Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

User authentication system, method, program, and recording medium containing the program

A technology of user authentication and authentication system, which is applied in the field of user authentication to achieve the effect of convenience

Active Publication Date: 2007-05-16
IBM CORP
View PDF0 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the amount of authentication information that the user should store increases in proportion to the increase in the number of servers participating in the interconnected computing environment, this operation may become a large burden on the user

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User authentication system, method, program, and recording medium containing the program
  • User authentication system, method, program, and recording medium containing the program
  • User authentication system, method, program, and recording medium containing the program

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] Hereinafter, the best mode for realizing the present invention will be described in detail with reference to the drawings. In addition, the present invention can be implemented in many different ways, and should not be limited and interpreted by the descriptions of the embodiments. In addition, all combinations of features described in the embodiments cannot be limited to the solutions of the present invention. necessary. In addition, in the whole description of embodiment, the same code|symbol is attached|subjected to the same element.

[0029] In the following embodiments, although methods and systems are mainly described, those skilled in the art can understand that the present invention can also be implemented as a program that can be used in a computer. Therefore, the present invention may take an embodiment as hardware, an embodiment as software, or an embodiment as a combination of software and hardware. The program may be recorded on any computer-readable medi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention can realize more convenient user authentication. The invention provides a user authentication system for a computing environment containing a plurality of servers which can be trusted by one another. The system includes: an authentication policy table containing authentication policy of at least one of the servers; means for receiving authentication information from a user; means for specifying at least one of the servers employing an authentication policy matched with the authentication information among the servers by using the authentication policy table; means for transmitting a signal for instructing to perform user authentication by using the authentication information, to an authentication mechanism of the server specified by the means for specifying a server; and means for permitting the user to access the computing environment if the user authentication is successful.

Description

technical field [0001] The present invention generally relates to user authentication technology, and more specifically relates to a system, method and program for authenticating users in an interconnected computing environment. Background technique [0002] In recent years, many computer-related companies are developing web service-related technologies in order to automate business transactions using Internet technologies. One of the purposes of web services is to realize the efficiency of electronic commerce between multiple enterprise systems. In more detail, the web service provides a mechanism for realizing cooperation between a plurality of enterprise systems by searching for other application programs automatically related to a web-based application program. [0003] "WS-Security", which is a security standard for such web services, has been disclosed by International Business Machines Corporation, Microsoft Corporation, and VeriSign Corporation (Non-Patent Document ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F15/00H04L9/00G06F21/00G06F21/32G06F21/33G06F21/41H04L29/06
CPCH04L63/205H04L63/20H04L63/0815G06F21/31G06F15/00G06F17/00H04L63/08H04L63/10
Inventor 竹日正弘
Owner IBM CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products