Middleware program with enhanced security
First Claim
1. A distributed computer system including,a network operating program that includes a distributed network security protocol,an application program that includes a second security protocol, a first sign-on ID and a second sign-on ID, said second sign-on ID having an associated password, said first sign-on ID being a privileged ID which can change said password of said second sign-on ID, anda server connected to a network using said distributed network security protocol, said server including means for signing on to said application program using said second security protocol and said first ID and for changing the password of said second ID to a temporary password, means for signing on to said application program using said second security protocol, said second ID and said temporary password, and means for passing data between said server and said network using said network security protocol.
2 Assignments
0 Petitions
Accused Products
Abstract
The authentication and security mechanism in a first program is used to access an application program which requires a different type of authentication and password. A server program runs in the same machine as the application program. The server program communicates with the first program and it is accessed and it authenticates the user utilizing the security and authentication mechanism of the first program. After the user ID of a user who desires access to the second program has been authenticated using the authentication mechanism of the first program, the server program (a) generates a temporary password for the authenticated user I.D., (b) changes the password for the authenticated user ID to the temporary password, (c) accesses the second program using the authenticated ID and the temporary password, and (d) receives data and/or commands from the first program using the security mechanism from the first program and transmits this data and/or commands to the second program and (e) receives data and/or commands from the second program and transmits the data and/or commands to the user using the security mechanism of the first program.
130 Citations
7 Claims
-
1. A distributed computer system including,
a network operating program that includes a distributed network security protocol, an application program that includes a second security protocol, a first sign-on ID and a second sign-on ID, said second sign-on ID having an associated password, said first sign-on ID being a privileged ID which can change said password of said second sign-on ID, and a server connected to a network using said distributed network security protocol, said server including means for signing on to said application program using said second security protocol and said first ID and for changing the password of said second ID to a temporary password, means for signing on to said application program using said second security protocol, said second ID and said temporary password, and means for passing data between said server and said network using said network security protocol.
-
5. In a distributed computer system that includes a network operating program that includes a distributed network security protocol, and an application program that includes a second security protocol, said application program including a first sign-on ID and a second sign-on ID, said second sign-on ID having an associated password, said first sign-on ID being a privileged ID which can change the password of said second sign-on ID,
the improvement comprising; -
a server connected to a network using said distributed network security protocol, said server including means for signing on to said application program using said second security protocol and said first ID and for changing the password of said second ID to a temporary password, means for signing on to said application program using said second security protocol, said second ID and said temporary password, and means for passing data between said server and said network using said network security protocol whereby data passes from said network to said server using said distributed network protocol and between said server and said application program using said second security protocol. - View Dependent Claims (6, 7)
-
Specification