×

Access privilege transferring method

  • US 7,058,971 B1
  • Filed: 09/06/2000
  • Issued: 06/06/2006
  • Est. Priority Date: 09/29/1999
  • Status: Expired due to Fees
First Claim
Patent Images

1. An access privilege transferring method for safely transferring access privileges between clients, and between clients and servers, over an object space in which at least one server for providing objects and at least one client requiring the objects are connected to one another by a network, and access to each of the objects complying with privilege information held by each of the clients is allowed, comprising:

  • holding user information and secret information by each of a plurality of clients;

    holding, in a server, the user information and the secret information of at least a first of the plurality of clients;

    generating privilege information by the at least the first of the plurality of clients;

    applying a predetermined calculating operation to information comprising at least the privilege information and the secret information, thereby generating protected privilege information by the at least the first of the plurality of clients;

    transmitting the user information, the privilege information and the protected privilege information from the at least the first of the plurality of clients to at least a second of the plurality of clients;

    retransmitting, from the at least the second of the plurality of clients, the user information, the privilege information and the protected privilege information to the server, thereby making a request to access an object;

    checking, by the server, whether the privilege information received from the at least the second of the plurality of clients is valid;

    applying a predetermined calculating operation to information comprising at least the privilege information and the secret information, thereby generating protected privilege information by the server;

    comparing the protected privilege information received by the server with the protected privilege information generated by the server; and

    allowing access to an object in response to the coincidence of the received protected privilege information and the generated protected privilege information based on the results of the comparison.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×