The invention relates generally to network security and more particularly to techniques for creating and maintaining crafted identities.
An average Internet user or consumer faces an enormous challenge with conducting their affairs over the Internet. Every time a purchase is made for a good or service over the Internet an account is needed to complete that transaction. These accounts are hosted on systems managed by businesses. These businesses largely generate revenue and profit from selling goods and services and not from managing systems associated with a consumer's account. Consequently, it should come as no surprise that confidential consumer information is now literally and electronically all over the planet. Seldom do consumers question the competency or integrity of the businesses with which they electronically transact.
Also, new challenges are being presented every day on the Internet, which compound the problems. For example, consider scams related to phishers and pharmers, fake World-Wide Web (WWW) sites, bogus sites, deals to good to be true included within electronic mail (email) messages, and the like; all of which is an attempt to scam the consumer out of information that allows ready access to the consumer's funds and good name. These problems stem from the fact that the Internet consumer is unable to determine who they are in fact communicating with.
On the flip side of the matter, businesses face equal challenges if not more daunting issues. To effectively compete, businesses often have to provide services to employees, to provide information to both internal and external facing audiences, and to foster innovation among teams that are spread over the entire planet. Consequently, enterprise information is a target for attack of nefarious individuals. Essentially, businesses are faced with a challenge of, “who are we really communicating with over the Internet?”
An accepted business solution is authentication. But, this is one-sided in that the consumer often authenticates to the business but the business does not authenticate to the consumer. So, how does the consumer know that the purported businesses asking for authentication are not in fact phishers or pharmers? Likewise, legitimate businesses issue credentials to users and expect all those users to be responsible and not to expose these credentials over the Internet. Yet, how does a user truly know his/her access attempts are not being intercepted and compromised?
Accordingly, improved techniques for identity creation, maintenance, and use are desirable.
In various embodiments, crafted identities are presented. More specifically, and in an embodiment, a method for creating a crafted identity is provided. A request to create a crafted identity is received from a principal. Roles and/or permissions are assembled for the crafted identity for accessing desired resources. A statement is created representing the crafted identity. The statement includes the roles, the permissions, and/or identifier information. In an embodiment, the identifier information may be used by the resources to validate the crafted identity and the roles and/or permissions are used to define access rights of the crafted identity to the resources.
A “resource” includes a service, system, device, directory, data store, user, groups of users, combinations of these things, etc. A “principal” is a specific type of resource, such as an automated service or user that acquires an identity. A designation as to what is a resource and what is a principal can change depending upon the context of any given network transaction. Thus, if one resource attempts to access another resource, the actor of the transaction may be viewed as a principal.
An “identity” is something that is formulated from a one or more identifiers and secrets that provide a statement of roles and/or permissions that the identity has in relation to resources. An “identifier” is information, which may be private and permits an identity to be formed, and some portions of an identifier may be public information, such as a user identifier, name, etc. Some examples of identifiers include social security number (SSN), user identifier and password pair, account number, retina scan, fingerprint, face scan, etc. As more and more identifiers are accumulated, a confidence in a particular identity grows stronger and stronger. In an embodiment, the identifier is a signature or a pair of signatures. For example, the signature of an identity service that vouches for a crafted identity, the signature of a principal associated with the crafted identity, or the signature of both the identity service and the principal.
“Authentication” is the process of validating the association of identifiers and secrets according to a policy, which is specific to the context in which the resulting identity is to be used. Thus, when identifiers are validated within a context specific to how an identity is to be used, it is authentication.
A “crafted identity” is an identity that may permit a principal's true identity to remain anonymous from the resource it seeks to access. With a crafted identity, an identity vault (e.g., one or more repositories holding secrets and identifiers) is opened to create the crafted identity and authenticate the principal to which it is associated, and then the identity vault is closed. Thereafter, the crafted identity can be validated by a resource, and acted upon without ever re-referencing the identity vault.
The creation, maintenance, and use of crafted identities are discussed in detail herein and below. In some embodiments, an identity service is used. Examples of an identity service can be found in: U.S. patent Ser. No. 10/765,523 (“Techniques for Dynamically Establishing and Managing Authentication and Trust Relationships”), U.S. Ser. No. 10/767,884 (“Techniques for Establishing and Managing a Distributed Credential Store”), and U.S. Ser. No. 10/770,677 (“Techniques for Dynamically Establishing and Managing Trust Relationships”). These applications are commonly assigned to Novell, Inc. of Provo, Utah and the disclosures of which are incorporated by reference herein.
The crafted identity may be represented in a variety of formats and include a variety of information. Some of this information, as will be demonstrated below, is consumed by resources to validate the crafted identity, and other portions of the information consumed by the principals using the crafted identities to manage access rights and limitations. A “statement” is a data structure that includes this information.
Various embodiments of this invention can be implemented in existing network architectures. For example, in some embodiments, the techniques presented herein are implemented in whole or in part in the Novell® network and proxy server products, distributed by Novell®, Inc., of Provo, Utah.
