Disconnected credential validation using pre-fetched service tickets

Information

  • Patent Grant
  • 8584218
  • Patent Number
    8,584,218
  • Date Filed
    Wednesday, December 21, 2011
    13 years ago
  • Date Issued
    Tuesday, November 12, 2013
    11 years ago
Abstract
One or more user service tickets are obtained (i.e. pre-fetched) from an authentication server and stored in a ticket cache. The user service tickets facilitate a login device communicating with one or more users or group members associated with the login device. Login credentials for the users or group members may be subsequently authenticated against the user service tickets within the ticket cache thereby eliminating the need for immediate access to the authentication server or a previous login session by the users or group members. The user service tickets within the ticket cache may be refreshed as needed. In one embodiment, the user service tickets are refreshed daily and also in response to login attempts if the authentication service is readily accessible.
Description
BACKGROUND OF THE INVENTION

1. Field of the Invention


The present invention relates to computer network authentication services. Specifically, the invention relates to apparatus, methods, and systems for providing disconnected validation of login credentials.


2. Description of the Related Art


In recent years, computer networks have been increasingly significant in terms of the quantity and sensitivity of the data communicated. Once used primarily for academic purposes, the Internet has become a vehicle for communicating such confidential information as credit card transactions, bank account transactions, and corporate intellectual property. The same applies to proprietary corporate networks. As the quantity and value of the data being communicated has increased, the threats to the security of this data have increased proportionately.


One of the technologies developed to address data security threats is Kerberos authentication. Kerberos provides a means for secure authentication of a user's credentials as well as means to protect sensitive data communicated across an insecure network. Kerberos authentication relies on the existence of a Kerberos server that certifies a user's identity to network services utilized by an application the user is running. Services that use Kerberos to authenticate users are said to be “Kerberized.”


While the need for security has increased, so has the need for flexibility. Users are increasingly mobile and may access network services through a variety of locations and devices. Networks are increasing in size and complexity and are often in a state of flux and change. Such size and flexibility provides challenges to network security and reliability. For example, changes in policy or accounts must be effected across larger networks and a greater number of devices. Furthermore, an authentication server such as a Kerberos server may be temporarily inaccessible to some or all of a network resulting in a need for “disconnected” authentication of a user.


While various solutions for disconnected authentication have been developed, such solutions typically require at least one previous login by the user at a particular device at a time that the authentication server is accessible. Such a requirement is impractical given the sheer number of networked devices and the frequency of changes in network configuration and login accounts.


Given the issues and challenges related to providing authentication services and the shortcomings of currently available solutions, a need exists for an apparatus, method, and system to validate login credentials of a user or group member without requiring a previous login from a particular device or immediate access to an authentication server.


SUMMARY OF THE INVENTION

The present invention has been developed in response to the present state of the art, and in particular, in response to the problems and needs in the art that have not yet been fully solved by currently available authentication systems. Accordingly, the present invention has been developed to provide an apparatus, method, and system to validate login credentials without requiring a previous login via the login device or immediate access to an authentication server.


In one aspect of the present invention, a method to validate login credentials of a selected party includes authenticating a login device with an authentication service, obtaining a service ticket from the authentication service for the login device to communicate with the selected party (referred to herein as a user service ticket), and storing the user service ticket for subsequent authentication of the selected party by the login device. Authenticating the login device may include providing valid credentials and a valid timestamp to the authentication service. Tickets to communicate with one or more selected parties such as users or group members may be pre-fetched by the login device without requiring access to the credentials of the users or group members.


In another aspect of the present invention, an apparatus to validate login credentials includes a ticket pre-fetch module configured to authenticate a login device with an authentication service and obtain (i.e. pre-fetch) user service tickets from the authentication service for the login device to communicate with one or more selected parties such as users and group members. The apparatus may also include a ticket cache configured to store the pre-fetched tickets for subsequent authentication of the selected parties by the login device.


In certain embodiments, the apparatus also includes an authentication module configured to authenticate login credentials against pre-fetched tickets stored in the ticket cache. Login credentials may be received and validated by the authentication module despite unavailability of an authentication service. In certain embodiments, authenticating login credentials against a pre-fetched user service ticket includes generating a key from the login credentials and decrypting a portion of the pre-fetched user service ticket using the generated key. Furthermore, authentication data within the pre-fetched user service ticket may be compared with known data to confirm the validity of the pre-fetched user service ticket. In one embodiment, authenticating a party against a pre-fetched user service ticket may occur by using a pre-fetched user service ticket corresponding to the selected party to construct a Kerberos AP-REQ message structure and invoking a validation function that processes the Kerberos AP-REQ message structure.


In one embodiment, a list of users and/or groups is retrieved from a known source such as a configuration file and user service tickets to communicate with each user and group member are pre-fetched and stored in the ticket cache associated with the login device. The pre-fetched user service tickets may also be refreshed within the ticket cache as need by obtaining new user service tickets from the authentication service. Refreshing the user service tickets may keep the ticket cache better synchronized with changes in user credentials registered with the authentication server. In one embodiment, pre-fetched user service tickets may be refreshed in response to selected events such as expiration of a selected interval, a login request, a change in user credentials, and a reboot cycle.


In another aspect of the present invention, a system to validate login credentials includes an authentication server configured to provide an authentication service, and a login device comprising the ticket pre-fetch module, the authentication module, and the ticket cache previously described. The authentication server may be a domain controller. In one embodiment, the authentication server is a Kerberos key distribution center (KDC) and the pre-fetched user service tickets may be Kerberos service tickets.


The present invention advantageously facilitates disconnected authentication of login credentials without requiring a previous login session. It should be noted that reference throughout this specification to features, advantages, or similar language does not imply that all of the features and advantages that may be realized with the present invention should be or are in any single embodiment of the invention. Rather, language referring to the features and advantages is understood to mean that a specific feature, advantage, or characteristic described in connection with an embodiment is included in at least one embodiment of the present invention. Thus, discussion of the features and advantages, and similar language, throughout this specification may, but do not necessarily, refer to the same embodiment.


Furthermore, the described features, advantages, and characteristics of the invention may be combined in any suitable manner in one or more embodiments. One skilled in the relevant art will recognize that the invention can be practiced without one or more of the specific features or advantages of a particular embodiment. In other instances, additional features and advantages may be recognized in certain embodiments that may not be present in all embodiments of the invention.





BRIEF DESCRIPTION OF THE DRAWINGS

In order that the advantages of the invention will be readily understood, a more particular description of the invention briefly described above will be rendered by reference to specific embodiments that are illustrated in the appended drawings. Understanding that these drawings depict only typical embodiments of the invention and are not therefore to be considered to be limiting of its scope, the invention will be described and explained with additional specificity and detail through the use of the accompanying drawings, in which:



FIG. 1 is a block diagram illustrating a typical prior art authentication system;



FIG. 2 is a block diagram illustrating a typical prior art service ticket;



FIG. 3 is a block diagram illustrating a credential validation system of the present invention;



FIG. 4 is a flow chart diagram illustrating one embodiment of a ticket fetching method of the present invention;



FIG. 5 is a block diagram illustrating a user service ticket of the present invention; and



FIG. 6 is a flow chart diagram illustrating a credential validation method of the present invention.





DETAILED DESCRIPTION OF THE INVENTION

It will be readily understood that the components of the present invention, as generally described and illustrated in the Figures herein, may be arranged and designed in a wide variety of different configurations. Thus, the following more detailed description of the embodiments of the apparatus, method, and system of the present invention, as represented in FIGS. 3 through 6, is not intended to limit the scope of the invention, as claimed, but is merely representative of selected embodiments of the invention.


Many of the functional units described in this specification have been labeled as modules, in order to more particularly emphasize their implementation independence. For example, a module may be implemented as a hardware circuit comprising custom VLSI circuits or gate arrays, off-the-shelf semiconductors such as logic chips, transistors, or other discrete components. A module may also be implemented in programmable hardware devices such as field programmable gate arrays, programmable array logic, programmable logic devices or the like.


Modules may also be implemented in software for execution by various types of processors. An identified module of executable code may, for instance, comprise one or more physical or logical blocks of computer instructions which may, for instance, be organized as an object, procedure, or function. Nevertheless, the executables of an identified module need not be physically located together, but may comprise disparate instructions stored in different locations which, when joined logically together, comprise the module and achieve the stated purpose for the module.


Indeed, a module of executable code could be a single instruction, or many instructions, and may even be distributed over several different code segments, among different programs, and across several memory devices. Similarly, operational data may be identified and illustrated herein within modules, and may be embodied in any suitable form and organized within any suitable type of data structure. The operational data may be collected as a single data set, or may be distributed over different locations including over different storage devices, and may exist, at least partially, merely as electronic signals on a system or network.


