-04-19 Issued: 2011-11-01 Patent Holder: (Original Assignee) Teigel Processing AB LLC (Current Assignee) Alto Dynamics LLC ; Callahan Cellular LLC Inventor(s): Stephen F. Bisbee, Jack J. Moskowitz, Keith F. Becker, Ellis K. Peterson, Gordon W. Twaddell Title: Systems and methods for state-less authentication | Cross Reference / Shared Meaning between the Lines |
Charted Against: Patent: EP0565314B1 Filed: 1992-04-06 Issued: 2001-01-17 Patent Holder: (Original Assignee) Addison M. Fischer Inventor(s): Addison M. Fischer Title: Method for signing travelling programs |
[FEATURE ID: 1] method | process, technique, operation, procedure, system, program, means | [FEATURE ID: 1] Method, method, steps, digital signature verification operation, step, format |
[TRANSITIVE ID: 2] accessing | securing, protecting, handling, managing, controlling, sharing, providing | [TRANSITIVE ID: 2] processing |
[FEATURE ID: 3] resources, authorization communications, resource, information, access limitations specific, resources such, secured transactions | users, elements, devices, authentication, parameters, digital, documents | [FEATURE ID: 3] digital instructions, data, computers, messages, part, instructions |
[FEATURE ID: 4] common processing platform, secure communication session, device, logon component, apparatus, computing environment component | computer, database, processor, system, service, node, platform | [FEATURE ID: 4] channel, digital communications system, next destination, digital certificate, user, standard, program variable |
[TRANSITIVE ID: 5] comprising | having, providing, involving, includes, implementing, defining, and | [TRANSITIVE ID: 5] being, comprising, including |
[TRANSITIVE ID: 6] establishing, verifying | obtaining, identifying, determining, receiving, generating, storing, defining | [TRANSITIVE ID: 6] executing, processing |
[FEATURE ID: 7] user | source, first, client | [FEATURE ID: 7] first computer |
[TRANSITIVE ID: 8] computing | computer, communication, processing | [TRANSITIVE ID: 8] accompanying data |
[FEATURE ID: 9] interactive information exchange, stateless security context, common use, time stamp, logon identifier | token, key, certificate, password, secret, identifier, security | [FEATURE ID: 9] digital signature |
[FEATURE ID: 10] logon information | information, that, data | [FEATURE ID: 10] such information |
[FEATURE ID: 11] security context | value, document, signal, state, code | [FEATURE ID: 11] predefined data structure |
[FEATURE ID: 12] claim | step, figure, paragraph, item, clause, preceding claim, requirement | [FEATURE ID: 12] Fig., Claim, claim |
[FEATURE ID: 13] unique identifier | number, string, code | [FEATURE ID: 13] sequence |
[FEATURE ID: 14] user computing device | process, method, apparatus | [FEATURE ID: 14] A method |
[FEATURE ID: 15] degree | the, use, control | [FEATURE ID: 15] direction |
1 . A method [FEATURE ID: 1] of accessing [TRANSITIVE ID: 2] any of a plurality of resources [FEATURE ID: 3] wherein at least some of the resources do not share a common processing platform [FEATURE ID: 4] , the method comprising [TRANSITIVE ID: 5] : establishing [TRANSITIVE ID: 6] a secure communication session [FEATURE ID: 4] between a user [FEATURE ID: 7] computing [TRANSITIVE ID: 8] device [FEATURE ID: 4] and a logon component [FEATURE ID: 4] , wherein the secure communication session comprises a temporary , interactive information exchange [FEATURE ID: 9] that is set up and then torn down ; verifying [TRANSITIVE ID: 6] logon information [FEATURE ID: 10] provided by the user computing device to the logon component using the secure communication session and responsively generating a security context [FEATURE ID: 11] to be employed by the user computing device that is : unique to a user of the user computing device ; necessary to access any of the plurality of resources without requiring any follow - on authorization communications [FEATURE ID: 3] between the accessed resource [FEATURE ID: 3] and the logon component . 2 . The method of claim [FEATURE ID: 12] 1 wherein verifying the logon information comprises comparing the logon information to previously stored information [FEATURE ID: 3] that identifies the user . 3 . The method of claim 1 wherein a security context that is unique to the user comprises , at least in part , a unique identifier [FEATURE ID: 13] as corresponds to the user . 4 . The method of claim 1 wherein the security context comprises a stateless security context [FEATURE ID: 9] . 5 . The method of claim 1 wherein generating a security context to be employed by the user computing device [FEATURE ID: 14] comprises generating a security context that will support contemporaneously accessing at least two of the plurality of resources . 6 . The method of claim 1 wherein generating a security context comprises generating a security context that automatically preserves access limitations specific [FEATURE ID: 3] to the user as corresponds to varying ones of the plurality of resources such [FEATURE ID: 3] that the user ' s degree [FEATURE ID: 15] of access to a given accessed resource can vary notwithstanding a common use [FEATURE ID: 9] of the security context . 