Of course, the embodiments of the invention can be implemented in a variety of architectural platforms, operating and server systems, or applications. Any particular architectural layout or implementation presented herein is provided for purposes of illustration and comprehension only and is not intended to limit aspects of the invention.
Initially, it should be noted that a requesting principal, who desires a usable crafted identity, authenticates to the creation service. That is, the creation service and the principal are in a trusted relationship with one another and communicate with one another securely. The creation service also has access to identifiers and secrets of the principal, so as to assure itself as to the true identity of the principal. The context of the communication is directed toward initially establishing a crafted identity, and within this context the creation service validates identifiers of the principal to assure the creation service as to an identity of the principal for the context. Also, as noted above, the principal may be any type of resource that is making a request for a crafted identity. Thus, the principal may be a user, a group of users, an automated service, etc.
At 110, the creation service receives a creation request from the principal. The request is for the principal to acquire a crafted identity. The crafted identity once created will preserve the anonymity of the principal and prevent resources from accessing information about the principal, except for information included within the crafted identity.
In an embodiment, at 111, the creation service acquires a contract associated with the request. The contract identifies or defines policies that are enforced when creating the crafted identity. Furthermore, the contract may identity the type of crafted identity that is to be created.
It should be noted that the principal may actually be authenticated to the creation service after a creation request for a crafted identity is received or during receipt of a request. Thus, the timing of the authentication can occur prior to the request, with a request, and/or after a request is received and has began to be processed by the creation service. Additionally, the authentication may include, but is not limited to, challenges from the creation service to the principal for passwords, smart token responses, responses requiring associated private keys, biometric responses, challenges for other identifiers or secret information, temporal constraints, etc.
At 120, the creation service assembles roles and/or permissions for the crafted identity. A role is a designation recognized within the context of a given resource, such as and by way of example only, administrator, supervisor, visitor, etc. Permissions are defined access rights for a given role on a given resource, such as and by way of example only, read access, write access, read and write access, etc.
The crafted identity may be directed to providing anonymous access for the requesting principal to one or more resources for defined purposes that are enumerated or derivable from the initial request. In this regard, policies drive the roles and/or permissions represented in the crafted identity. These roles and/or permissions combine to form access rights to a specific resource. The policies may be dictated by the specific resource.
In an embodiment, at 121, the roles and/or permissions may be expressed as a static definition or a dynamic specification. A static definition may be predefined for a given role; thus, resolution of permissions for a given role is fully calculated and declared once assembled for the crafted identity. Conversely, the roles and/or permissions may be expressed within a specification that is associated with the crafted identity. The specification is evaluated on a given local system in a given local environment of a target resource to determine the roles and/or permissions dynamically and at runtime. A dynamic approach permits roles/or and permissions to be dynamically resolved based on a given context or situation, such a situation is flexible and allows roles and/or permissions to be provisionally defined within the crafted identity and resolved within a given context at runtime.
In some cases, the original authentication between the creation service and the principal may necessitate the acquisition of attributes. These attributes may be acquired via enterprise directories or other attribute providers. Moreover, some of the attributes may be included in the final crafted identity being created for the principal. The addition of these attributes may also be governed by policy. In some cases, the roles may be viewed as a form of an attribute.
According to an embodiment, at 122, the creation service may associate one or more policies that drive the assembly and creation of the crafted identity and its associated information. Policy may dictate what is included and what is not included in the crafted identity and related information.
At 130, a statement or related information represented a competed crafted identity is created. Here, the roles and/or permissions, any attributes, and identifier information for the newly created crafted identity is packed in a format defined by policy or other specification.
In some cases, at this point, the creation service may separately interact with one or more resources that are associated with the crafted identity and established the crafted identity to be recognized by those resources. This registers the crafted identity with the resources. In other cases, the creation service is a modified identity service and has access to a pool of existing identities for the resources and is authorized to distribute them. In still other situations, the creation service is the validating service for the resources and thus does not have to have any additional communications with the resources. In yet more situations, the crafted identity appears to the resources to be the creation service, such that no additional communication is required with the resources in creating the crafted identity.
In an embodiment, at 140, the creation service may also package in the statement a policy that is context-sensitive. The policy permits the crafted identity to be managed from different and disparate environments based on context. Other types of context-sensitive policies may permit the principal to determine access rights based on the contexts or environments within which the desired resource is being accessed by the principal with the crafted identity.
According to an embodiment, at 150, the creation service may accumulate identifier information from a variety of identity vaults or identifier repositories. The identifier information is comprised or attributes concerning the principal that is, according to policy, to be exposed in the crafted identity. The resource may use these attributes to further validate the crafted identity. The identifier information may be a key, a signature of the creation service, a certificate, etc. The identifier information does not permit the resource validating it to acquire additional identifier information about the principal. Once the resource validates the crafted identity when presented by the principal, the principal assumes the crafted identity within the context of accessing the resource and may remain anonymous to the resource. Yet, the resource is assured that it is dealing with a legitimate and uncompromised identity, because of the role of the creation service.
