×

Method and apparatus for proxy authentication

  • US 5,913,025 A
  • Filed: 11/14/1996
  • Issued: 06/15/1999
  • Est. Priority Date: 11/14/1996
  • Status: Expired due to Term
First Claim
Patent Images

1. A method in a computer system, comprising the steps of:

  • (a) obtaining by a source the rights of a source object, the rights of the source object including authorization to access a target object and to modify authentication data of the target object, the target object having rights to access one or more objects;

    (b) generating new authentication data by the source;

    (c) accessing the target object by the source using the rights of the source object;

    (d) modifying, at least partially due to the source having obtained the rights of the source object, the authentication data of the target object to include the new authentication data;

    (e) using the new authentication data by the source to obtain the rights of the target object to access the one or more objects, whereby the source becomes a proxy for the target object; and

    (f) using by the source the rights of the target object.

View all claims
  • 9 Assignments
Timeline View
Assignment View
    ×
    ×