7 . The method of claim 1 wherein generating a security context comprises generating a time - limited security context . 8 . The method of claim 7 wherein generating a time - limited security context comprises including a time stamp [FEATURE ID: 9] in the security context . 9 . An apparatus [FEATURE ID: 4] comprising : at least one trusted computing environment component [FEATURE ID: 4] configured to facilitate : establishing a secure communication session between a user computing device and a logon component , wherein the secure communication session comprises a temporary , interactive information exchange that is set up and then torn down ; verifying logon information provided by the user computing device to the logon component using the secure communication session and responsively generating a security context that is : unique to a user of the user computing device ; necessary to access any of the plurality of resources without requiring any follow - on authorization communications between the accessed resource and the logon component . 10 . The apparatus of claim 9 wherein the security context comprises , at least in part , a unique identifier as corresponds to the user . 11 . The apparatus of claim 9 wherein the security context comprises a stateless security context . 12 . The apparatus of claim 9 wherein the security context is operable to support contemporaneously accessing at least two of the plurality of resources . 13 . The apparatus of claim 9 wherein the security context automatically preserves access limitations specific to the user as corresponds to varying ones of the plurality of resources such that the user ' s degree of access to a given accessed resource can permissibly vary notwithstanding a common use of the security context . 14 . The apparatus of claim 9 wherein the security context comprises a time - limited security context . 15 . The apparatus of claim 14 wherein the time - limited security context includes a time stamp . 16 . A method to facilitate accessing protected on - line resources via corresponding secured transactions [FEATURE ID: 3] , comprising : at a user computing device : presenting , to other than the on - line resources , at least a logon identifier [FEATURE ID: 9] |
1 Method [FEATURE ID: 1] for processing [TRANSITIVE ID: 2] information , said information consisting of digital instructions [FEATURE ID: 3] and accompanying data [FEATURE ID: 3] , among a plurality of computers [FEATURE ID: 3] ( Terminals A , B ... N ) coupled to a channel [FEATURE ID: 4] ( 12 ) , over which computers exchange messages [FEATURE ID: 3] , said computers being [TRANSITIVE ID: 5] part [FEATURE ID: 3] of a digital communications system [FEATURE ID: 4] , said method [FEATURE ID: 1] comprising [TRANSITIVE ID: 5] the steps [FEATURE ID: 1] of : executing [TRANSITIVE ID: 6] on a first computer [FEATURE ID: 7] a sequence [FEATURE ID: 13] of digital instructions ( Fig. [FEATURE ID: 12] 2 , block 22 ) including [TRANSITIVE ID: 5] instructions [FEATURE ID: 3] which determine at least one next destination [FEATURE ID: 4] that receives the sequence of digital instructions together with the accompanying data ; and transmitting said sequence of digital instructions together with the accompanying data to said next destination ; characterized in that said accompanying data [FEATURE ID: 8] includes at least one digital signature [FEATURE ID: 9] ( 432 ) which is selectively applied to said information ; and in that , under the control of said sequence of digital instructions , a digital signature verification operation [FEATURE ID: 1] based upon said information is performed . 2 A method [FEATURE ID: 14] according to Claim [FEATURE ID: 12] 1 , wherein said digital signature is represented as data subject to being logically processed by said sequence of digital instructions . 3 A method according to Claim 1 or Claim 2 , further including the step [FEATURE ID: 1] of associating of a digital certificate [FEATURE ID: 4] with said digital signature and wherein said digital certificate is represented as data subject to being logically processed by said sequence of digital instructions . 4 A method according to any preceding claim [FEATURE ID: 12] , further including the step of acquiring data from a user [FEATURE ID: 4] at at least one of said plurality of computers , and translating the acquired data by said sequence of digital instructions into a predefined data structure [FEATURE ID: 11] conforming to a recognized standard [FEATURE ID: 4] . 5 A method according to Claim 4 , including the step of processing [FEATURE ID: 6] and verifying the digital signature and the data to which it is applied . 6 A method according to any preceding claim , further including the step of translating data under direction [FEATURE ID: 15] of said sequence of digital instructions into an Electronic Data Interchange ( EDI ) format [FEATURE ID: 1] . 7 A method according to any preceding claim , including the step of logically constructing the information to which the digital signature can be selectively applied , wherein such information [FEATURE ID: 10] is treated as a program variable [FEATURE ID: 4] |