In still other embodiments, the creation service may maintain and manage the crafted identity, such as when the creation service is a modified identity service. Accordingly, the statement may be provided to the principal on an as needed or dynamic basis when the principal desires to use it to access a given resource. Thus, at 160, rather than directly providing the statement representing the crafted identity to the principal, the creation service may provide a token to the principal and the principal acquires the statement when desired using the token.
The creation service manages and maintains the crafted identity. Consequently, different portions of a crafted identity may become stale or be revoked by a particular resource and the remaining portions of the crafted identity remain valid for use. Additionally, new roles and/or permissions may be added dynamically to a given crafted identity. However, it should be noted that in some embodiments a policy may dictate that a particular crafted identity cannot be expanded, such that to expand a crafted identity a new instance of a crafted identity has to be established.
In an embodiment, at 170, the creation service may represent the identifier information of the crafted identity that is included in the statement in an encrypted format, so as to prevent is interception or use. The identifier information may also be expressed as a statement, such as a Liberty assertion, a Security Assertion Markup Language (SAML) assertion, etc. As stated before, the identifier information may also include key information such as Kerberos, certificates, signatures, etc. The statement represents a final expression of the crafted identity.
According to an embodiment, at 180, the creation service signs the final version of statement that represents the crafted identity. This digital signature of the creation service serves as assertion as to the authenticity of the crafted identity for other services, principals, and/or resources that trust the creation service. In some cases, the statement may also be signed by the principal receiving it or a principal service (discussed below with
Once the creation service has created the crafted identity for the principal and has included a mechanism for the principal to acquire and access the statement representing the crafted identity, the principal may use the information within the statement to securely, and optionally anonymously, access a desired resource for which the crafted identity was created.
It should also be noted, that a single crafted identity may include identifier information that can be validated and used with more than one desired resource. So, a single crafted identity and statement may provide a requesting principal with anonymous access to a plurality of different resources.
Also, the creation service may associate constraints with any provided crafted identity or portion thereof. Some constraints may include a time-to-live or an event, such that when detected the crafted identity, or portion thereof, is revoked or no longer valid. A policy may also constrain the crafted identity. The policy may monitor the usage and access of the principal and revoke the crafted identity upon detected misuse. In this way, the creation service may actively and dynamically manage the crafted identity.
At 210, the principal service accesses a statement that represents a crafted identity to acquire an identifier. The access is based on a desired resource that a principal may want to anonymously interact with and access. In an embodiment, at 211, the principal service passes a token to an identity service to acquire the statement. In other embodiments, the statement is maintained within a local environment of the principal service once provided by the identity service (creation service) in response to a request from the principal. In some cases, at 211, the principal service may also sign the statement. This adds to the authenticity of the statement, and the statement may also have been signed by the creation/identity service.
At 220, the principal service presents an identifier acquired from the statement to a desired resource as a crafted identity. The identifier may be signed or may vouch for an identity service (creation service) that the resource trusts. Alternatively, the identifier may provide evidence of an identity that is recognized by the resource. That identity was created or registered by the identity service (creation service) upon the conclusion of the creation process for the crafted identity.
In an embodiment, at 230, the principal service may also acquire an additional key from the statement and use that key as further identifier information to the resource. For example, a particular resource may require an ID and password, the identifier may be the ID and the key may be viewed as the password. The key may also be more complex, such as a signature of the identity service (creation service), a certificate, etc. In some cases, at 240, the key and/or identifier may be decrypted within the statement, such that it is decrypted by the principal service before being presented to the resource. In other cases, at 240, the key and/or identifier may be represented within the statement as an assertion, signed by an identity service (creation service) and relied upon as authenticate by the resource.
At this point, the resource that receives the identifier validates it and then recognizes the principal, not as the principal, but as the crafted identity. The access rights defined by roles and privileges may also be included in the statement, such that the principal service may determine and enforce access attempts made by the principal to the resource.
According to an embodiment, at 250, the principal service may be used to provide the principal with access to the resource for purposes of completing a financial transaction in an anonymous fashion. One way to do this, is for the details of the transaction to be hidden within the creation service and performed through the creation service, such that a creation service credit card or account is presented to the resource to complete the transaction, where the actual credit card number or account is debited by the creation service. The creation service may facilitate the transaction and vouch for it to the resource, but the resource is unable to discern the credit card number of account number used in the transaction.
It is understood that a variety of accesses may be performed, and that the above example should not be construed to limit the types of accesses that can benefit from the teachings presented herein. In fact, any anonymous access to a resource that utilizes a crafted identity in the manners described herein is intended to fall within the generous scope of this disclosure.
The creation service of
The crafted identity system 300 includes a statement 301 and an identity service 302. In some embodiments, the crafted identity system 300 may also include one or more identity repositories or vaults 303. Each of these will now be discussed in turn.