In the following description, numerous specific details are provided, such as examples of programming, software modules, user selections, network transactions, database queries, database structures, hardware modules, hardware circuits, hardware chips, etc., to provide a thorough understanding of embodiments of the invention. One skilled in the relevant art will recognize, however, that the invention can be practiced without one or more of the specific details, or with other methods, components, materials, and so forth. In other instances, well-known structures, materials, or operations are not shown or described in detail to avoid obscuring aspects of the invention.


The features, structures, or characteristics of the invention described throughout this specification may be combined in any suitable manner in one or more embodiments. For example, reference throughout this specification to “one embodiment,” “an embodiment,” or similar language means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment of the present invention. Thus, appearances of the phrases “in one embodiment,” “in an embodiment,” or similar language throughout this specification do not necessarily all refer to the same embodiment and the described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments.


The present invention sets forth an apparatus, system and method to validate credentials provided to a login device without requiring immediate connectivity to an authentication server or a previous login on the login device.



FIG. 1 is a block diagram illustrating a typical prior art authentication system 100. As depicted, the authentication system 100 includes a user 105, a client 110, an application server 120, an authentication server 130, and a service provider 140. The authentication system 100 facilitates providing applications and services to the user 105 in a secure manner.


The application server 120 may include a login service 150 with an authentication module 160. In the depicted embodiment, the application server 120 is configured to facilitate authentication of users and group members. In one embodiment, the authentication module 160 is a pluggable authentication module. The authentication module may receive one or more credentials such as a username and password from the user 105 via the client 110. Alternately, the user 105 may be stationed at the application server 120 and directly provide the credentials 112 to the login service 150 and the authentication module 160.


In response to the received credentials 112, the authentication module 160 may provide an authentication request 162 to the authentication server 130. In one embodiment, the authentication server 130 is a Kerberos server that may function as a domain controller such as a Windows™ domain controller. In the depicted embodiment, the authentication server 130 includes an authentication service 170, and a ticket granting service 180.


The authentication service 170 may receive the authentication request 162, for example a Kerberos AS_REQ message, and provide an authentication reply 172 such as a Kerberos AS_REP message. In response, the authentication module 160 may use the authentication reply 172 to determine the authenticity of the user provided credentials 112. In one embodiment, the authentication module 160 derives a key (not shown) from the credentials 112 which is used to decrypt a portion of the AS_REP message. If the decryption is successful, the credentials 112 provided by the user 105 are known to be valid.


In response to successful validation, the application server 120 may generate a service ticket request 164 and receive a ticket reply 182 from the ticket granting service 180 running on the authentication server 130. In certain embodiments, the ticket reply 182 includes a service ticket 192 to be presented to a particular service provider 140. Specifically, the service ticket 192 may enable a user or group member to request services of the service provider 140. In response, to proper presentation of the service ticket 192, the service provider 140 and the application server 120 may securely exchange service data 194.



FIG. 2 is a block diagram illustrating a typical prior art service ticket 200. The prior art service ticket 200 is one example of the service ticket 192 used in the prior art authentication system 100. The service ticket 200 ensures that user indicated by the ‘principal name’ field 220 and the service indicated by the ‘service name’ field 230 are authentic and may safely exchange service data. In the depicted embodiment, the service ticket 200 is a Kerberos service ticket, the ‘principal name’ field 220 references a user name 225 (i.e. “User1” in the depicted example) and the ‘service name’ field 230 references a service provider name 235 (“NetworkService1” in the depicted example).



FIG. 3 is a block diagram illustrating a credential validation system 300 of the present invention. In addition to many of the elements of the prior art authentication system 100, the credential validation system 300 may include a login service 310. The depicted elements or similar elements function cooperatively to enable disconnected authentication of a user 105 without requiring a previous login by the user 105.


The depicted login service 310 includes a ticket pre-fetch module 320, an authentication module 330, a ticket cache 340, and a configuration file 350. Rather than obtaining service tickets for a user to communicate with a service provider as commonly done in the prior art, the ticket pre-fetch module 320 may pre-fetch one or more user service tickets (not shown) for a login device 110 or 120 to communicate with particular users or group members. In one embodiment, the ticket pre-fetch module 320 retrieves a pre-fetch list (not shown) from a known source such as the configuration file 350 and obtains user service tickets for the login device 120 to communicate with the users and group members referenced in the pre-fetch list.


It should be noted that the phrase “user service ticket” as used herein and subsequently shown in FIG. 5, refers to a service ticket for a login device to conduct communication with, or receive services from, a particular user. This contrasts with the prior art practice of obtaining service tickets for a user to communicate with a service provider or server.


The ticket pre-fetch module 320 may store the pre-fetched user service tickets (not shown) within the ticket cache 340. The pre-fetched user service tickets may also be refreshed within the ticket cache as need by obtaining a new user service tickets from the authentication service. In one embodiment, pre-fetched tickets are refreshed in response to selected events such as expiration of a selected interval, a login request, and a reboot cycle.


In response to a login request, the authentication module 330 may access the ticket cache 340 and authenticate a user or group member against a pre-fetched user service ticket—particularly if the authentication server 130 is unavailable or inaccessible. FIGS. 4 thru 6 provide more detailed information regarding pre-fetching user service tickets issued to the login device to communicate with the user and the process of authenticating users against pre-fetched service tickets.



FIG. 4 is a flow chart diagram illustrating one embodiment of a ticket fetching method 400 of the present invention. As depicted, the ticket fetching method 400 include authenticating 410 a login device, retrieving 420 a pre-fetch list or the like, obtaining 430 one or more pre-fetched user service tickets, and storing 440 the pre-fetched user service tickets for subsequent validation of login credentials. The ticket fetching method 400 may be conducted in response to an event such as expiration of polling interval, execution of a reboot cycle, a login request, or similar event.


Authenticating 410 a login device may include sending an authentication request 162 (see FIG. 3) to request authentication of the login device 110 or 120 rather than the user 105. Subsequently, an authentication reply 172 may be used to authenticate the login credentials of the login device 110 or 120. Retrieving 420 a pre-fetch list or the like may include obtaining and/or referencing a list of users or group members for whom user service tickets should be pre-fetched. One of skill in the art will appreciate that the methods depicted herein need not be conducted in the depicted order. For example, retrieving 420 a pre-fetch list may occur previous to authenticating 410 a login device.


Obtaining 430 one or more pre-fetched user service tickets may include sending one or more ticket requests 164 for the login device 110 or 120 to communicate with each user or group member and receiving a ticket reply 182 for each user or group member with a user service ticket encapsulated therein. Storing 440 the pre-fetched user service tickets for subsequent validation login credentials may include storing the pre-fetched user service tickets in the ticket cache 340.



FIG. 5 is a block diagram illustrating a user service ticket 500 of the present invention. Although the user service ticket 500 may be identical in format to the service ticket 200 depicted in FIG. 2, the fields may be used differently to facilitate disconnected authentication. Specifically, the ‘principal name’ field 520 may reference a login device name 525 rather than a user name, and the ‘service name’ field 530 may reference a user or group member name 535 rather than the name of a service provider. For example, the depicted user service ticket 500 enables the login device “MyLoginDevice” to request services of and communicate with the user “User1”. The depicted user service ticket 500 may be pre-fetched before a need for authentication has arisen and stored in the ticket cache 340 to facilitate authentication of the login credentials for “User1”.


Using the user service ticket in the described manner defers the need (for the login service 310 or the like) to know the login credentials of “User1” at the time the user service ticket 500 is issued. However, an encrypted part 510 of the user service ticket 500 may only be decrypted with a key derived from valid login credentials for “User1” thus facilitating authentication of the login credentials (by the login service 310 or the like) at a subsequent time such as in response to a login request.



FIG. 6 is a flow chart diagram illustrating a credential validation method 600 of the present invention. As depicted, the credential validation method 600 includes receiving 610 one or more login credentials, testing 615 if an authentication service is available, authenticating 620 the user if the authentication service is available, or generating 630 a key from the login credentials and decrypting 640 (a portion of) a pre-fetched user service ticket corresponding to the user if the authentication service is unavailable. The depicted method also includes testing 645 if the login credentials were valid and approving 650 or denying 660 the login attempt.


Receiving 610 one or more login credentials may include receiving a username and password from a user attempting to login on a device such as a computer or a mobile device. Testing 615 if an authentication service is available may include attempting to locate a particular authentication server associated with the login device or testing for a timeout condition on an authentication request. In one embodiment, the authentication server is a Kerberos authentication server and a Kerberos ticket granting server such as the server 130 shown in FIG. 1.


Authenticating 620 the user if the authentication service is available may include communicating with the authentication server in a manner previously described in the description of FIG. 1. For example, an authentication request 162 may be sent to the authentication server 130 and a key generated from the user name and password may be used to decrypt a portion of the authentication reply 172 and ascertain if the login credentials are valid.


If the authentication service is unavailable, the depicted method 600 may generate 630 a key from the user's login credentials and decrypt 640 (a portion of) a stored user service ticket using a key generated from the user's login credentials. Furthermore, authentication data within the pre-fetched user service ticket may be compared with known data to confirm the validity of the pre-fetched ticket. Consequently, a user or group member may be authenticated regardless of the immediate availability of an authentication server.