Targeted Patent: Patent: US8051098B2 Filed: 2001-04-19 Issued: 2011-11-01 Patent Holder: (Original Assignee) Teigel Processing AB LLC (Current Assignee) Alto Dynamics LLC ; Callahan Cellular LLC Inventor(s): Stephen F. Bisbee, Jack J. Moskowitz, Keith F. Becker, Ellis K. Peterson, Gordon W. Twaddell Title: Systems and methods for state-less authentication | Cross Reference / Shared Meaning between the Lines |
Charted Against: Patent: US6175717B1 Filed: 1993-04-16 Issued: 2001-01-16 Patent Holder: (Original Assignee) Trans Video Electronics Inc (Current Assignee) TRANSVIDEO ELECTRONICS Ltd ; Trans Video Electronics ; Trans Video Electronics Inc Inventor(s): Mihailo V. Rebec, Mohammed S. Rebec Title: Global mobile video communications system |
[TRANSITIVE ID: 1] accessing, establishing | providing, transferring, communicating, generating, processing, securing, carrying | [TRANSITIVE ID: 1] transmitting, receiving, representing, housing, demodulating |
[FEATURE ID: 2] common processing platform | computer, gateway, user, platform | [FEATURE ID: 2] satellite communications system |
[TRANSITIVE ID: 3] comprising | including, comprises, involving, includes, compromising, having, of | [TRANSITIVE ID: 3] comprising |
[TRANSITIVE ID: 4] computing, resource, computing environment component | computer, system, entity, platform, module, application, network | [TRANSITIVE ID: 4] mobile microwave system |
[FEATURE ID: 5] device | terminal, system, unit, receiver, user, modem, antenna | [FEATURE ID: 5] satellite, display unit, microwave satellite receiver |
[FEATURE ID: 6] logon component | receiver, gateway, microwave, vehicle, site, satellite, network | [FEATURE ID: 6] satellite first local microwave signals, power generator, system |
[TRANSITIVE ID: 7] comprises | uses, defines, utilizes, incorporates, implements, employs, provides | [TRANSITIVE ID: 7] comprises |
[TRANSITIVE ID: 8] verifying | storing, receiving, analyzing, processing, mapping, recording, modifying | [TRANSITIVE ID: 8] transforming, compressing |
[FEATURE ID: 9] logon information, information | messages, signals, data, content, television, intelligence, audio | [FEATURE ID: 9] first local digital data, first remote microwave signals, first remote digital data, remote video signals |
[FEATURE ID: 10] security context, unique identifier, common use | value, code, term, state, message, token, password | [FEATURE ID: 10] remote digital data |
[FEATURE ID: 11] unique | corresponding, assigned, dedicated | [FEATURE ID: 11] coupled |
[FEATURE ID: 12] necessary | operable, configured, adaptable, adapted | [FEATURE ID: 12] adjustable |
[FEATURE ID: 13] claim | step, clam, paragraph, of claim, figure, the claim, clair | [FEATURE ID: 13] claim |
[FEATURE ID: 14] user computing device | host, server, terminal | [FEATURE ID: 14] high speed digital station |
[FEATURE ID: 15] apparatus | interface, element, amplifier, interrogator, antenna, architecture, arrangement | [FEATURE ID: 15] antenna assembly, antenna terminal |
1 . A method of accessing [TRANSITIVE ID: 1] any of a plurality of resources wherein at least some of the resources do not share a common processing platform [FEATURE ID: 2] , the method comprising [TRANSITIVE ID: 3] : establishing [TRANSITIVE ID: 1] a secure communication session between a user computing [TRANSITIVE ID: 4] device [FEATURE ID: 5] and a logon component [FEATURE ID: 6] , wherein the secure communication session comprises [TRANSITIVE ID: 7] a temporary , interactive information exchange that is set up and then torn down ; verifying [TRANSITIVE ID: 8] logon information [FEATURE ID: 9] provided by the user computing device to the logon component using the secure communication session and responsively generating a security context [FEATURE ID: 10] to be employed by the user computing device that is : unique [FEATURE ID: 11] to a user of the user computing device ; necessary [FEATURE ID: 12] to access any of the plurality of resources without requiring any follow - on authorization communications between the accessed resource [FEATURE ID: 4] and the logon component . 2 . The method of claim [FEATURE ID: 13] 1 wherein verifying the logon information comprises comparing the logon information to previously stored information [FEATURE ID: 9] that identifies the user . 3 . The method of claim 1 wherein a security context that is unique to the user comprises , at least in part , a unique identifier [FEATURE ID: 10] as corresponds to the user . 4 . The method of claim 1 wherein the security context comprises a stateless security context . 5 . The method of claim 1 wherein generating a security context to be employed by the user computing device [FEATURE ID: 14] comprises generating a security context that will support contemporaneously accessing at least two of the plurality of resources . 6 . The method of claim 1 wherein generating a security context comprises generating a security context that automatically preserves access limitations specific to the user as corresponds to varying ones of the plurality of resources such that the user ' s degree of access to a given accessed resource can vary notwithstanding a common use [FEATURE ID: 10] of the security context . 7 . The method of claim 1 wherein generating a security context comprises generating a time - limited security context . 8 . The method of claim 7 wherein generating a time - limited security context comprises including a time stamp in the security context . 9 . An apparatus [FEATURE ID: 15] comprising : at least one trusted computing environment component [FEATURE ID: 4] |