The statement 301 represents a crafted identity. The statement 301 is a product of the identity service 302. The identity service 302 produces the statement in response to policy and a request from a principal for a crafted identity. The crafted identity masks the true identity of the principal as the principal accesses a resource, the resource assumes the crafted identity is legitimate because of the presence of the identity service 302; and yet, the identity of the principal remains anonymous during the access of the resource.
Examples of a statement 301 and its creation were provided above with respect to the creation service represented by the method 100 of
The statement 301 includes roles and/or permissions for the crafted identity. The roles and/or permissions define limitations on access to a resource by a principal using the crafted identity, which is represented by the statement 301. The statement 301 also includes one or more identifiers. The identifiers are validated by the resources to assure the resources that the access requested is coming from a legitimate requestor. In an embodiment, the identifier is encrypted within the statement 301. According to an embodiment, the identifier is represented as an assertion from the identity service 302. In some embodiments, the statement 301 may also include attribute information.
The identity service 302 produces the statement 301 in response to a request from a principal to create a crafted identity. During or before this request, the identity service 302 may access a variety of identity repositories or vaults for purposes of authenticating the identity of the requesting principal. These identifiers validated by the identity service 302 during initial authentication of the requesting principal may not be included in the statement 301. Thus, the identity of the principal may be preserved and may remain anonymous with the crafted identity and the statement 301 that represents the crafted identity and its use.
In an embodiment, the identity service 302 acquires a contract in a creation request from the principal. The contract defines limitations and/or policies for forming the statement 301. The contract may also define the format with which the statement 301 is to be expressed and supplied back to the principal or a principal service, such as the principal service represented by the method 200 of
According to an embodiment, the identity service 302 maintains and manages the statement 301 according to a use policy. The use policy may be different than the policy or contract that may have been used to initially create the statement 301 for the crafted identity. Additionally, the statement 301 may also include context-sensitive policies. These context-sensitive policies may define access rights for a principal according to specific or given contexts.
The identity service 302 generates and maintains the statement 301 on behalf of a principal. A principal uses the statement 301 to acquire anonymous access to resources. Privacy is maintained between both a resource and the principal and both are assured of anonymity because of the third-party and trusted relationship with the identity service 302 that facilitates the crafted identity and preserves its integrity.
The data structure 400 includes one or more identifiers 401, one or more policies 402, and one more roles and/or permissions 403. Each of these will now be discussed in turn.
The identifiers 401 are created by a creation service or an identity service, such as the creation service represented by the method 100 of
In an embodiment, the identifiers 401 are encrypted or are represented as assertions from the creation or identity service. The assertions may be implemented as Liberty or SAML assertions. The assertions are assured because they are made by the creation or identity service and vouch for the crafted identity and are relied upon by the resources.
The policies 402 are also created by a creation service or an identity service. The policies define limitations on access rights for given contexts that a principal may encounter when accessing a given resource.
The roles and/or permissions define access rights for given roles that the crafted identity may assume with respect to accessing the resource. The definition of the roles and/or permissions may be static and fully declared within the data structure 400 or may be represented as a specification that is adapted to be dynamically resolved at runtime or when a specific access of a resource is made.
In some embodiments, the data structure 400 may also include attribute information or other information that may prove useful to the principal in anonymously accessing the desired resources and to the creation or identity service in maintaining and managing the data structure 400.
The above description is illustrative, and not restrictive. Many other embodiments will be apparent to those of skill in the art upon reviewing the above description. The scope of embodiments should therefore be determined with reference to the appended claims, along with the full scope of equivalents to which such claims are entitled.
The Abstract is provided to comply with 37 C.F.R. § 1.72(b) and will allow the reader to quickly ascertain the nature and gist of the technical disclosure. It is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims.
In the foregoing description of the embodiments, various features are grouped together in a single embodiment for the purpose of streamlining the disclosure. This method of disclosure is not to be interpreted as reflecting that the claimed embodiments have more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive subject matter lies in less than all features of a single disclosed embodiment. Thus the following claims are hereby incorporated into the Description of the Embodiments, with each claim standing on its own as a separate exemplary embodiment.