Subsequent to executing steps 620 or 640, the depicted method continues by testing 645 if the login credentials were valid and approving 650 or denying 660 the login attempt. Subsequently, the method ends 670.


The present invention facilitates disconnected authentication of users without requiring a previous login. The present invention may be embodied in other specific forms without departing from its spirit or essential characteristics. The described embodiments are to be considered in all respects only as illustrative and not restrictive. The scope of the invention is, therefore, indicated by the appended claims rather than by the foregoing description. All changes which come within the meaning and range of equivalency of the claims are to be embraced within their scope.

Claims
  • 1. A computerized method that processes login credentials, the method comprising: prior to a request from a user of a login device to authenticate, obtaining, from a Kerberos server, a user service ticket for the login device, wherein the user service ticket identifies the login device as a principal and the user as a service provider, the user service ticket further comprising an encrypted portion with identification information about the user that is used to subsequently authenticate the user;pre-caching the user service ticket in a ticket cache associated with the login device;receiving an authentication request at the login device from the user subsequent to pre-caching the user service ticket, the authentication request comprising one or more login credentials of the user;in response to receiving the authentication request from the user, determining whether the Kerberos server is unavailable; andin response to determining that the Kerberos server is unavailable, authenticating the user based on the user service ticket stored in the ticket cache, said authenticating comprising decrypting the user service ticket and comparing the identification information about the user stored in the user service ticket with the one or more login credentials of the user.
  • 2. The method of claim 1, wherein authenticating the user with the user service ticket comprises using the user service ticket to construct a Kerberos AP-REQ message structure that is immediately validated using a credential generated key for the user.
  • 3. The method of claim 1, wherein the user service ticket stores an identifier of the login device in the encrypted part of a Kerberos service ticket.
  • 4. The method of claim 1, wherein the Kerberos server is a Kerberos key distribution center (KDC).
  • 5. The method of claim 3, wherein the method further comprises authenticating the user via encrypted portion of the KDC.
  • 6. The method of claim 1, wherein the method further comprises refreshing the user service ticket.
  • 7. The method of claim 6, wherein the user service ticket is refreshed in response to an event selected from the group consisting of expiration of a selected interval, a login request, a change in user credentials, and during a reboot cycle.
  • 8. The method of claim 1, wherein the user service ticket comprises an identifier of the login device in a username field and an identifier of the user in a service name field.
  • 9. An apparatus to validate login credentials, the apparatus comprising: a computer processor;a ticket pre-fetch module comprising computer-executable instructions that cause the processor to obtain a user service ticket from a Kerberos server prior to a request from a user of a login device to authenticate, wherein the user service ticket identifies the login device as a principal and the user as a service provider and comprises an encrypted portion with identification information about the user that is used to subsequently authenticate the user;a ticket cache configured to pre-cache the user service ticket for subsequent authentication of the user; andan authentication module comprising computer-executable instructions that cause the processor to: receive an authentication request at the login device for the user subsequent to pre-caching of the user service ticket in the ticket cache, the authentication request comprising one or more login credentials of the user,determine whether the Kerberos server is available, andin response to determining that the Kerberos server is unavailable, authenticate the user with the user service ticket by at least decrypting the user service ticket and comparing the identification information about the user stored in the user service ticket with one or more login credentials of the user.
  • 10. The apparatus of claim 9, wherein the authentication module further causes the processor to generate a key for the user from the one or more login credentials, decrypt a portion of the user service ticket using the key for the user, and validate authentication data associated with the user service ticket.
  • 11. The apparatus of claim 9, wherein the authentication module further causes the processor to use the user service ticket to construct a Kerberos AP-REQ message structure that is validated using a key for the user.
  • 12. The apparatus of claim 9, wherein the ticket pre-fetch module further causes the processor to refresh the user service ticket.
  • 13. The apparatus of claim 12, wherein the ticket pre-fetch module further causes the processor to refresh the user service ticket in response to an event selected from the group consisting of expiration of a selected interval, a change in user credentials, a login request, and a reboot cycle.
  • 14. The apparatus of claim 9, wherein the user service ticket comprises an identifier of the login device in a username field and an identifier of the user in a service name field.
  • 15. A system of validating login credentials comprising: a computer processor;a first set of computer-executable instructions that causes the processor to request a first service ticket for a login device from an authentication server prior to receiving a login request of a user;a second set of computer-executable instructions that causes the processor to receive the first service ticket from the authentication server, wherein the service ticket identifies the login device as a principal and the user as a service provider and the service ticket further comprises an encrypted portion with identification information about the user that is used to subsequently authenticate the user;a third set of computer-executable instructions that causes the processor to pre-cache the first service ticket in a ticket cache;a fourth set of computer-executable instructions that causes the processor to receive a login request with the login device from the user to access a service subsequent to said pre-caching of the first service ticket, the login request from the user comprising a login credential;a fifth set of computer-executable instructions that causes the processor to attempt to obtain a second service ticket from the authentication server in response to receiving the login request from the user; anda sixth set of computer-executable instructions that causes the processor, in response to failing to receive the second service ticket, to authenticate the user by comparing information in the first service ticket stored in the ticket cache with the login credential.
  • 16. The system of claim 15, wherein said attempt to obtain a second service ticket from the authentication server comprises testing for a timeout condition.
