System and method for authenticating a subject
First Claim
1. A method for adaptively authenticating a subject based on authentication information, comprising the steps of:
- providing for the receipt of the authentication information;
providing for the performance of Java Authentication and Authorization Service (JAAS) authentication of the subject based on the authentication information and wherein successful authentication of the subject results in the association a principal with the subject;
providing for the signing of the principal by determining an authentication code for the principal that is a function of the principal and a key.
2 Assignments
0 Petitions
Accused Products
Abstract
A method for adaptively authenticating a subject based on authentication information, comprising the steps of providing for the receipt of the authentication information; providing for the performance of Java Authentication and Authorization Service (JAAS) authentication of the subject based on the authentication information and wherein successful authentication of the subject results in the association a principal with the subject; providing for the signing of the principal by determining an authentication code for the principal that is a function of the principal and a key.
-
Citations
53 Claims
-
1. A method for adaptively authenticating a subject based on authentication information, comprising the steps of:
-
providing for the receipt of the authentication information;
providing for the performance of Java Authentication and Authorization Service (JAAS) authentication of the subject based on the authentication information and wherein successful authentication of the subject results in the association a principal with the subject;
providing for the signing of the principal by determining an authentication code for the principal that is a function of the principal and a key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method for adaptively authenticating a subject based on authentication information, comprising the steps of:
-
providing for the receipt of the authentication information;
providing for the performance of Java Authentication and Authorization Service (JAAS) authentication of the subject based on the authentication information and wherein successful authentication of the subject results in the association of a principal with the subject;
providing for the signing of the principal by determining an authentication code for the principal using an HMAC algorithm. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A method for adaptively authenticating a subject based on authentication information, comprising the steps of:
-
providing for the receipt of the authentication information;
providing for the invocation of a Java Authentication and Authorization Service (JAAS) login module by an authentication provider;
providing for the performance of authentication of the subject by the JAAS login module based on the authentication information and wherein successful authentication of the subject results in the association of a principal with the subject;
providing for the signing of the principal by determining an authentication code for the principal that is a function of the principal and a key. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30, 31, 32)
-
-
33. A system for adaptively authenticating a subject based on authentication information and adapted to cooperate with a security framework, the system comprising the steps of:
-
an authentication provider coupled to the framework;
a Java Authentication and Authorization Service (JAAS) login module coupled to the authentication provider, the login module to authenticate the subject, wherein the login module associates a principal with the subject if authentication of the subject is successful;
a principal validator coupled to the authentication provider, the principal validator to sign the principal by determining an authentication code for the principal that is a function of the principal and a key; and
a management provider to provide configuration information to the authentication provider. - View Dependent Claims (34, 35, 36, 37, 38, 39, 40, 41, 42)
-
-
43. A machine readable medium having instructions stored thereon that when executed by a processor cause a system to:
-
receive authentication information;
perform Java Authentication and Authorization Service (JAAS) authentication of a subject based on authentication information and wherein successful authentication of the subject results in the association of a principal with the subject;
sign the principal by determining an authentication code for the principal that is a function of the principal and a key. - View Dependent Claims (44, 45, 46, 47, 48, 49, 50, 51, 52, 53)
-
Specification