Number | Name | Date | Kind |
---|---|---|---|
4123747 | Lancto et al. | Oct 1978 | A |
5005200 | Fischer | Apr 1991 | A |
5361359 | Tajalli et al. | Nov 1994 | A |
5388213 | Oppenheimer et al. | Feb 1995 | A |
5544322 | Cheng et al. | Aug 1996 | A |
5579478 | Heiserman et al. | Nov 1996 | A |
5638446 | Rubin | Jun 1997 | A |
5692047 | Mcmanis | Nov 1997 | A |
5813009 | Johnson et al. | Sep 1998 | A |
5892904 | Atkinson et al. | Apr 1999 | A |
5918210 | Rosenthal et al. | Jun 1999 | A |
5924077 | Beach et al. | Jul 1999 | A |
5987134 | Shin et al. | Nov 1999 | A |
6023704 | Gerard et al. | Feb 2000 | A |
6025757 | Tsukagoshi et al. | Feb 2000 | A |
6029144 | Barrett et al. | Feb 2000 | A |
6041411 | Wyatt | Mar 2000 | A |
6055637 | Hudson | Apr 2000 | A |
6067525 | Johnson et al. | May 2000 | A |
6073234 | Kigo et al. | Jun 2000 | A |
6092194 | Touboul | Jul 2000 | A |
6107931 | Nicholson | Aug 2000 | A |
6149522 | Alcorn et al. | Nov 2000 | A |
6167513 | Inoue et al. | Dec 2000 | A |
6170057 | Inoue et al. | Jan 2001 | B1 |
6230271 | Wadlow et al. | May 2001 | B1 |
6308163 | Du et al. | Oct 2001 | B1 |
6463468 | Buch | Oct 2002 | B1 |
6471521 | Dornbush et al. | Oct 2002 | B1 |
6516416 | Gregg et al. | Feb 2003 | B2 |
6532451 | Schell et al. | Mar 2003 | B1 |
6561425 | Kresina et al. | May 2003 | B2 |
6600168 | Geng | Jul 2003 | B1 |
6615352 | Terao et al. | Sep 2003 | B2 |
6671350 | Oxley | Dec 2003 | B1 |
6704728 | Chang et al. | Mar 2004 | B1 |
6715073 | An et al. | Mar 2004 | B1 |
6718470 | Adams | Apr 2004 | B1 |
6725269 | Megiddo | Apr 2004 | B1 |
6735701 | Jacobson | May 2004 | B1 |
6750883 | Parupudi et al. | Jun 2004 | B1 |
6754642 | Tadayon | Jun 2004 | B2 |
6769060 | Dent et al. | Jul 2004 | B1 |
6795967 | Evans et al. | Sep 2004 | B1 |
6807636 | Hartman et al. | Oct 2004 | B2 |
6820135 | Dingman et al. | Nov 2004 | B1 |
6836843 | Seroussi et al. | Dec 2004 | B2 |
6871279 | Sames et al. | Mar 2005 | B2 |
6931440 | Blumenau et al. | Aug 2005 | B1 |
6937976 | Apte | Aug 2005 | B2 |
6944183 | Iyer et al. | Sep 2005 | B1 |
6957332 | Ellison et al. | Oct 2005 | B1 |
7098753 | Dumitrescu et al. | Aug 2006 | B1 |
7120802 | Shear et al. | Oct 2006 | B2 |
7123113 | Brennan et al. | Oct 2006 | B1 |
7219142 | Parekh et al. | May 2007 | B1 |
7290288 | Gregg et al. | Oct 2007 | B2 |
7292114 | Greenberg | Nov 2007 | B2 |
7332979 | Connell et al. | Feb 2008 | B2 |
7350237 | Vogel et al. | Mar 2008 | B2 |
7734754 | Dougherty et al. | Jun 2010 | B2 |
7788366 | Yacoby et al. | Aug 2010 | B2 |
7788711 | Sun et al. | Aug 2010 | B1 |
8281374 | Carter | Oct 2012 | B2 |
8316237 | Felsher et al. | Nov 2012 | B1 |
8468330 | Reed et al. | Jun 2013 | B1 |
9781154 | Carter et al. | Oct 2017 | B1 |
20010051906 | Esposito | Dec 2001 | A1 |
20010052012 | Rinne et al. | Dec 2001 | A1 |
20020029340 | Pensak | Mar 2002 | A1 |
20020107875 | Seliger et al. | Aug 2002 | A1 |
20020120917 | Abrari et al. | Aug 2002 | A1 |
20020138735 | Felt et al. | Sep 2002 | A1 |
20020147801 | Gullotta et al. | Oct 2002 | A1 |
20020156785 | Kumar et al. | Oct 2002 | A1 |
20020160347 | Wallace et al. | Oct 2002 | A1 |
20020169876 | Curie et al. | Nov 2002 | A1 |
20020186844 | Levy et al. | Dec 2002 | A1 |
20030070091 | Loveland | Apr 2003 | A1 |
20030074579 | Della-Libera | Apr 2003 | A1 |
20030088786 | Moran | May 2003 | A1 |
20030115179 | Prabakaran et al. | Jun 2003 | A1 |
20030115246 | Mahon et al. | Jun 2003 | A1 |
20030126464 | McDaniel et al. | Jul 2003 | A1 |
20030130931 | Mirlas et al. | Jul 2003 | A1 |
20030131232 | Fraser et al. | Jul 2003 | A1 |
20030140230 | de Jong et al. | Jul 2003 | A1 |
20030149599 | Goodall et al. | Aug 2003 | A1 |