  • 17. The system of claim 15, wherein said comparing of the first service ticket and the login credential to authenticate the user is performed in response to a timeout condition being satisfied.
  • 18. The system of claim 15, wherein said requesting the first service ticket comprises authenticating the login device used by the user.
  • 19. The system of claim 15, wherein the first service ticket comprises an identifier of the login device in a username field and an identifier of the user in a service name field.
  • 20. The system of claim 15, wherein said authentication of the user by comparing the first service ticket and the login credential comprises decrypting at least a portion of the first service ticket using a key generated from the login credential.
US Referenced Citations (421)
Number Name Date Kind
4109237 Hill Aug 1978 A
4370707 Phillips et al. Jan 1983 A
4694397 Grant Sep 1987 A
5222018 Sharpe et al. Jun 1993 A
5267865 Lee et al. Dec 1993 A
5302132 Corder Apr 1994 A
5310349 Daniels et al. May 1994 A
5313465 Perlman et al. May 1994 A
5333302 Hensley et al. Jul 1994 A
5339435 Lubkin et al. Aug 1994 A
5367698 Webber et al. Nov 1994 A
5371852 Attanasio et al. Dec 1994 A
5387104 Corder Feb 1995 A
5410703 Nilsson et al. Apr 1995 A
5423032 Byrd et al. Jun 1995 A
5437027 Bannon et al. Jul 1995 A
5437555 Ziv-el Aug 1995 A
5440719 Hanes et al. Aug 1995 A
5441415 Lee et al. Aug 1995 A
5497486 Stolfo et al. Mar 1996 A
5497492 Zbikowski et al. Mar 1996 A
5499379 Tanaka et al. Mar 1996 A
5530829 Beardsley et al. Jun 1996 A
5550968 Miller et al. Aug 1996 A
5550976 Henderson et al. Aug 1996 A
5553291 Tanaka et al. Sep 1996 A
5586304 Stupek, Jr. et al. Dec 1996 A
5590360 Edwards Dec 1996 A
5600833 Senn et al. Feb 1997 A
5608874 Ogawa et al. Mar 1997 A
5608903 Prasad et al. Mar 1997 A
5613090 Willems Mar 1997 A
5623601 Vu Apr 1997 A
5630069 Flores et al. May 1997 A
5630131 Palevich et al. May 1997 A
5659735 Parrish et al. Aug 1997 A
5659736 Hasegawa et al. Aug 1997 A
5666502 Capps et al. Sep 1997 A
5671428 Muranaga et al. Sep 1997 A
5673386 Batra Sep 1997 A
5673387 Chen et al. Sep 1997 A
5675782 Montague et al. Oct 1997 A
5677997 Talatik Oct 1997 A
5680586 Elkins et al. Oct 1997 A
5684950 Dare et al. Nov 1997 A
5692132 Hogan Nov 1997 A
5692902 Aeby Dec 1997 A
5694540 Humelsine et al. Dec 1997 A
5706502 Foley et al. Jan 1998 A
5708812 Van Dyke et al. Jan 1998 A
5708828 Coleman Jan 1998 A
5710884 Dedrick Jan 1998 A
5711671 Geeslin et al. Jan 1998 A
5724521 Dedrick Mar 1998 A
5727145 Nessett et al. Mar 1998 A
5727951 Ho et al. Mar 1998 A
5740427 Stoller et al. Apr 1998 A
5743746 Ho et al. Apr 1998 A
5745113 Jordan et al. Apr 1998 A
5745902 Miller et al. Apr 1998 A
5752042 Cole et al. May 1998 A
5754173 Hiura et al. May 1998 A
5754938 Herz et al. May 1998 A
5758062 Mcmahon et al. May 1998 A
5758074 Marlin et al. May 1998 A
5758344 Prasad et al. May 1998 A
5764897 Khalidi Jun 1998 A
5765140 Knudson et al. Jun 1998 A
5768519 Swift et al. Jun 1998 A
5774551 Wu et al. Jun 1998 A
5778169 Reinhardt Jul 1998 A
5784553 Kolawa et al. Jul 1998 A
5784643 Shields Jul 1998 A
5790801 Funato Aug 1998 A
5796393 Macnaughton et al. Aug 1998 A
5806075 Jain et al. Sep 1998 A
5812669 Jenkins et al. Sep 1998 A
5812865 Theimer et al. Sep 1998 A
5815657 Williams et al. Sep 1998 A
5819265 Ravin et al. Oct 1998 A
5819281 Cummins Oct 1998 A
5819295 Nakagawa et al. Oct 1998 A
5822518 Ooki et al. Oct 1998 A
5835087 Herz et al. Nov 1998 A
5835911 Nakagawa et al. Nov 1998 A
5838918 Prager et al. Nov 1998 A
5844508 Murashita et al. Dec 1998 A
5848396 Gerace Dec 1998 A
5859972 Subramaniam et al. Jan 1999 A
5872928 Lewis et al. Feb 1999 A
5872973 Mitchell et al. Feb 1999 A
5878432 Misheski et al. Mar 1999 A
5889520 Glaser Mar 1999 A
5890161 Helland et al. Mar 1999 A
5890175 Wong et al. Mar 1999 A
5892898 Fujii et al. Apr 1999 A
5893074 Hughes et al. Apr 1999 A
5893076 Hafner et al. Apr 1999 A
5893916 Dooley Apr 1999 A
5930512 Boden et al. Jul 1999 A
5937165 Schwaller et al. Aug 1999 A
5948064 Bertram et al. Sep 1999 A
5949419 Domine et al. Sep 1999 A
5956732 Tsuchida Sep 1999 A
5956736 Hanson et al. Sep 1999 A
5960200 Eager et al. Sep 1999 A
5968176 Nessett et al. Oct 1999 A
5987247 Lau Nov 1999 A
5995114 Wegman et al. Nov 1999 A
6002868 Jenkins et al. Dec 1999 A
6003047 Osmond et al. Dec 1999 A
6014669 Slaughter et al. Jan 2000 A
6014712 Islam et al. Jan 2000 A
6016495 Mckeehan et al. Jan 2000 A
6016501 Martin et al. Jan 2000 A
6021496 Dutcher et al. Feb 2000 A
6029178 Martin et al. Feb 2000 A
6029195 Herz Feb 2000 A
6029247 Ferguson Feb 2000 A
6035323 Narayen et al. Mar 2000 A
6041344 Bodamer et al. Mar 2000 A
6044368 Powers Mar 2000 A
6044465 Dutcher et al. Mar 2000 A
6049822 Mittal Apr 2000 A
6052512 Peterson et al. Apr 2000 A
6055538 Kessenich et al. Apr 2000 A
6058260 Brockel et al. May 2000 A
6058379 Odom et al. May 2000 A
6061643 Walker et al. May 2000 A
6061650 Malkin et al. May 2000 A
6067568 Li et al. May 2000 A
6070184 Blount et al. May 2000 A
6076166 Moshfeghi et al. Jun 2000 A
6079020 Liu Jun 2000 A
6092199 Dutcher et al. Jul 2000 A
6101481 Miller Aug 2000 A
6101503 Cooper et al. Aug 2000 A
6108649 Young et al. Aug 2000 A
6108670 Weida et al. Aug 2000 A
6112228 Earl et al. Aug 2000 A
6112240 Pogue et al. Aug 2000 A
6115040 Bladow et al. Sep 2000 A
6115544 Mueller Sep 2000 A
6134548 Gottsman et al. Oct 2000 A
6137869 Voit et al. Oct 2000 A
6138086 Rose et al. Oct 2000 A
6141006 Knowlton et al. Oct 2000 A
6141010 Hoyle Oct 2000 A
6141647 Meijer et al. Oct 2000 A
6151600 Dedrick Nov 2000 A
6151610 Senn et al. Nov 2000 A
6161176 Hunter et al. Dec 2000 A
6167445 Gai et al. Dec 2000 A
6167564 Fontana et al. Dec 2000 A
6170009 Mandal et al. Jan 2001 B1
6182212 Atkins et al. Jan 2001 B1
6182226 Reid et al. Jan 2001 B1
6185625 Tso et al. Feb 2001 B1
6195794 Buxton Feb 2001 B1
6199068 Carpenter Mar 2001 B1
6199079 Gupta et al. Mar 2001 B1
6202051 Woolston Mar 2001 B1
6205480 Broadhurst et al. Mar 2001 B1
6208345 Sheard et al. Mar 2001 B1
6209000 Klein et al. Mar 2001 B1
6209033 Datta et al. Mar 2001 B1
6222535 Hurd, II Apr 2001 B1
6223221 Kunz Apr 2001 B1
6226649 Bodamer et al. May 2001 B1
6230160 Chan et al. May 2001 B1
6230184 Chan et al. May 2001 B1
6230309 Turner et al. May 2001 B1
6233584 Purcell May 2001 B1
6237114 Wookey et al. May 2001 B1
6246410 Bergeron et al. Jun 2001 B1
6249905 Yoshida et al. Jun 2001 B1
6256637 Venkatesh et al. Jul 2001 B1
6256659 Mclain, Jr. et al. Jul 2001 B1
6256678 Traughber et al. Jul 2001 B1
6260068 Zalewski et al. Jul 2001 B1
6263352 Cohen Jul 2001 B1
6266666 Ireland et al. Jul 2001 B1
6269405 Dutcher et al. Jul 2001 B1
6269406 Dutcher et al. Jul 2001 B1
6272673 Dale et al. Aug 2001 B1
6272678 Imachi et al. Aug 2001 B1
6279030 Britton et al. Aug 2001 B1
6282576 Lane Aug 2001 B1
6282605 Moore Aug 2001 B1
6286028 Cohen et al. Sep 2001 B1
6286104 Buhle et al. Sep 2001 B1
6301601 Helland et al. Oct 2001 B1
6304893 Gish Oct 2001 B1
6308164 Nummelin et al. Oct 2001 B1
6308188 Bernardo et al. Oct 2001 B1
6308273 Goertzel et al. Oct 2001 B1
6313835 Gever et al. Nov 2001 B1
6314434 Shigemi et al. Nov 2001 B1
6327677 Garg et al. Dec 2001 B1
6330566 Durham Dec 2001 B1
6336118 Hammond Jan 2002 B1
6341287 Sziklai et al. Jan 2002 B1
6345239 Bowman-amuah Feb 2002 B1
6349287 Hayashi Feb 2002 B1
6363398 Andersen Mar 2002 B1
