Method and system for providing a user access to multiple secured subsystems
First Claim
1. In a computer networking system having a server coupled to a plurality of clients, wherein each of said plurality of clients has access to a plurality of program procedures, accessed through said server, each said program procedure having a security protocol required for access, unique to each user of each of said plurality of clients, a method for unifying said security protocols for each user based on unique user credentials comprising the steps of:
- upon request to start a program procedure by said user, authenticating the identity of said user based on information unique to said user;
generating a user handle associated with said user;
notifying each of said security protocols of said user handle associated with said user;
generating new user credentials for each of said security protocol;
associating said new user credentials with said user handle associated with said user;
mapping said user handle to said unique user'"'"'s credentials for each program procedure;
generating an alternate process;
tagging said alternate process with said user handle associated with said user;
upon request from said alternate process for access to an object accessed through said server, granting access to said object based on said new user credentials associated with said user handle.
1 Assignment
0 Petitions
Accused Products
Abstract
An improvement relating to the security of an operating system for either a stand alone computer system or for a networked computer system. The operating system provides improved security for programs available on the computer system having different security protocols. The operating system unifies these security protocols for each user based on unique user credentials. The system operates, upon request to start a program procedure by the user, to authenticate the identity of the user based on information unique to that user. Following which, the system generates a user handle associated with the user. The system then notifies each of the security protocols of the user handle associated with the user. The system then generates new user credentials for each of the security protocols. These user credentials are associated with the user handle and then the user handle is mapped to the unique user'"'"'s credentials for each program procedure. Once this is accomplished, the system invokes an alternate process and tags the process with the user handle. Once a request from the alternate process for access to an object accessed through the server is requested, the system then grants access to the object based on the new user credentials associated with the user handle. The new user credentials are typically based on an association of the user identifier, the user handle, and the unique user credentials from before.
-
Citations
26 Claims
-
1. In a computer networking system having a server coupled to a plurality of clients, wherein each of said plurality of clients has access to a plurality of program procedures, accessed through said server, each said program procedure having a security protocol required for access, unique to each user of each of said plurality of clients, a method for unifying said security protocols for each user based on unique user credentials comprising the steps of:
-
upon request to start a program procedure by said user, authenticating the identity of said user based on information unique to said user; generating a user handle associated with said user; notifying each of said security protocols of said user handle associated with said user; generating new user credentials for each of said security protocol; associating said new user credentials with said user handle associated with said user; mapping said user handle to said unique user'"'"'s credentials for each program procedure; generating an alternate process; tagging said alternate process with said user handle associated with said user; upon request from said alternate process for access to an object accessed through said server, granting access to said object based on said new user credentials associated with said user handle. - View Dependent Claims (2, 3, 4)
-
-
5. In a computer system having a plurality of program procedures, accessed through a server, each said program procedure having a security protocol required for access, unique to each user of each of said plurality of program procedures, a method for unifying said security protocols for each user based on unique user credentials comprising the steps of:
-
upon request to start a program procedure by said user, authenticating the identity of said user based on information unique to said user; generating a user handle associated with said user; notifying each of said security protocols of said user handle associated with said user; generating new user credentials for each of said security protocol; associating said new user credentials with said user handle associated with said user; mapping said user handle to said unique user'"'"'s credentials for each program procedure; generating an alternate process; tagging said alternate process with said user handle associated with said user; upon request from said alternate process for access to an object accessed through said server, granting access to said object based on said new user credentials associated with said user handle. - View Dependent Claims (6, 7, 8)
-
-
9. In a computer system having a plurality of program procedures, accessed through a server, each said program procedure having a security protocol required for access, unique to each user of each of said plurality of program procedures, a security system for unifying said security protocols for each user based on unique user credentials comprising:
-