20030153991 | Visser et al. | Aug 2003 | A1 |
20040044643 | DeVries et al. | Mar 2004 | A1 |
20040044730 | Gockel et al. | Mar 2004 | A1 |
20040064568 | Arora et al. | Apr 2004 | A1 |
20040093502 | Shurygailo | May 2004 | A1 |
20040107118 | Harnsberger et al. | Jun 2004 | A1 |
20040128392 | Blakley, III et al. | Jul 2004 | A1 |
20040128506 | Blakley, III et al. | Jul 2004 | A1 |
20040139319 | Favazza et al. | Jul 2004 | A1 |
20040148326 | Nadgir et al. | Jul 2004 | A1 |
20040151323 | Olkin et al. | Aug 2004 | A1 |
20040162833 | Jones et al. | Aug 2004 | A1 |
20040177326 | Bibko et al. | Sep 2004 | A1 |
20040210771 | Wood | Oct 2004 | A1 |
20040221049 | Blumenau et al. | Nov 2004 | A1 |
20040236702 | Fink | Nov 2004 | A1 |
20040240846 | Cookson et al. | Dec 2004 | A1 |
20050027845 | Secor et al. | Feb 2005 | A1 |
20050044411 | Somin | Feb 2005 | A1 |
20050060584 | Ginter et al. | Mar 2005 | A1 |
20050068983 | Carter et al. | Mar 2005 | A1 |
20050120201 | Benaloh et al. | Jun 2005 | A1 |
20050144144 | Graff | Jun 2005 | A1 |
20050204129 | Sudia et al. | Sep 2005 | A1 |
20050216956 | Orr et al. | Sep 2005 | A1 |
20050228688 | Visser et al. | Oct 2005 | A1 |
20050254652 | Engler et al. | Nov 2005 | A1 |
20050257045 | Bushman et al. | Nov 2005 | A1 |
20060005254 | Ross | Jan 2006 | A1 |
20060071729 | Cetin et al. | Apr 2006 | A1 |
20060095953 | Frank | May 2006 | A1 |
20060100010 | Gatto et al. | May 2006 | A1 |
20060200680 | Ellison et al. | Sep 2006 | A1 |
20070061263 | Carter | Mar 2007 | A1 |
20070061872 | Carter | Mar 2007 | A1 |
20070112574 | Greene | May 2007 | A1 |
20070143824 | Shahbazi | Jun 2007 | A1 |
20070179802 | Buss et al. | Aug 2007 | A1 |
20070180490 | Renzi et al. | Aug 2007 | A1 |
20070244833 | Camenisch | Oct 2007 | A1 |
20080180693 | Dillon et al. | Jul 2008 | A1 |
20110052012 | Bambha et al. | Mar 2011 | A1 |
20170374096 | Carter et al. | Dec 2017 | A1 |
Number | Date | Country |
---|---|---|
1773020 | Sep 2006 | EP |
1764978 | Mar 2007 | EP |
1933264 | Jun 2008 | EP |
1764978 | Nov 2010 | EP |
1773020 | Nov 2017 | EP |
Entry |
---|
U.S. Appl. No. 11/638,121, filed Dec. 13, 2006, Policy Enforcement via Attestations. |
“European Search Report for Application No. EP 06 12 0148”, 12 Pages. |
Bajaj, Siddharth, et al., “Web Services Federation Language (WS Federation)”, Version 1.0, (Jul. 8, 2003), 1-34. |
Hallam-Baker, Phillip, “Security Assertions Markup Language”, Security Assertions Markup Language, Core Assertion Architecture—Examples and Explanations, Draft Version 0.7, (May 14, 2001), 24 Pages. |
“European Application No. 07122559 Search Report”, (dated Apr. 10, 2008), 2 pgs. |
Abbie Barbir Nortel Networks, “Overview and Summary of SAML v. 2”, (Oct. 5, 2004), 7 pgs. |
Hughes, J, et al., “Security Assertion Markup Language: Technical Overview”, (Sep. 12, 2005), 40 pgs. |
Poniszewska-Maranda, A, “Role engineering of information system using extended RBAC model”, Enabling Technologies: Infrastructure for collaborative enterprise, 14th IEEE Workshops on Linkoping, Sweden Jun. 13-15, 2005, (Jun. 13, 2005), 154-159. |
Siemens, Gunther C, “SAML in Authorization Policies”, (Feb. 13, 2005), 7 pgs. |
U.S. Appl. No. 11/225,994, Feb. 24, 2009, Office Action. |
U.S. Appl. No. 11/225,994, Jul. 30, 3009, Final Office Action. |
U.S. Appl. No. 11/225,994, Oct. 27, 2009, Advisory Action. |
U.S. Appl. No. 11/225,994, Jan. 25, 2010, Office Action. |
U.S. Appl. No. 11/225,994, Jul. 22, 2020, Final Office Action. |
U.S. Appl. No. 11/225,994, Oct. 25, 2010, Advisory Action. |
U.S. Appl. No. 11/225,994, Sep. 19, 2011, Office Action. |
U.S. Appl. No. 11/225,994, Mar. 21, 2012, Notice of Allowance. |