6370573 Bowman-Amuah Apr 2002 B1
6370646 Goodman et al. Apr 2002 B1
6381579 Gervais et al. Apr 2002 B1
6389589 Mishra et al. May 2002 B1
6401085 Gershman et al. Jun 2002 B1
6401211 Brezak et al. Jun 2002 B1
6405364 Bowman-amuah Jun 2002 B1
6430556 Goldberg et al. Aug 2002 B1
6438514 Hill et al. Aug 2002 B1
6442620 Thatte et al. Aug 2002 B1
6446096 Holland et al. Sep 2002 B1
6453317 Lacost et al. Sep 2002 B1
6457130 Hitz et al. Sep 2002 B2
6466932 Dennis et al. Oct 2002 B1
6469713 Hetherington et al. Oct 2002 B2
6473794 Guheen et al. Oct 2002 B1
6496847 Bugnion et al. Dec 2002 B1
6567818 Frey et al. May 2003 B1
6587876 Mahon et al. Jul 2003 B1
6615258 Barry et al. Sep 2003 B1
6625622 Henrickson et al. Sep 2003 B1
6658625 Allen Dec 2003 B1
6678714 Olapurath et al. Jan 2004 B1
6715128 Hirashima et al. Mar 2004 B1
6728877 Mackin et al. Apr 2004 B2
6735691 Capps et al. May 2004 B1
6757696 Multer et al. Jun 2004 B2
6760761 Sciacca Jul 2004 B1
6795835 Ricart et al. Sep 2004 B2
6801946 Child et al. Oct 2004 B1
6817017 Goodman Nov 2004 B2
6839766 Parnafes et al. Jan 2005 B1
6880005 Bell et al. Apr 2005 B1
6925477 Champagne et al. Aug 2005 B1
6938158 Azuma Aug 2005 B2
6941465 Palekar et al. Sep 2005 B1
6944183 Iyer et al. Sep 2005 B1
6950818 Dennis et al. Sep 2005 B2
6950935 Allavarpu et al. Sep 2005 B1
6968370 Wu Nov 2005 B2
6973488 Yavatkar et al. Dec 2005 B1
6976090 Ben-Shaul et al. Dec 2005 B2
7028079 Mastrianni et al. Apr 2006 B2
7062781 Shambroom Jun 2006 B2
7080077 Ramamurthy et al. Jul 2006 B2
7089584 Sharma Aug 2006 B1
7100195 Underwood Aug 2006 B1
7117486 Wong et al. Oct 2006 B2
7133984 Dickensheets Nov 2006 B1
7139973 Kirkwood et al. Nov 2006 B1
7143095 Barrett et al. Nov 2006 B2
7162640 Heath et al. Jan 2007 B2
7171458 Brown et al. Jan 2007 B2
7185073 Gai et al. Feb 2007 B1
7209970 Everson et al. Apr 2007 B1
7213266 Maher et al. May 2007 B1
7216181 Jannu et al. May 2007 B1
7231460 Sullivan et al. Jun 2007 B2
7234157 Childs et al. Jun 2007 B2
7243370 Bobde et al. Jul 2007 B2
7284043 Feinleib et al. Oct 2007 B2
7299504 Tiller et al. Nov 2007 B1
7346766 Mackin et al. Mar 2008 B2
7356601 Clymer et al. Apr 2008 B1
7356816 Goodman et al. Apr 2008 B2
7379996 Papatla et al. May 2008 B2
7392390 Newcombe Jun 2008 B2
7418597 Thornton et al. Aug 2008 B2
7421555 Dorey Sep 2008 B2
7426642 Aupperle et al. Sep 2008 B2
7428583 Lortz et al. Sep 2008 B1
7440962 Wong et al. Oct 2008 B1
7444401 Keyghobad et al. Oct 2008 B1
7467141 Steele et al. Dec 2008 B1
7478418 Supramaniam et al. Jan 2009 B2
7483979 Prager Jan 2009 B1
7487535 Isaacson et al. Feb 2009 B1
7519813 Cox et al. Apr 2009 B1
7584502 Alkove et al. Sep 2009 B2
7591005 Moore Sep 2009 B1
7617501 Peterson et al. Nov 2009 B2
7650496 Thornton et al. Jan 2010 B2
7650497 Thornton et al. Jan 2010 B2
7653794 Michael et al. Jan 2010 B2
7661027 Langen et al. Feb 2010 B2
7673323 Moriconi Mar 2010 B1
7690025 Grewal et al. Mar 2010 B2
7765187 Bergant et al. Jul 2010 B2
7805721 Feinleib et al. Sep 2010 B2
7895332 Vanyukhin et al. Feb 2011 B2
7904949 Bowers et al. Mar 2011 B2
7987455 Senner et al. Jul 2011 B1
8024360 Moore Sep 2011 B2
8086710 Vanyukhin et al. Dec 2011 B2
8087075 Peterson et al. Dec 2011 B2
8141138 Bhatia et al. Mar 2012 B2
8245242 Peterson et al. Aug 2012 B2
8346908 Vanyukhin et al. Jan 2013 B1
8429712 Robinson et al. Apr 2013 B2
20010034733 Prompt et al. Oct 2001 A1
20020055949 Shiomi et al. May 2002 A1
20020078005 Shi et al. Jun 2002 A1
20020112178 Scherr Aug 2002 A1
20020129274 Baskey et al. Sep 2002 A1
20020133723 Tait Sep 2002 A1
20020138572 Delany et al. Sep 2002 A1
20020169986 Lortz Nov 2002 A1
20020169988 Vandergeest et al. Nov 2002 A1
20020174366 Peterka et al. Nov 2002 A1
20020178377 Hemsath et al. Nov 2002 A1
20020184536 Flavin Dec 2002 A1
20030009487 Prabakaran et al. Jan 2003 A1
20030018913 Brezak et al. Jan 2003 A1
20030023587 Dennis et al. Jan 2003 A1
20030028611 Kenny et al. Feb 2003 A1
20030033535 Fisher et al. Feb 2003 A1
20030065940 Brezak et al. Apr 2003 A1
20030065942 Lineman et al. Apr 2003 A1
20030110397 Supramaniam et al. Jun 2003 A1
20030115186 Wilkinson et al. Jun 2003 A1
20030115313 Kanada et al. Jun 2003 A1
20030115439 Mahalingam et al. Jun 2003 A1
20030149781 Yared et al. Aug 2003 A1
20030177388 Botz et al. Sep 2003 A1
20030188036 Chen et al. Oct 2003 A1
20030229783 Hardt Dec 2003 A1
20040010519 Sinn et al. Jan 2004 A1
20040059953 Purnell Mar 2004 A1
20040078569 Hotti Apr 2004 A1
20040088543 Garg et al. May 2004 A1
20040098595 Aupperle et al. May 2004 A1
20040098615 Mowers et al. May 2004 A1
20040111515 Manion et al. Jun 2004 A1
20040111643 Farmer Jun 2004 A1
20040117382 Houseknecht et al. Jun 2004 A1
20040123146 Himmel et al. Jun 2004 A1
20040128542 Blakley et al. Jul 2004 A1
20040139050 Barrett et al. Jul 2004 A1
20040139081 Barrett et al. Jul 2004 A1
20040199795 Grewal et al. Oct 2004 A1
20040226027 Winter Nov 2004 A1
20040260565 Zimniewicz et al. Dec 2004 A1
20040260651 Chan et al. Dec 2004 A1
20050010547 Carinci et al. Jan 2005 A1
20050044409 Betz et al. Feb 2005 A1
20050055357 Campbell Mar 2005 A1
20050060397 Barthram et al. Mar 2005 A1
20050086457 Hohman Apr 2005 A1
20050091068 Ramamoorthy et al. Apr 2005 A1
20050091213 Schutz et al. Apr 2005 A1
20050091250 Dunn et al. Apr 2005 A1
20050091284 Weissman et al. Apr 2005 A1
20050091290 Cameron et al. Apr 2005 A1
20050108579 Isaacson et al. May 2005 A1
20050114701 Atkins et al. May 2005 A1
20050125798 Peterson Jun 2005 A1
20050144463 Rossebo et al. Jun 2005 A1
20050193181 Kaneda et al. Sep 2005 A1
20050198303 Knauerhase et al. Sep 2005 A1
20050204143 Ellington Sep 2005 A1
20050223216 Chan et al. Oct 2005 A1
20050246554 Batson Nov 2005 A1
20050267938 Czeczulin Dec 2005 A1
20050268309 Krishnaswamy et al. Dec 2005 A1
20050283443 Hardt Dec 2005 A1
20050283614 Hardt Dec 2005 A1
20060004794 Pizzo et al. Jan 2006 A1
20060005229 Palekar et al. Jan 2006 A1
20060010445 Peterson et al. Jan 2006 A1
20060015353 Reese Jan 2006 A1
20060021017 Hinton et al. Jan 2006 A1
20060026195 Gu et al. Feb 2006 A1
20060034494 Holloran Feb 2006 A1
20060085483 Mooney et al. Apr 2006 A1
20060116949 Wehunt et al. Jun 2006 A1
20060130065 Chin et al. Jun 2006 A1
20060161435 Atef et al. Jul 2006 A1
20060174350 Roever et al. Aug 2006 A1
20060184401 DelGaudio et al. Aug 2006 A1
20060200424 Cameron et al. Sep 2006 A1
20060200504 Lo Sep 2006 A1
20060224611 Dunn et al. Oct 2006 A1
20060248099 Barrett et al. Nov 2006 A1
20060265740 Clark et al. Nov 2006 A1
20060282360 Kahn et al. Dec 2006 A1
20060282461 Marinescu Dec 2006 A1
20060294151 Wong et al. Dec 2006 A1
20070011136 Haskin et al. Jan 2007 A1
20070038596 Pizzo et al. Feb 2007 A1
20070083917 Peterson et al. Apr 2007 A1
20070100980 Kataoka et al. May 2007 A1
20070101415 Masui May 2007 A1
20070143430 Johnson et al. Jun 2007 A1
20070143836 Bowers et al. Jun 2007 A1
20070150448 Patnode Jun 2007 A1
20070156766 Hoang et al. Jul 2007 A1
20070156767 Hoang et al. Jul 2007 A1
20070180448 Low et al. Aug 2007 A1
20070180493 Croft et al. Aug 2007 A1
20070192843 Peterson Aug 2007 A1
20070255814 Green et al. Nov 2007 A1
20070288992 Robinson Dec 2007 A1
20080104220 Vanyukhin May 2008 A1
20080104250 Vanyukhin May 2008 A1
20080133533 Ganugapati et al. Jun 2008 A1
20080162604 Soulet et al. Jul 2008 A1
20080215867 Mackin et al. Sep 2008 A1
20090006537 Palekar et al. Jan 2009 A1
20090216975 Halperin et al. Aug 2009 A1
20100050232 Peterson Feb 2010 A1
20110093570 Mackin et al. Apr 2011 A1
