Technique of password encryption and decryption for user authentication in a federated content management system
First Claim
Patent Images
1. A method of executing one or more commands in a computer to perform a datastore operation on a datastore connected to the computer, the method comprising the steps of receiving a string of characters;
- encrypting the string of characters based on a first character standard; and
executing one or more software instructions on the computer for transforming the encrypted string of characters to be compatible with a second character standard.
1 Assignment
0 Petitions
Accused Products
Abstract
A technique for password encryption and decryption for user authentication in a federated content management system. One or more commands are executed in a computer to perform a datastore operation on a datastore connected to the computer. A string of characters are received. The string of characters is encrypted based on a first character standard. Then, the encrypted string of characters is transformed to be compatible with a second character standard.
-
Citations
45 Claims
-
1. A method of executing one or more commands in a computer to perform a datastore operation on a datastore connected to the computer, the method comprising the steps of receiving a string of characters;
-
encrypting the string of characters based on a first character standard; and
executing one or more software instructions on the computer for transforming the encrypted string of characters to be compatible with a second character standard. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 40, 41)
-
-
14. An apparatus for executing one or more commands in a computer, comprising:
-
a computer having a datastore coupled thereto, wherein the datastore stores a relational database; and
one or more computer programs, performed by the computer, for receiving a string of characters, encrypting the string of characters based on a first character standard, and transforming the encrypted string of characters to be compatible with a second character standard. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 42, 43)
-
-
27. An article of manufacture comprising a program storage medium readable by a computer and embodying one or more instructions executable by the computer to perform method steps for executing one or more commands to perform a database operation on a relational database stored on a datastore connected to the computer, the method comprising the steps of:
-
receiving a string of characters;
encrypting the string of characters based on a first character standard; and
transforming the encrypted string of characters to be compatible with a second character standard. - View Dependent Claims (28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 44, 45)
-
Specification