U.S. Appl. No. 11/638,121, Nov. 27, 2009, Restriction Requirement. |
U.S. Appl. No. 11/638,121, Apr. 15, 2020, Office Action. |
U.S. Appl. No. 11/638,121, Oct. 15, 2010, Final Office Action. |
U.S. Appl. No. 11/638,121, Dec. 23, 2010, Advisory Action. |
U.S. Appl. No. 10/612,666, Oct. 31, 2006, Non-Final Office Action. |
U.S. Appl. No. 10/612,666, Jun. 15, 2007, Final Office Action. |
U.S. Appl. No. 10/612,666, Aug. 31, 2007, Advisory Action. |
U.S. Appl. No. 10/612,666, Dec. 31, 2007, Non-Final Office Action. |
U.S. Appl. No. 10/612,666, Jul. 9, 2008, Final Office Action. |
U.S. Appl. No. 10/612,666, Jan. 3, 2009, Pre-Appeal Brief Review Panel Decision—Rejected. |
U.S. Appl. No. 10/612,666, May 21, 2009, Non-Final Office Action. |
U.S. Appl. No. 10/612,666, Dec. 4, 2009, Final Office Action. |
U.S. Appl. No. 10/612,666, Feb. 19, 2010, Advisory Action. |
U.S. Appl. No. 10/612,666, Apr. 5, 2010, Non-Final Office Action. |
U.S. Appl. No. 10/612,666, Sep. 13, 2010, Final Office Action. |
U.S. Appl. No. 10/612,666, Dec. 1, 2010, Advisory Action. |
U.S. Appl. No. 10/612,666, Jan. 7, 2011, Non-Final Office Action. |
U.S. Appl. No. 10/612,666, Jun. 23, 2011, Final Office Action. |
U.S. Appl. No. 10/612,666, Sep. 15, 2011, Advisory Action. |
U.S. Appl. No. 10/612,666, Mar. 1, 2012, Non-Final Office Action. |
U.S. Appl. No. 10/612,666, Oct. 30, 2012, Final Office Action. |
U.S. Appl. No. 10/612,666, filed Jun. 30, 2003, Notice of Allowance dated Feb. 19, 2013, 32 pages. |
Extended European Search Report for EP 06 120 149, dated Jan. 25, 2007, 6 pages. |
U.S. Appl. No. 11/225,994, filed Sep. 14, 2005, Office Action dated Feb. 24, 2009, 10 pages. |
U.S. Appl. No. 11/225,994, filed Sep. 14, 2005, Final Office Action dated Jul. 30, 2009, 10 pages. |
U.S. Appl. No. 11/225,994, filed Sep. 14, 2005, Advisory Action dated Oct. 27, 2009, 3 pages. |
U.S. Appl. No. 11/225,994, filed Sep. 14, 2005, Office Action dated Jan. 25, 2010, 11 pages. |
U.S. Appl. No. 11/225,994, filed Sep. 14, 2005, Final Office Action dated Jul. 22, 2010, 10 pages. |
U.S. Appl. No. 11/225,994, filed Sep. 14, 2005, Advisory Action dated Oct. 15, 2010, 3 pages. |
U.S. Appl. No. 11/225,994, filed Sep. 14, 2005, Office Action dated Sep. 19, 2011, 10 pages. |
U.S. Appl. No. 11/225,994, filed Sep. 14, 2005, Notice of Allowance dated Mar. 21, 2012, 11 pages. |
U.S. Appl. No. 11/638,121, filed Dec. 13, 2006, Requirement for Restriction/Election dated Nov. 27, 2009, 7 pages. |
U.S. Appl. No. 11/638,121, filed Dec. 13, 2006, Office Action dated Apr. 15, 2010, 14 pages. |
U.S. Appl. No. 11/638,121, filed Dec. 13, 2006, Final Office Action dated Oct. 15, 2010, 14 pages. |
U.S. Appl. No. 11/638,121, filed Dec. 13, 2006, Advisory Action dated Dec. 23, 2010, 2 pages. |
U.S. Appl. No. 11/225,994, Notice of Allowance dated Aug. 24, 2012, 5 pages. |
U.S. Appl. No. 11/638,121, Non-Final Office Action dated May 23, 2014, 11 pages. |
European Application No. 06120148, Extended European Search Report dated Dec. 27, 2006, 12 pages. |
European Application No. 06120149, European Search Report dated Mar. 12, 2007, 6 pages. |
U.S. Appl. No. 11/638,121, Non-Final Office Action dated May 20, 2016, 17 pages. |
U.S. Appl. No. 11/638,121, filed Dec. 13, 2006, Final Office Action dated Aug. 20, 2015, 31 pages. |
U.S. Appl. No. 11/638,121, Non-Final Office Action dated Mar. 4, 2015, 12 pages. |
U.S. Appl. No. 11/638,121, filed Dec. 13, 2006, Advisory Action dated Nov. 19, 2015, all pages. |
U.S. Appl. No. 11/638,121, filed Dec. 13, 2006, received a Non Final Office Action dated Jul. 18, 2017, 13 pages. |
U.S. Appl. No. 10/404,495, filed Apr. 1, 2003, Restriction Requirement dated Jan. 23, 2008, 6 pages. |