20110282977 Peterson Nov 2011 A1
20110283273 Peterson Nov 2011 A1
20120192256 Peterson et al. Jul 2012 A1
20120215899 Peterson Aug 2012 A1
20120297035 Peterson Nov 2012 A1
Foreign Referenced Citations (3)
Number Date Country
1 932 279 Jun 2008 EP
WO 2006016900 Feb 2006 WO
WO 2007044613 Apr 2007 WO
Non-Patent Literature Citations (180)
Entry
Bellavista, P.; Corradi, A.; Stefanelli, C. A Mobile Agent Infrastructure for Terminal, User, and Resource Mobility. IEEE/IFIP Network Operations and Management Symposium. Pub. Date: 2000. Relevant pp. 877-890. Found on the World Wide Web at: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=830435.
U.S. Appl. No. 12/200,814, filed Aug. 28, 2008, Eyes et al.
“Description of Digital Certificates”, Jan. 23, 2007, http://www.support.microsoft.com/kb/195724.
“Directory Administrator”, http://diradmin.open-it.org/indexlphp, p. 1-3. Dec. 15, 2004.
“Innovation Report—Windows Group Policy Protocols”. Jul. 31, 2006.
“Kerberos Module for Apache”, http://modauthkerb.sourceforge.net/, Feb. 6, 2012.
“LDAP Linux HOWTO”, http://tldp/org/HOWTO/LDAP-HOWTO/, p. 1-2. Mar. 5, 2004.
“Lnux Authentication Against Active Directory”, http://laaad/sourceforge.netlen/home/htm, p. 1-2. Dec. 15, 2004.
“NegotiateAuth”, http://negotiateauth,mozdev.org/ Jul. 8, 2010.
“Optimization Techniques for Trusted Semantic Interoperation”, Final Technical Report, Air Force Research Laboratory. Published May 1998.
“Project: AD4Unix: Summary”, http://sourceforge.netlprojects/adunixl, p. 1-3. Dec. 15, 2004.
“Replacing NIS with Kerberos and LDAP”, http://ofb.netHhess/krbldap/, p. 1-2. Dec. 15, 2004.
“Sadma”, http://sadmas.sourceforge.netlen/indexlhtml. p. 1-2. Dec. 15, 2004.
“Sun Enterprise Authentication Mechanism Data Sheet”, http://wwws.sun.com/jsp—utils/Printpage.jsp?url, pp. 1-4. Dec. 15, 2004.
Vintela Extends the Reach of Microsoft Group Policy to Unix and Linux; Vintela Group Policy (VGP) Provides a Framework for Unix and Linux Policy-Based Management Through the Popular Windows Group Policy System., PR Newswire, Sep. 13, 2004.
Oct. 26, 2011—U.S. Appl. No. 95/001,458—Office Action—Transmittal of Communications to Third Party Requester Inter Partes Reexamination, 52 pages.
Nov. 18, 2011—U.S. Appl. No. 95/001,458—Patent Owner Comments Regarding Oct. 20, 2011 Action Closing Prosecution, 14 pages.
A. Leonard, “Embrace, extend, censor”, Originally published May 11, 2000 on salon.com, http://archive.salon.com/tech/log/2000/05/11/slashdot—censor/.
Accelerated Examination Support Document in newly filed application, Feb. 3, 2012.
Affidavit filed with Amendment and Response to Office Action filed Jan. 14, 2008 in U.S. Appl. No. 10/888,845.
AIX 5L Differences Guide Version 5.2 Edition Published Dec. 24, 2002, Excerpt http://proquest.safaribooksonline.com/073842704 7/ch091ev1sec13.
Akhgar et al., Secure ICT Services for Mobile and Wireless Communications: A Federated Global Identity Management Framework, 2006 IEEE.
Alan H. Harbitter et al., “Performance of Public-Key-Enabled Kerberos Authentication in Large Networks”, Proceedings of the IEEE symposium on Security and Privacy. 2001.
Amendment and Response to Office Action filed on Jan. 14, 2008 with claims as amended in U.S. Appl. No. 10/888,845.
Antti Tikkanen, “Active Directory and nss—idap for Linux: Centralized er Management,” printed from http://www.hut.fi/cc/docskerberos/nss—Idap/htm, pp. 1-11, 2004.
Apurva Kumar, “The OpenLDAP Proxy Cache,” IBM, India Research Lab, at least as early as May 2003.
Buell, D.A. et al., “Identity management”, Internet Computing, IEEEVolume 7, Issue 6, Nov.-Dec. 2003 pp. 26-28.
Centrify Corporation's Answer and Affirmative Defenses, Quest Software, Inc. v. Centrify Corporation and Likewise Software, Inc. Case No. 2:10-CV-00859-TS, United States District Court for the District of Utah, Central Division, Jan. 17, 2011.
Chapter 9 Authentication Protocols, Distributed System & Network Security Lab, Department of Computer Science & Information Engineering, National Chiao Tung University, pp. 21-22. 1991.
Complaint, Quest Software, Inc. v. Centrify Corporation and Likewise Software, Inc., Case No. 2:10-cv-00859-TS, United States District Court for the District of Utah, Central Division, Oct. 21, 2010.
COSuser—Identity management and user provisioning for Unix, Linux and Microsoft Windows® http://www.cosuser.com/ May 24, 2010.
Damiani, E., et al, “Managing multiple and dependable identities” Internet Computing, IEEEVolume 7, Issue 6, Nov.-Dec. 2003 pp. 29-37.
David “Del” Elson, “Active Directory and Linux,” printed from http://www.securityfoc.com/printable/infoc /1563, pp. 1-11, 2002.
David F. Carr, “What's Federated Identity Management?”, eWeek, Nov. 10, 2003, http://www.eweek.com/printarticle/O,1761.a-111811,00.asp.
Declaration of Matthew Peterson in Support of Quest's Opposition to Centrify's Motion to Transfer Venue to the Northern District of California, Quest Software, Inc. v. Centrify Corporation and Likewise Software, Inc., Case No. 2:10-cv-00859-TS, United States District Court for the District of Utah, Central Division, Jan. 17, 2011.
Dennis, Disconnect Login (Was: FC3 Bug Week—Help Wanted) (Sep. 24, 2004). http:/markmail.org/message/cd462ufl2baup3yz.
Description of Digital Certificates, Jan. 23, 2007, available at http://www.support.microsoft.com/kb/195724.
Designing Network Security Published May 7, 1999. Excerpt http://proquest.safaribooksonline.com/1578700434/ch02lev1sec1.
Documentation for Kerberos V5 release krb5-1.3, Copyright 1985-2002, Installation Guide: http://web.mit.edu/Kerberos/krb5-1.6/krb5-1.6/doc/krb5-install.html.
Documentation for Kerberos V5 release krb5-1.3, Copyright 1985-2002, Installation Guide: http://web.mit.edu/Kerberoslkrb5-1.3/krb5-1.3/doc/krb5-install.html—System Administrator's Guide: http://web.mit.edu/Kerberos/krb5-1.3/krb5-1.3/doc/krb5-admin.html—UNIX User's Guide: http://web.mit.edu/Kerberos/krb5-1.3/krb5-1.3/doc/krb5- er.html.
Documentation for Kerberos V5 release krb5-1.3, Copyright 1985-2002, System Administrator's Guide: http://web.mit.edu/Kerberos/krb5-1.6/krb5-1.6/doc/krb5-admin.html.
Documentation for Kerberos V5 release krb5-1.3, Copyright 1985-2002, UNIX User's Guide: http://web.mit.edu/kerberos/www/krb5-1.2/krb5-1.2.6/doc/user-guide.html.
European Office Action, Application No. 05728119.8-1243 dated Apr. 9, 2009.
European Patent Office Communication pursuant to Article 94(3) EPC dated Apr. 9, 2009.
Fabini et al., “IMS in a Bottle: Initial Experiences from an OpenSER-based Prototype Implementation of the 3GPP IP Multimedia Subsystem” Mobile Business, 2006. ICMB '06. International Conference on Publication Date: 2006; On pp. 13-13.
Garman, “Kerberos—The Definitive Guide,” Aug. 2003, O'Reilly & Associates, Inc.
Get to One Options for moving from multiple, Unix identities to a single, AD-based authentication infrastructure with Vintela Authentication Serviceshttp://www.quest.com/Vintela—Authentication—Services/migration—options—VAS.aspx May 24, 2010.
Hank Simon, “SAML:The Secret to Centralized Identity Management”, Dec. 2004, http://intelligententerprise.com/showArticle.jhtml?articlelD=54200324.
Identity Management for UNIX http://technet2.microsoft.com/WindowsServer/en/library/ab66b7d2-9cfb-4d76-b707-30a5e0dd84f31033.mspx?mfr=true Aug. 22, 2005.
Implementing Registry-Based Group Policy for Applications, Microsoft Windows 2000 Server. White Paper. 2000.
