Systems for authenticating a user's credentials against multiple sets of credentials

作者: Michael Allen Kaczmarski , Omar Bond Vargas , Robert Clair Edwards

DOI:

关键词:

摘要: Provided are systems for authenticating the identity of a user use in distributed computer network including multiple sets access credentials. A request, user's input credentials, is received, and then compared simultaneously to credentials order verify When verified, appropriate level authority determined, proper granted user.

参考文章(38)
Terry Michael Olkin, Middleware program with enhanced security ,(1995)
Derk Norton, David L. Wood, Paul Weschler, Chris Ferris, Yvonne Wilson, Single sign-on framework with trust-level mapping to authentication requirements ,(2000)
Kil-Ho Shin, Toru Aratani, Kenichi Kobayashi, Device and method for authenticating user's access rights to resources ,(1997)
Toby E. Farrand, Donald M. Gray, Steven C. Wasserman, Verification of server authorization to provide network resources ,(2000)
Chon H. Lei, Daniel M. Wong, Method and apparatus for enabling database privileges ,(2003)
Allan Cooper, Scott Field, Matthew W. Thomlinson, Protected storage of core data secrets ,(1997)
Jessica Burney, S. Richard Re, Denis O'leary, Adam Hoffman, Vincent D'agostino, A virtual private lock box ,(2000)
Teresa Win, Emilio Belmonte, Role-based navigation of information resources ,(1999)
Richard J. Kennelly, Kenneth W. Ouellette, Role based management independent of the hardware topology ,(1998)