means for authenticating the identity of said user based on information unique to said user; means, coupled to said authenticating means, for generating a user handle associated with said user; means, coupled to said generating means, for notifying each of said security protocols of said user handle associated with said user; means, coupled to said authenticating means, for generating new user credentials for each of said security protocol; means, coupled to said new user credentials generating means, for associating said new user credentials with said user handle associated with said user; means, coupled to said associating means, for mapping said user handle to said unique user'"'"'s credentials for each program procedure; means, coupled to said mapping means, for generating an alternate process; means, coupled to said alternate process generating means, for tagging said alternate process with said user handle associated with said user; means, coupled to said tagging means, for granting access to said object based on said new user credentials associated with said user handle. - View Dependent Claims (10, 11, 12, 13)
-
-
14. In a computer networking system having a server coupled to a plurality of clients, wherein each of said plurality of clients has access to a plurality of program procedures accessed through said server, each said program procedure having a security protocol required for access, unique to each user of each of said plurality of clients, a method for unifying said security protocols for each user based on unique user credentials comprising the steps of:
-
authenticating the identity of said user based on information unique to said user; generating a user handle associated with said user; notifying each of said security protocols of said user handle associated with said user; generating new user credentials for each of said security protocols; associating said new user credentials with said user handle associated with said user; mapping said user handle to said unique user'"'"'s credentials for each program procedure; and providing access to a requested program to a user base upon the mapping of said user handle to said unique user'"'"'s credentials, said step of providing access to a requested program further comprising the steps of; generating an alternate process; tagging said alternate process with said user handle associated with said user; and generating access to said object. - View Dependent Claims (15, 16)
-
-
17. In a computer networking system having a server coupled to a plurality of clients, wherein each of said plurality of clients has access to a plurality of program procedures accessed through said server, each said program procedure having a security protocol required for access, unique to each user of each of said plurality of clients, a method for unifying said security protocols for each user based on unique user credentials comprising the steps of:
-
authenticating the identity of said user based on information unique to said user; generating a user handle associated with said user; notifying each of said security protocols of said user handle associated with said user; generating new user credentials for each of said security protocols; associating said new user credentials with said user handle associated with said user; mapping said user handle to said unique user'"'"'s credentials for each program procedure; and generating an alternate process based on the mapping of said user handle to said unique user'"'"'s credentials for each program procedure, wherein said user handle associates with said user via a user identifier.
-
-
18. In a computer system having a plurality of program procedures, accessed through a server, each said program procedure having a security protocol required for access, unique to each user of each of said plurality of program procedures, a method for unifying said security protocols for each user based on unique user credentials comprising the steps of:
-
authenticating the identity of said user based on information unique to said user; generating a user handle associated with said user; notifying each of said security protocols of said user handle associated with said user; generating new user credentials for each of said security protocol; associating said new user credentials with said user handle associated with said user; mapping said user handle to said unique user'"'"'s credentials for each program procedure; and providing access to a requested program to a user based upon the mapping of said user handle to said unique user'"'"'s credentials, wherein this step further comprises the steps of; generating an alternate process; tagging said alternate process with said user handle associated with said user; and granting access to said object. - View Dependent Claims (19, 20, 21)
-
-
22. In a computer system having a plurality of program procedures, accessed through a server, each said program procedure having a security protocol required for access, unique to each user of each of said plurality of program procedures, a security system for unifying said security protocols for each user based on unique user credentials comprising:
-
means for authenticating the identity of said user based on information unique to said user; means, coupled to said authenticating means, for generating a user handle associated with said user; means, coupled to said generating means, for notifying each of said security protocols of said user handle associated with said user; means, coupled to said authenticating means, for generating new user credentials for each of said security protocol; means, coupled to said new user credentials generating means, for associating said new user credentials with said user handle associated with said user; means, coupled to said associating means, for mapping said user handle to said unique user'"'"'s credentials for each program procedure; and means for providing access to a program using selected results from said mapping of said user handle to said unique user'"'"'s credentials, said means for providing access further comprising; means, coupled to said mapping means for generating an alternate process; means, coupled to said alternate process generating means, for tagging said alternate process with said user handle associated with said user; and means, coupled to said tagging means, for granting access to said object. - View Dependent Claims (23, 24, 25, 26)
-
Specification