1 . A mobile microwave system [FEATURE ID: 4] , comprising [TRANSITIVE ID: 3] : a microwave subsystem for transmitting [TRANSITIVE ID: 1] directly to a satellite first local microwave signals [FEATURE ID: 6] modulated with first local digital data [FEATURE ID: 9] while in motion with respect to earth and for receiving [TRANSITIVE ID: 1] first remote microwave signals [FEATURE ID: 9] modulated with first remote digital data [FEATURE ID: 9] while in motion with respect to earth , wherein said microwave subsystem comprises [TRANSITIVE ID: 7] an antenna assembly [FEATURE ID: 15] for transmitting said first local microwave signals and for receiving said first remote microwave signals capable of representing [TRANSITIVE ID: 1] remote video signals [FEATURE ID: 9] ; a high speed digital station [FEATURE ID: 14] coupled [TRANSITIVE ID: 11] to said microwave subsystem , for receiving a video signal and for transforming [TRANSITIVE ID: 8] and compressing [TRANSITIVE ID: 8] said video signal into said first local digital data and for transforming and decompressing said first remote digital data into a first decompressed remote digital data [FEATURE ID: 10] ; and a land vehicle for housing [FEATURE ID: 1] said microwave subsystem and said high speed digital station , said vehicle having a lower portion and a roof , wherein said first local microwave signals transmitted by said antenna assembly pass through said roof , wherein said microwave subsystem is adjustable [FEATURE ID: 12] in pitch and yaw relative to the land vehicle moving with respect to the earth on any terrain to establish a satellite communications link to the satellite [FEATURE ID: 5] using the first local microwave signals and the first remote microwave signals . 2 . The mobile microwave system as claimed in claim [FEATURE ID: 13] 1 , wherein said microwave subsystem further comprises : an antenna terminal [FEATURE ID: 15] coupled to said antenna assembly and said high speed digital station for demodulating [FEATURE ID: 1] said first microwave signals . 3 . The mobile microwave system of claim 1 , further comprising a power generator [FEATURE ID: 6] , wherein the microwave subsystem and the high speed digital station are coupled to the power generator . 4 . The mobile microwave system as claimed in claim 1 , further comprising a display unit [FEATURE ID: 5] coupled to said high speed digital station and said power generator , for displaying said first decompressed remote digital data . 5 . A portable integrated receiving system [FEATURE ID: 6] for use with a satellite communications system [FEATURE ID: 2] to establish a satellite communications down - link , comprising : a microwave satellite receiver [FEATURE ID: 5] |
Targeted Patent: Patent: US8051098B2 Filed: 2001-04-19 Issued: 2011-11-01 Patent Holder: (Original Assignee) Teigel Processing AB LLC (Current Assignee) Alto Dynamics LLC ; Callahan Cellular LLC Inventor(s): Stephen F. Bisbee, Jack J. Moskowitz, Keith F. Becker, Ellis K. Peterson, Gordon W. Twaddell Title: Systems and methods for state-less authentication | Cross Reference / Shared Meaning between the Lines |
Charted Against: Patent: EP1062560A1 Filed: 1998-03-11 Issued: 2000-12-27 Patent Holder: (Original Assignee) Cha! Technologies Inc (Current Assignee) Cha! Technologies Inc Inventor(s): Yoav A. Leitersdorf, Timothy Sixtus Title: Automatically invoked intermediation process for network purchases |
[FEATURE ID: 1] method, security context, ones, computing environment component | procedure, system, mechanism, service, process, protocol, interface | [FEATURE ID: 1] intermediation process, steps |
[TRANSITIVE ID: 2] accessing, establishing, computing, verifying | providing, receiving, requesting, defining, enabling, implementing, selecting | [TRANSITIVE ID: 2] purchasing, subscribing, comprising, establishing, including, identifying, accessing |
[FEATURE ID: 3] resources, access limitations specific, line resources | data, users, transactions, entities, networks, customers, network resources | [FEATURE ID: 3] content, merchants, merchant sites |
[FEATURE ID: 4] common processing platform, secure communication session, user, device, information, unique identifier, stateless security context, user computing device, degree, time stamp, logon identifier | server, transaction, token, system, computer, website, platform | [FEATURE ID: 4] digital communications network, database, subscriber, central transaction processing site, merchant site, network, access, restriction, purchaser account balance, network site, resource rules database, resource, locator, browser program |