International Preliminary Report on Patentability and Written Opinion for International Application No. PCT/US2006/039302, mailed on Apr. 2, 2009, in 7 pages.
International Search Report and Written Opinion from International Patent Appl. No. PCT/US2009/038394, mailed Oct. 6, 2009, in 13 pages.
International Search Report in International Application No. PCT/US2006/039302, mailed on Jul. 3, 2008.
International Search Report PCT/US2005/008342 , mailed on Nov. 9, 2006.
Introduction to Group Policy in Windows Server 2003, Microsoft Corporation, Published Apr. 2003.
J. Barr, “The Gates of Hades: Microsoft attempts to co-opt Kerberos”, Published Apr. 2000 as verified by the Internet Archive, http://web.archive.org/web/20000619011652/http://www.linuxworld.com/linuxworld/lw-2000-04/lw-04-vcontrol—3.html
J. Brezak, “HTTP Authentication: SPNEGO Access Authentication as Implemented in Microsoft Windows 2000,” http://Meta.cesnet.cz/cms/opencms/en/docs/software/devel/draft-brezek-spneg-http-.04.xt, pp. 1-6. 2002.
J. Kohl et al. “RFC 1510: The Kerberos Network Authentication Service (V5)”, Published Sep. 1993, http://ietfreport.isoc.org/rfc/PDF/rfc1510.pdf.
Jan De Clercq, “Win.NET Server Kerberos”, http://www.winnetmag.com/WindowsSecurity/ ArticlesIArticleID/26450/pg/3/3.html. Sep. 17, 2002.
John Brezak, “Interoperability with Microsoft Windows 2000 Active Directory and Kerberos Services,” printed from http://msdn.microsft.com/library/en- /dnactdir/html/kerberossamp.asp.?frame.=true, pp. 1-4, 2000.
Kerberos, PACs, and Microsoft's Dirty Tricks Originally posted to slashdot.org on May 2, 2000, http://slashdot.org/comments.pl?sid=5268&threshold=1&commentsort=O&mode=thread&cid=1096250.
Langella, S. et al., “Dorian: Grid Service Infrastructure for Identity Management and Federation”, Computer-Based Medical Systems, 2006. CBMS 2006. 19th IEEE International Symposium on Jun. 22-23, 2006 pp. 756-761.
Li, M., et al., “Identity management in vertical handovers for UMTS-WLAN networks”, Mobile Business, 2005. ICMB 2005. International Conference on Jul. 11-13, 2005 pp. 479-484.
Likewise Software, Inc.'s Answer, Affirmative Defenses and Counterclaims, Quest Software, Inc. v. Centrify Corporation and Likewise Software, Inc., Case No. 2:10-CV-00859-TS, United States District Court for the District of Utah, Central Division, Jan. 17, 2011.
LinuX® and Windows® Interoperability Guide, Published Dec. 14, 2001, Excerpt http://proquest.safaribooksonline.com/0130324779/ch 18/lev1sec3.
Lowe-Norris, Alistair G., Windows 2000 Active Directory, Chapters 8 and 9, pp. 177-245, Jan. 2000.
Matsunaga et al, “Secure Authentication System for Public WLAN Roaming, Proceedings of the 1st. ACM international workshop on Wireless mobile applications and services on WLAN hotspots, ” San Diego, CA, A, Year of Publication: 2003, p. 113-121.
Matthew Hur, “Session Code: ARC241 architecture & infrastructure”, Microsoft Corporation. Oct. 26, 2003.
MCSE in a Nutshell: The Windows 2000 Exams Published Feb. 2001. Excerpt http://proquest.safaribooksonline.com/0596000308/mcseian-CHP-13-SECT-1.
Memorandum Decision and Order Denying Defendant Centrify Corporation's Motion to Transfer Venue and Motion to Stay Pending Inter Partes Reexamination, Quest Software, Inc. v. Centrify Corporation and Likewise Software, Inc. Case No. 2:10-cv-00859-TS, United States District Court for the District of Utah, Central Division, Mar. 21, 2011.
Memorandum in Support of Centrify's Motion to Stay Pending Inter Partes Reexamination, Quest Software, Inc. v. Centrify Corporation and Likewise Software, Inc.,Case No. 2:10-cv-00859-TS, United States District Court for the District of Utah, Central Division , Jan. 26, 2011.
Microsoft Corp., Implementing Registry-Based Group Policy for Applications, 2000.
Microsoft Corp., Introduction to Group Policy in Windows Server 2003.
Microsoft: CATIA Migration from UNIX to Windows, Overview, Jul. 18, 2003. (3 pages).
Microsoft: CATIA Migration from UNIX to Windows, Overview, Jul. 18, 2003, Microsoft, Chapter 8, Windows-Unix Interoperability and Data Sharing. (21 pages).
Mikkonen, H. et al., “Federated Identity Management for Grids” Networking and Services, 2006. ICNS '06. International conference on Jul. 16-18, 2006 pp. 69-69.
Mont, M.C. et al., “Towards accountable management of identity and privacy: sticky policies and enforceable tracing services”, Database and Expert Systems Applications, 2003. Proceedings. 14th International Workshop on Sep. 1-5, 2003 pp. 377-382.
NCSA Introduction to Kerberos 5, All right reserved Board of Trustees of the University of Illinois Page last updated May 21, 2002 http://www.ncsa.uiuc.edu/UserInfo/Resources/Sofiware/kerberosold/introduction.html.
Neuman et al., “RFC 4120—The Kerberos Network Authentication Service V5,” Network Working Group, Jul. 2005.
Neuman, et al.: “Kerberos: An Authentication Service for Computer Networks”, IEEE Communications Magazine, vol. 32, Issue 9, Pub. Date Sep. 1994, relevant pp. 33-38.
PADL Software Pty Ltd., http://www.padl.com/productsIXAD.html, pp. 1-3. Dec. 15, 2004.
PADL Software Pty Ltd., Pam—ccreds readme, (Apr. 11, 2004) (pan—crreds) http://web.archive.org/web/20040411154827/htt;://www.padl.com/OSS/pam—ccreds.html.
Phiri, J. et al., “Modelling and Information Fusion in Digital Identity Management Systems” Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies, 2006. ICN/ICONS/MCL 2006. International Conference on Apr. 23-29, 2006 pp. 181-181.
Quest Software, Inc.'s Opposition to Motion to Stay, Quest Software, Inc. v. Centrify Corporation and Likewise Software, Inc., Case No. 2:10-cv-00859-TS, United States District Court for the District of Utah, Central Division, Feb. 14, 2011.
Quest Software; “UNIX Identity Migration Wizard User Guide”, 2006.
Quest Vintela Authentication Services Administrator's Guide Version 3.1, Sep. 2006.
Radeke, E., et al. “Framework for object migration in federated database systems”, Cooperation Univ. of Paderborn, Germany, Parallel and Distributed Information Systems, 1994., Proceedings of the Third International Conference on Publication Date: Sep. 28-30, 1994, On pp. 187-194.
Reply Memorandum in Support of Centrify's Motion to Stay Pending Inter Partes Reexamination, Quest Software, Inc. v. Centrify Corporation and Likewise Software, Inc., Case No. 2:10-cv-00859-TS, United States District Court for the District of Utah, Central Division, Mar. 3, 2011.
Request for Withdrawal of the European Application No. 05728119.8 on Feb. 19, 2010.
Response to Communication pursuant to Article 94(3) EOC filed Sep. 9, 2009 in EP 05728119.8.
RFC 4120—“The Kerberos Network Authentication Service V5,” Neuman et al., Network Working Group, Jul. 2005.
Sandrasegaran, Hsang, Identity Management in Vertical Handovers for UMTS-WLAN Networks, 2005 IEEE.
Search Security, “Search Security.com Definitions”, Jun. 4, 2007, http://searchsecurity.techtarget.com/sDefinition/0,,sid14—gci212437,00.html.
Shim, S.S.Y et al., “Federated identity management” Computer; vol. 38, Issue 12, Dec. 2005 pp. 120-122.
Shin, D. et al., “Ensuring information assurance in federated identity management”, Performance, Computing, and Communications, 2004 IEEE International Conference on 2004 pp. 821-826.
Siddiqi, J. et al., “Secure ICT Services for Mobile and Wireless Communications: A Federated Global Identity Management Framework”, Information Technology: New Generations, 2006. ITNG 2006. Third International Conference on Apr. 10-12, 2006 pp. 351-357.
