David L. Wood - Louisville CO Paul Weschler - Broomfield CO Derk Norton - Louisville CO Chris Ferris - Whitinsville MA Yvonne Wilson - Mountain View CA William R. Soley - Campbell CA
Assignee:
Sun Microsystems, Inc. - Santa Clara CA
International Classification:
G06F 126
US Classification:
713155, 713182, 713200, 713201
Abstract:
A security architecture has been developed in which a single sign-on is provided for multiple information resources. Rather than specifying a single authentication scheme for all information resources, the security architecture associates trust-level requirements with information resources. Authentication schemes (e. g. , those based on passwords, certificates, biometric techniques, smart cards, etc. ) are employed depending on the trust-level requirement(s) of an information resource (or information resources) to be accessed. Once credentials have been obtained for an entity and the entity has been authenticated to a given trust level, access is granted, without the need for further credentials and authentication, to information resources for which the authenticated trust level is sufficient. The security architecture allows upgrade of credentials for a given session. This capability is particularly advantageous in the context of a single, enterprise-wide log-on.
Single Sign-On Framework With Trust-Level Mapping To Authentication Requirements
David L. Wood - Louisville CO, US Derk Norton - Louisville CO, US Paul Weschler - Broomfield CO, US Chris Ferris - Whitinsville MA, US Yvonne Wilson - Mountain View CA, US
Assignee:
Sun Microsystems, Inc. - Santa Clara CA
International Classification:
G06F011/30 G06F012/14 H04L009/00 H04L009/32
US Classification:
713201, 713200, 713155, 713156, 713175
Abstract:
A security architecture has been developed in which a single sign-on is provided for multiple information resources. Rather than specifying a single authentication scheme for all information resources, the security architecture associates trust-level requirements with information resources. Authentication schemes (e. g. , those based on passwords, certificates, biometric techniques, smart cards, etc. ) are associated with trust levels and a log-on service obtains credentials for an entity commensurate with the trust-level requirement(s) of an information resource (or information resources) to be accessed. Once credentials have been obtained for an entity and the entity has been authenticated to a given trust level, access is granted, without the need for further credentials and authentication, to information resources for which the authenticated trust level is sufficient.
Log-On Service Providing Credential Level Change Without Loss Of Session Continuity
David L. Wood - Louisville CO, US Paul Weschler - Broomfield CO, US Derk Norton - Louisville CO, US Chris Ferris - Whitinsville MA, US Yvonne Wilson - Mountain View CA, US William R. Soley - Campbell CA, US
Assignee:
Sun Microsystems, Inc. - Sunnyvale CA
International Classification:
G06F011/30
US Classification:
713155, 713182, 713200, 713201, 713169
Abstract:
A security architecture has been developed in which a single sign-on is provided for multiple information resources. Rather than specifying a single authentication scheme for all information resources, the security architecture associates trust-level requirements with information resources. Authentication schemes (e. g. , those based on passwords, certificates, biometric techniques, smart cards, etc. ) are employed depending on the trust-level requirement(s) of an information resource (or information resources) to be accessed. Once credentials have been obtained for an entity and the entity has been authenticated to a given trust level, access is granted, without the need for further credentials and authentication, to information resources for which the authenticated trust level is sufficient.
David L. Wood - Louisville CO, US Paul Weschler - Broomfield CO, US Derk Norton - Louisville CO, US Chris Ferris - Whitinsville MA, US Yvonne Wilson - Mountain View CA, US William R. Soley - Campbell CA, US
Assignee:
Sun Microsystems, Inc. - Santa Clara CA
International Classification:
G06F 1/24
US Classification:
713155, 713182, 713169
Abstract:
A security architecture has been developed in which a single sign-on is provided for multiple information resources. Rather than specifying a single authentication scheme for all information resources, the security architecture associates trust-level requirements with information resources. Authentication schemes (e. g. , those based on passwords, certificates, biometric techniques, smart cards, etc. ) are employed depending on the trust-level requirement(s) of an information resource (or information resources) to be accessed. Once credentials have been obtained for an entity and the entity has been authenticated to a given trust level, access is granted, without the need for further credentials and authentication, to information resources for which the authenticated trust level is sufficient. In addition, an entity can be allocated a new session and associated default credential if the entity's access request indicates an invalid session token or does not indicate a token.
Log-On Service Providing Credential Level Change Without Loss Of Session Continuity
David L. Wood - Louisville CO, US Paul Weschler - Broomfield CO, US Derk Norton - Louisville CO, US Chris Ferris - Whitinsville MA, US Yvonne Wilson - Mountain View CA, US William R. Soley - Campbell CA, US
Assignee:
Sun Microsystems, Inc. - Palo Alto CA
International Classification:
G06F 9/00
US Classification:
713155, 713169, 713182
Abstract:
A security architecture has been developed in which a single sign-on is provided for multiple information resources. Rather than specifying a single authentication scheme for all information resources, the security architecture associates trust-level requirements with information resources. Authentication schemes (e. g. , those based on passwords, certificates, biometric techniques, smart cards, etc. ) are employed depending on the trust-level requirement(s) of an information resource (or information resources) to be accessed. Once credentials have been obtained for an entity and the entity has been authenticated to a given trust level, access is granted, without the need for further credentials and authentication, to information resources for which the authenticated trust level is sufficient.
Name / Title
Company / Classification
Phones & Addresses
Chris Ferris Principal
Organo Gold Direct Retail Sales
11461 Inspiration Rd, Denver, CO 80403
Chris Ferris
The Cotter Moving & Storage Company Long Distance Hauling & Local Hauling & General Warehousing & Storage · Local Trucking-With Storage · Moving Companies · Storage Units
265 W Bowery St, Akron, OH 44308 PO Box 529, Akron, OH 44309 (330)5355115, (330)5355137, (866)8773278
Isbn (Books And Publications)
The Darkness Is Light Enough: The Field Journal of a Night Naturalist
Old Forge, NYLodge Manager at adirondack league club Past: General Manager at mattaponi springs golf club, General Manager at hunting hawk golf club... Past two term President of the Central New York Chapter of CMAA
Willmoore Kendall Scholarship Recipient 2009
Educational Chair CMAA 2010