[TRANSITIVE ID: 5] comprising | having, including, providing, of | [TRANSITIVE ID: 5] encoding |
[FEATURE ID: 6] logon component | network, website, source, host, provider, client, user | [FEATURE ID: 6] purchaser, target network resource |
[FEATURE ID: 7] temporary, unique, limited security context | limited, dedicated, controlled, protected, sensitive, confined, secured | [FEATURE ID: 7] restricted, such restricted, restricted |
[FEATURE ID: 8] interactive information exchange, access | authentication, authority, identifier, identity, security, entitlement | [FEATURE ID: 8] access fee schedule |
[FEATURE ID: 9] logon information, authorization communications | indicia, data, details, content, transactions, attributes, credentials | [FEATURE ID: 9] information, resource locator data, override information, purchaser site authentication credentials, data identification criteria, network communication activity information |
[TRANSITIVE ID: 10] provided, necessary, operable | operative, configured, generated, adapted, appropriate, arranged, established | [TRANSITIVE ID: 10] invoked |
[FEATURE ID: 11] resource | data, network, information | [FEATURE ID: 11] purchaser accounts database |
[FEATURE ID: 12] resources such | services, credentials, users | [FEATURE ID: 12] merchant accounts |
[FEATURE ID: 13] secured transactions | access, information, accounts, portals, connections, users, sites | [FEATURE ID: 13] purchaser accounts, access ports |
1 . A method [FEATURE ID: 1] of accessing [TRANSITIVE ID: 2] any of a plurality of resources [FEATURE ID: 3] wherein at least some of the resources do not share a common processing platform [FEATURE ID: 4] , the method comprising [TRANSITIVE ID: 5] : establishing [TRANSITIVE ID: 2] a secure communication session [FEATURE ID: 4] between a user [FEATURE ID: 4] computing [TRANSITIVE ID: 2] device [FEATURE ID: 4] and a logon component [FEATURE ID: 6] , wherein the secure communication session comprises a temporary [FEATURE ID: 7] , interactive information exchange [FEATURE ID: 8] that is set up and then torn down ; verifying [TRANSITIVE ID: 2] logon information [FEATURE ID: 9] provided [TRANSITIVE ID: 10] by the user computing device to the logon component using the secure communication session and responsively generating a security context [FEATURE ID: 1] to be employed by the user computing device that is : unique [FEATURE ID: 7] to a user of the user computing device ; necessary [FEATURE ID: 10] to access any of the plurality of resources without requiring any follow - on authorization communications [FEATURE ID: 9] between the accessed resource [FEATURE ID: 11] and the logon component . 2 . The method of claim 1 wherein verifying the logon information comprises comparing the logon information to previously stored information [FEATURE ID: 4] that identifies the user . 3 . The method of claim 1 wherein a security context that is unique to the user comprises , at least in part , a unique identifier [FEATURE ID: 4] as corresponds to the user . 4 . The method of claim 1 wherein the security context comprises a stateless security context [FEATURE ID: 4] . 5 . The method of claim 1 wherein generating a security context to be employed by the user computing device [FEATURE ID: 4] comprises generating a security context that will support contemporaneously accessing at least two of the plurality of resources . 6 . The method of claim 1 wherein generating a security context comprises generating a security context that automatically preserves access limitations specific [FEATURE ID: 3] to the user as corresponds to varying ones [FEATURE ID: 1] of the plurality of resources such [FEATURE ID: 12] that the user ' s degree [FEATURE ID: 4] of access [FEATURE ID: 8] to a given accessed resource can vary notwithstanding a common use of the security context . 7 . The method of claim 1 wherein generating a security context comprises generating a time - limited security context [FEATURE ID: 7] . 8 . The method of claim 7 wherein generating a time - limited security context comprises including a time stamp [FEATURE ID: 4] in the security context . 9 . An apparatus comprising : at least one trusted computing environment component [FEATURE ID: 1] configured to facilitate : establishing a secure communication session between a user computing device and a logon component , wherein the secure communication session comprises a temporary , interactive information exchange that is set up and then torn down ; verifying logon information provided by the user computing device to the logon component using the secure communication session and responsively generating a security context that is : unique to a user of the user computing device ; necessary to access any of the plurality of resources without requiring any follow - on authorization communications between the accessed resource and the logon component . 10 . The apparatus of claim 9 wherein the security context comprises , at least in part , a unique identifier as corresponds to the user . 11 . The apparatus of claim 9 wherein the security context comprises a stateless security context . 