U.S. Appl. No. 10/404,495, filed Apr. 1, 2003 Non-Final Office Action dated May 9, 2008, 9 pages. |
U.S. Appl. No. 10/404,495, filed Apr. 1, 2003 Final Office Action dated Nov. 25, 2008, 11 pages. |
U.S. Appl. No. 10/404,495, filed Apr. 1, 2003 Advisory Action dated Feb. 6, 2009, 2 pages. |
U.S. Appl. No. 10/404,495, filed Apr. 1, 2003 Non-Final Office Action dated May 28, 2009, 16 pages. |
U.S. Appl. No. 10/404,495, filed Apr. 1, 2003 Final Office Action dated Dec. 28, 2009, 18 pages. |
U.S. Appl. No. 10/404,495, filed Apr. 1, 2003 Advisory Action dated Mar. 10, 2010, 2 pages. |
U.S. Appl. No. 10/404,495, filed Apr. 1, 2003 Non-Final Office Action dated Jun. 20, 2013, 17 pages. |
U.S. Appl. No. 10/404,495, filed Apr. 1, 2003 Final Office Action dated Jan. 15, 2014, 14 pages. |
U.S. Appl. No. 10/404,495, filed Apr. 1, 2003 Non-Final Office Action dated Oct. 22, 2015, 28 pages. |
U.S. Appl. No. 10/404,495, filed Apr. 1, 2003 Final Office Action dated May 6, 2016, 35 pages. |
U.S. Appl. No. 15/275,931, filed Sep. 26, 2016, First Action Interview Pre-Interview Communication, dated Feb. 14, 2017, 9 pages. |
U.S. Appl. No. 15/275,931, filed Sep. 26, 2016, Notice of Allowance, dated Jun. 1, 2017, 8 pages. |
U.S. Appl. No. 11/638,121, filed Dec. 13, 2006 Advisory Action, dated May 4, 2017, 5 pages. |
U.S. Appl. No. 11/638,121, filed Dec. 13, 2006 Final Office Action, dated May 4, 2017, 5 pages. |
Office Action in European Patent Application No. 06120149.7 , dated Oct. 18, 2007, 3 pages. |
Office Action in European Patent Application No. 06120149.7 , dated Jun. 6, 2007, 4 pages. |
Office Action in European Patent Application No. 06120149.7 , dated Oct. 2, 2006, 4 pages. |
European Application No. 06120148.9 filed Sep. 5, 2006 received an European Search Report dated Dec. 27, 2016, 11 pages. |
U.S. Appl. No. 10/612,666, filed Jun. 30, 2003, Non-final Office Action dated Oct. 31, 2006, 21 pages. |
U.S. Appl. No. 10/612,666, filed Jun. 30, 2003, Non-final Office Action dated Dec. 31, 2007, 27 pages. |
U.S. Appl. No. 10/612,666, filed Jun. 30, 2003, Non-final Office Action dated May 21, 2009, 15 pages. |
U.S. Appl. No. 10/612,666, filed Jun. 30, 2003, Non-final Office Action dated Apr. 5, 2010, 16 pages. |
U.S. Appl. No. 10/612,666, filed Jun. 30, 2003, Non-final Office Action dated Jan. 7, 2011, 19 pages. |
U.S. Appl. No. 10/612,666, filed Jun. 30, 2003, Non-final Office Action dated Mar. 1, 2012, 21 pages. |
U.S. Appl. No. 10/612,666, filed Jun. 30, 2003, Final Office Action dated Jun. 15, 2007, 28 pages. |
U.S. Appl. No. 10/612,666, filed Jun. 30, 2003, Final Office Action dated Jul. 9, 2008, 18 pages. |
U.S. Appl. No. 10/612,666, filed Jun. 30, 2003, Final Office Action dated Dec. 4, 2009, 16 pages. |
U.S. Appl. No. 10/612,666, filed Jun. 30, 2003, Final Office Action dated Sep. 13, 2010, 18 pages. |
U.S. Appl. No. 10/612,666, filed Jun. 30, 2003, Final Office Action dated Jun. 23, 2011, 22 pages. |
U.S. Appl. No. 10/612,666, filed Jun. 30, 2003, Final Office Action dated Oct. 30, 2012, 21 pages. |
U.S. Appl. No. 10/612,666, filed Jun. 30, 2003, Advisory Action dated Aug. 31, 2007, 3 pages. |
U.S. Appl. No. 10/612,666, filed Jun. 30, 2003, Advisory Action dated Feb. 19, 2010, 3 pages. |
U.S. Appl. No. 10/612,666, filed Jun. 30, 2003, Advisory Action dated Dec. 1, 2010, 3 pages. |
U.S. Appl. No. 10/612,666, filed Jun. 30, 2003, Advisory Action dated Sep. 15, 2011, 3 pages. |
U.S. Appl. No. 10/612,666, filed Jun. 30, 2003, Pre-Appeal Brief Review Panel Decision—Rejected dated Jan. 13, 2009, 2 pages. |
Number | Date | Country | |
---|---|---|---|
20070061263 A1 | Mar 2007 | US |