12 . The apparatus of claim 9 wherein the security context is operable [FEATURE ID: 10] to support contemporaneously accessing at least two of the plurality of resources . 13 . The apparatus of claim 9 wherein the security context automatically preserves access limitations specific to the user as corresponds to varying ones of the plurality of resources such that the user ' s degree of access to a given accessed resource can permissibly vary notwithstanding a common use of the security context . 14 . The apparatus of claim 9 wherein the security context comprises a time - limited security context . 15 . The apparatus of claim 14 wherein the time - limited security context includes a time stamp . 16 . A method to facilitate accessing protected on - line resources [FEATURE ID: 3] via corresponding secured transactions [FEATURE ID: 13] , comprising : at a user computing device : presenting , to other than the on - line resources , at least a logon identifier [FEATURE ID: 4] |
1 . An automatically invoked [TRANSITIVE ID: 10] intermediation process [FEATURE ID: 1] for purchasing [TRANSITIVE ID: 2] content [FEATURE ID: 3] over a digital communications network [FEATURE ID: 4] by subscribing [TRANSITIVE ID: 2] purchasers from subscribing merchants [FEATURE ID: 3] , the intermediation process comprising [TRANSITIVE ID: 2] the steps [FEATURE ID: 1] of : ( a ) establishing [TRANSITIVE ID: 2] a database [FEATURE ID: 4] of subscriber [FEATURE ID: 4] - purchaser accounts [FEATURE ID: 13] and a database of subscriber - merchant accounts [FEATURE ID: 12] at a central transaction processing site [FEATURE ID: 4] on the digital communications network , the subscriber - merchant accounts database including [TRANSITIVE ID: 2] information [FEATURE ID: 9] encoding [TRANSITIVE ID: 5] resource locator data [FEATURE ID: 9] identifying [TRANSITIVE ID: 2] at least one restricted [TRANSITIVE ID: 7] - access port at each subscribing merchant site [FEATURE ID: 4] on the network [FEATURE ID: 4] and , for each such restricted [FEATURE ID: 7] - access port , information encoding an access fee schedule [FEATURE ID: 8] for accessing [TRANSITIVE ID: 2] content by way of the restricted [FEATURE ID: 7] - access port and access [FEATURE ID: 4] - restriction [FEATURE ID: 4] - override information [FEATURE ID: 9] for enabling access to content by way of the restricted - access port , and the subscriber - purchaser accounts database [FEATURE ID: 11] including information encoding purchaser site authentication credentials [FEATURE ID: 9] and a purchaser account balance [FEATURE ID: 4] for each subscribing purchaser [FEATURE ID: 6] ; ( b ) at the network site [FEATURE ID: 4] of each subscribing purchaser , establishing a resource rules database [FEATURE ID: 4] including information encoding resource [FEATURE ID: 4] - locator [FEATURE ID: 4] - data identification criteria [FEATURE ID: 9] corresponding to each of at least a subset of the restricted - access ports [FEATURE ID: 13] at subscribing merchant sites [FEATURE ID: 3] identified in the subscriber - merchant accounts database and the access fee schedule for accessing content by way of the corresponding restricted - access port ; ( c ) at the network site of each subscribing purchaser , locally monitoring network communication activity information [FEATURE ID: 9] with respect to access to a target network resource [FEATURE ID: 6] generated by a browser program [FEATURE ID: 4] |
Targeted Patent: Patent: US8051098B2 Filed: 2001-04-19 Issued: 2011-11-01 Patent Holder: (Original Assignee) Teigel Processing AB LLC (Current Assignee) Alto Dynamics LLC ; Callahan Cellular LLC Inventor(s): Stephen F. Bisbee, Jack J. Moskowitz, Keith F. Becker, Ellis K. Peterson, Gordon W. Twaddell Title: Systems and methods for state-less authentication | Cross Reference / Shared Meaning between the Lines |
Charted Against: Patent: EP0800312A4 Filed: 1995-10-09 Issued: 2000-12-27 Patent Holder: (Original Assignee) Matsushita Electric Industrial Co Ltd (Current Assignee) Panasonic Holdings Corp Inventor(s): Kazuhiko Yamauchi, Hiroshi Ueda, Masayuki Kozuka, Yoshihisa Fukushima, Makoto Tatebayashi, Syunji Harada, Koichiro Endo Title: Data transmitter, data transmitting method, data receiver, information processor, and information recording medium |
1 |
Targeted Patent: Patent: US8051098B2 Filed: 2001-04-19 Issued: 2011-11-01 Patent Holder: (Original Assignee) Teigel Processing AB LLC (Current Assignee) Alto Dynamics LLC ; Callahan Cellular LLC Inventor(s): Stephen F. Bisbee, Jack J. Moskowitz, Keith F. Becker, Ellis K. Peterson, Gordon W. Twaddell Title: Systems and methods for state-less authentication | Cross Reference / Shared Meaning between the Lines |
Charted Against: Patent: US6157721A Filed: 1996-08-12 Issued: 2000-12-05 Patent Holder: (Original Assignee) Intertrust Technologies Corp (Current Assignee) Intertrust Technologies Corp Inventor(s): Victor H. Shear, W. Olin Sibert, David M. Van Wie Title: Systems and methods using cryptography to protect secure computing environments |
[FEATURE ID: 1] method, access limitations specific | process, system, step, procedure, technique, methodology, methods | [FEATURE ID: 1] security method, method, first public key |
[TRANSITIVE ID: 2] accessing, establishing, verifying | using, providing, identifying, processing, securing, managing, handling | [TRANSITIVE ID: 2] signing, use, having, distributing |
[FEATURE ID: 3] resources, secured transactions | users, systems, devices, applications, networks, objects, elements | [FEATURE ID: 3] second device classes, user |
[FEATURE ID: 4] common processing platform, interactive information exchange, information | secret, database, credential, memory, key, token, code | [FEATURE ID: 4] second digital signature different, load module, first decryption algorithm |
[TRANSITIVE ID: 5] comprising | comprises, involving, includes, having, by, containing, using | [TRANSITIVE ID: 5] comprising, including |
[FEATURE ID: 6] secure communication session | security, secure, trust | [FEATURE ID: 6] software |
[TRANSITIVE ID: 7] computing, logon component, resource, apparatus, computing environment component | computer, device, user, system, machine, client, first | [TRANSITIVE ID: 7] first device class, second device class, first electronic appliance, second electronic appliance different |
[FEATURE ID: 8] device | user, machine, apparatus, devise, deice, unit | [FEATURE ID: 8] device |
[FEATURE ID: 9] logon information | identity, authenticity, verification | [FEATURE ID: 9] results |
[FEATURE ID: 10] security context, unique identifier, time stamp, logon identifier | token, message, code, value, document, password, secret | [FEATURE ID: 10] first digital signature, specification, digital certificate |
[FEATURE ID: 11] unique | different, predetermined, particular, corresponding | [FEATURE ID: 11] second |
[FEATURE ID: 12] authorization communications | operation, process, steps | [FEATURE ID: 12] step |
[FEATURE ID: 13] claim | step, claimed, embodiment, item, clair, clam, figure | [FEATURE ID: 13] claim |
[FEATURE ID: 14] stateless security context | key, signature, seal | [FEATURE ID: 14] resistant barrier |
[FEATURE ID: 15] user computing device | device, appliance, apparatus | [FEATURE ID: 15] second electronic appliance |
[FEATURE ID: 16] ones | characteristics, properties, states, capabilities, features, levels | [FEATURE ID: 16] resistances, functions |
[FEATURE ID: 17] resources such | credentials, requirements, settings, characteristics | [FEATURE ID: 17] security levels |
[FEATURE ID: 18] access | authentication, confidentiality, security, protection, safety | [FEATURE ID: 18] security level different, security level |
[FEATURE ID: 19] common use | configuration, function, state | [FEATURE ID: 19] same portion |
1 . A method [FEATURE ID: 1] of accessing [TRANSITIVE ID: 2] any of a plurality of resources [FEATURE ID: 3] wherein at least some of the resources do not share a common processing platform [FEATURE ID: 4] , the method comprising [TRANSITIVE ID: 5] : establishing [TRANSITIVE ID: 2] a secure communication session [FEATURE ID: 6] between a user computing [TRANSITIVE ID: 7] device [FEATURE ID: 8] and a logon component [FEATURE ID: 7] , wherein the secure communication session comprises a temporary , interactive information exchange [FEATURE ID: 4] that is set up and then torn down ; verifying [TRANSITIVE ID: 2] logon information [FEATURE ID: 9] provided by the user computing device to the logon component using the secure communication session and responsively generating a security context [FEATURE ID: 10] to be employed by the user computing device that is : unique [FEATURE ID: 11] to a user of the user computing device ; necessary to access any of the plurality of resources without requiring any follow - on authorization communications [FEATURE ID: 12] between the accessed resource [FEATURE ID: 7] and the logon component . 2 . The method of claim [FEATURE ID: 13] 1 wherein verifying the logon information comprises comparing the logon information to previously stored information [FEATURE ID: 4] that identifies the user . 3 . The method of claim 1 wherein a security context that is unique to the user comprises , at least in part , a unique identifier [FEATURE ID: 10] as corresponds to the user . 4 . The method of claim 1 wherein the security context comprises a stateless security context [FEATURE ID: 14] . 5 . The method of claim 1 wherein generating a security context to be employed by the user computing device [FEATURE ID: 15] comprises generating a security context that will support contemporaneously accessing at least two of the plurality of resources . 6 . The method of claim 1 wherein generating a security context comprises generating a security context that automatically preserves access limitations specific [FEATURE ID: 1] to the user as corresponds to varying ones [FEATURE ID: 16] of the plurality of resources such [FEATURE ID: 17] that the user ' s degree of access [FEATURE ID: 18] to a given accessed resource can vary notwithstanding a common use [FEATURE ID: 19] of the security context . 7 . The method of claim 1 wherein generating a security context comprises generating a time - limited security context . 8 . The method of claim 7 wherein generating a time - limited security context comprises including a time stamp [FEATURE ID: 10] in the security context . 9 . An apparatus [FEATURE ID: 7] comprising : at least one trusted computing environment component [FEATURE ID: 7] configured to facilitate : establishing a secure communication session between a user computing device and a logon component , wherein the secure communication session comprises a temporary , interactive information exchange that is set up and then torn down ; verifying logon information provided by the user computing device to the logon component using the secure communication session and responsively generating a security context that is : unique to a user of the user computing device ; necessary to access any of the plurality of resources without requiring any follow - on authorization communications between the accessed resource and the logon component . 10 . The apparatus of claim 9 wherein the security context comprises , at least in part , a unique identifier as corresponds to the user . 11 . The apparatus of claim 9 wherein the security context comprises a stateless security context . 12 . The apparatus of claim 9 wherein the security context is operable to support contemporaneously accessing at least two of the plurality of resources . 13 . The apparatus of claim 9 wherein the security context automatically preserves access limitations specific to the user as corresponds to varying ones of the plurality of resources such that the user ' s degree of access to a given accessed resource can permissibly vary notwithstanding a common use of the security context . 14 . The apparatus of claim 9 wherein the security context comprises a time - limited security context . 15 . The apparatus of claim 14 wherein the time - limited security context includes a time stamp . 16 . A method to facilitate accessing protected on - line resources via corresponding secured transactions [FEATURE ID: 3] , comprising : at a user computing device : presenting , to other than the on - line resources , at least a logon identifier [FEATURE ID: 10] |
1 . A security method [FEATURE ID: 1] comprising [TRANSITIVE ID: 5] : ( a ) digitally signing [TRANSITIVE ID: 2] a first load module with a first digital signature [FEATURE ID: 10] designating the first load module for use [FEATURE ID: 2] by a first device class [FEATURE ID: 7] ; ( b ) digitally signing a second load module with a second digital signature different [FEATURE ID: 4] from the first digital signature , the second digital signature designating the second load module for use by a second device class [FEATURE ID: 7] having [TRANSITIVE ID: 2] at least one of tamper resistance and security level different [FEATURE ID: 18] from the at least one of tamper resistance and security level [FEATURE ID: 18] of the first device class ; ( c ) distributing [TRANSITIVE ID: 2] the first load module for use by at least one device [FEATURE ID: 8] in the first device class ; and ( d ) distributing the second load module for use by at least one device in the second device class . 2 . A method [FEATURE ID: 1] as in claim [FEATURE ID: 13] 1 further including [TRANSITIVE ID: 5] the step [FEATURE ID: 12] of using the first and second digital signatures to prevent the tamper resistances [FEATURE ID: 16] or security levels [FEATURE ID: 17] of the first and second device classes [FEATURE ID: 3] from becoming equal . 3 . A method as in claim 1 further including the step of conditionally executing , based at least in part on authenticating the first digital signature , the first load module with a first electronic appliance [FEATURE ID: 7] within the first device class . 4 . A method as in claim 3 further including the step of conditionally executing , based at least in part on authenticating the second digital signature , the second load module with a second electronic appliance different [FEATURE ID: 7] from the first electronic appliance , the second electronic appliance [FEATURE ID: 15] being within the second device class . 5 . A software [FEATURE ID: 6] verifying method comprising : ( a ) testing a load module [FEATURE ID: 4] having at least one specification [FEATURE ID: 10] associated therewith , the specification describing one or more functions [FEATURE ID: 16] performed by the load module ; ( b ) verifying that the load module satisfies the specification ; and ( c ) issuing at least one digital certificate [FEATURE ID: 10] attesting to the results [FEATURE ID: 9] of the verifying step . 6 . A method of authenticating a load module comprising : ( a ) authenticating a first digital signature associated with some or all of the load module , including the step of employing a first one - way hash algorithm , a first decryption algorithm [FEATURE ID: 4] , and a first public key key , the first public key [FEATURE ID: 1] secured behind a tamper resistant barrier [FEATURE ID: 14] and therefore hidden from the user [FEATURE ID: 3] ; and ( b ) authenticating a second digital signature associated with the same portion [FEATURE ID: 19] of the load module as the first digital signature is associated with , including the step of employing at least one of : ( i ) a second [FEATURE ID: 11] |