Sixto Ortiz, Jr., “One-Time Password Technology”, vol. 29, Issue 15, Apr. 13, 2007, http://www. processor.com/editorial/article.asp?article=articles%2Fp2915%2F30p15%2F30p15.asp.
Stipulated Judgment and Entry of Permanent Injunction against Likewise Software, Inc., Quest Software, Inc. v. Centrify Corporation and Likewise Software, Inc., Case No.,2:,10-CV-00859-TS, United States District Court for the District of Utah, Central Division , May 23, 2011.
Subject 2.15. What do I need to do to setup cross-realm authentication?, http://www.cmf.nrl.navy.mil/CCS/people/kenh/kerberos-fag. html. Jul. 8, 2010.
Summary of telephonic interview involving co-inventor Matthew Peterson and three others plus the Examine on Nov. 16, 2007 in U.S. Appl. No. 10/888,845.
The SLAPD and SLURPD Administrator's Guide, University of Michigan Release 3.3 Apr. 30, 1996, available at http://www.umich.edu/˜dirsvcs/Idap/doc/guides/slapd/guide.pdf.
Transcript of Jul. 22, 2011 deposition of Michael W. Dennis in Quest Software, Inc. v. Centrify Corporation and Likewise Software, Inc., Case No. 2: 10-CV-00859-TS, United States District Court for the District of Utah, Central Division.
Turbo Fredriksson, “LDAPv3.” printed from http://www.bayour.com/LDAPv3-HOWTO.html, pp. 2-65, 2001.
U.S. Appl. No. 11/311,215, Amendment and Response to Office Action filed Jun. 14, 2010.
U.S. Appl. No. 11/311,215, Claims in “red-line” form as amended by the applicant which with the amendments by the Examiner resulted in the issuance of the Notice of Allowance, Feb. 2, 2011.
U.S. Appl. No. 11/311,215, Claims in “red-line” form as amended by the Examiner resulted in the issuance of the Notice of Allowance, Feb. 2, 2011.
U.S. Appl. No. 95/001,458, Inter Partes Reexamination Office Action, dated Jan. 21, 2011 of co-owned U.S. Patent No. 7,617,501.
U.S. Appl. No. 95/001,458, Inter Partes Reexamination Request of co-owned U.S. Patent No. 7,617,501, Jan. 21, 2011.
Vintela Group Policy Technology Preview, “Extending the Power of Group Policy and Windonws Active Directory to configuration of Unix and Linux users and systems”, Version 0.1, May 2004.
Wedgetail Communications; “Security Assertion Markup Language (SAML)”, 2004.
Weitzner, D.J., “In Search of Manageable Identity Systems”, IEEE Internet Computing, vol. 10, Issue 6, Nov.-Dec. 2006 pp. 84-86.
Windows 2000 Kerberos Authentication White Paper, Microsoft Windows 2000 Server, pp. 1-5 and 41-42. Jul. 12, 2010.
Withers, Integrating Windows 2000 and UNIX Using Kerberos, The Journal for UNIX Systems Administrators, vol. 10, No. 12, Dec. 2001. http://seann.herdejurgen.com/resume/samag.com/html/v10/il2/a5.htm.
Aelita Software Domain Migration Wizard 6.0 User's Guide, Aug. 21, 2003.
U.S. Appl. No. 11/928,887 Petition to Reconsider Denial of Request for Inter Partes Reexamination filed Oct. 2, 2012.
Authentication, from Pieces of the Puzzle, Chapter 2, p. 12. (Exhibit IV to U.S. Appl. No. 95/001,872, Inter Partes Reexamination Renewed Petition (Third Party Requester to Response to Mar. 1, 2012 Office Action), dated Aug. 9, 2012.
Centrify DirectControl Administrator's Guide Version 2.0, Aug. 15, 2005.
Claim Chart, Claim 1 vs. Hemsath et al., Garman and Withers (Exhibit II to U.S. Appl. No. 95/001,872, Inter Partes Reexamination Renewed Petition (Third Party Requester to Response to Mar. 1, 2012 Office Action), dated Aug. 9, 2012.
Declaration of Ethan L. Miller, Ph.D. (Exh. I, to Inter Partes Reexam), dated Aug. 30, 2012.
Declaration of Nicholas Webb, dated Apr. 13, 2012.
IBM SecureWay Policy Director, 1999. (4 pages).
IBM z/OS V1R1.0-V1R12.0 DCE Application Development Reference: dce—ace—is—cient—authorized API call: URL: http://publib.boulder.ibm.com/infocenter/zos/v1r12/topic/com.ibm.zos.r12.euvmd00/euva6a00646.htm, Copyright IBM Corporation 1990,2010, (2 pages).
O'Reily publications “Unix & Internet Security”, Apr. 1996. (3 pages).
Schroeder, SDSC's Installation and Development of Kerberos, San Diego Supercomputer Center, San Diego, CA, Sep. 20, 1995, p. 1-11.
U.S. Appl. No. 11/424,874 mailed Oct. 17, 2012.
U.S. Appl. No. 11/928,887 Decision Denying Petition re Request for Inter Partes Reexamination mailed May 28, 2013.
U.S. Appl. No. 11/928,887 Order Denying Request for Inter Partes Reexamiation mailed May 31, 2012.
U.S. Appl. No. 11/928,887, Amendment and Response to Office Action mailed on Nov. 27, 2009, Response dated Mar. 1, 2010.
U.S. Appl. No. 11/928,887, Inter Partes Reexamination Request dated Apr. 18, 2012.
U.S. Appl. No. 11/928,887, Inter Partes Reexamination Request dated Jul. 17, 2012.
U.S. Appl. No. 11/928,887, Notice of Allowance dated Dec. 13, 2010.
U.S. Appl. No. 11/928,887, Request for Inter Partes Reexamination/Denied, dated Sep. 4, 2012.
U.S. Appl. No. 11/928,887, Response to May 25, 2010 Final Office Action, Response dated Aug. 13, 2010 .
U.S. Appl. No. 12/612,569, Amendment and Response to Office Action Filed Jun. 14, 2012, (Exh. J to Inter Partes).
U.S. Appl. No. 12/612,569, Inter Partes Reexamination Request dated Aug. 31, 2012.
U.S. Appl. No. 12/612,569, Notice of Allowance mailed Jul. 9, 2012.,(Exh. K to Inter Partes).
U.S. Appl. No. 12/612,569, Request for Inter Partes Reexamination/Granded, dated Oct. 11, 2012.
U.S. Appl. No. 13/324,874, Notice of Allowance dated Sep. 6, 2012.
U.S. Appl. No. 95/001,458 Reexamination Action Closing Prosecution dated Oct. 10, 2011.
U.S. Appl. No. 95/001,458, Reexamination Appellant's Brief filed Mar. 15, 2012.
U.S. Appl. No. 95/001,458 Reexamination Examiner's Answer mailed Sep. 25, 2012.
U.S. Appl. No. 95/001,458 Reexamination Noticeof Appeal filed Jan. 16, 2012.
U.S. Appl. No. 95/001,458 Reexamination Notice of Defective Paper in Inter Partes Reexamination mailed Jul. 20, 2011.
U.S. Appl. No. 95/001,458 Reexamination Notice of Hearing mailed May 30, 2013.
U.S. Appl. No. 95/001,458 Reexamination Order dated Nov. 24, 2010 Granting Request for Inter Partes Reexamination.
U.S. Appl. No. 95/001,458 Reexamination Patent Owner Comments filed Nov. 18, 2011.
U.S. Appl. No. 95/001,458 Reexamination Rebuttal Brief filed Oct. 24, 2012.
U.S. Appl. No. 95/001,458 Reexamination Respondent's Brief filed Apr. 12, 2012.
U.S. Appl. No. 95/001,458 Reexamination Response to Office Action filed Mar. 21, 2011.
U.S. Appl. No. 95/001,458 Reexamination Right of Appeal Notice mailed Dec. 16, 2011.
U.S. Appl. No. 95/001,458 Reexamination Shortened Response to Office Action filed Aug. 4, 2011.
U.S. Appl. No. 95/001,458 Reexamination Third Party Requester Comments filed Apr. 15, 2011.
U.S. Appl. No. 95/001,458 Reexamination Third Party Requester Comments filed Aug. 22, 2011.
U.S. Appl. No. 95/001,458 Reexamination Third Party Requester Comments filed Nov. 29, 2011.
U.S. Appl. No. 95/001,458, Inter Partes Reexamination, Request for Oral Hearing, dated Nov. 21, 2012.
U.S. Appl. No. 95/001,872 Reexamination Action Closing Prosecution mailed Jan. 23, 2013.
U.S. Appl. No. 95/001,872 Reexamination Office Action mailed Aug. 6, 2012.
U.S. Appl. No. 95/001,872 Reexamination Office Action mailed Mar. 1, 2012.
U.S. Appl. No. 95/001,872 Reexamination Office Action Response filed Apr. 30, 2012.
U.S. Appl. No. 95/001,872 Reexamination Order Granting Inter Partes Reexamination mailed Mar. 1, 2012.
U.S. Appl. No. 95/001,872 Reexamination Petition Decision mailed Jul. 18, 2012.
U.S. Appl. No. 95/001,872 Reexamination Request for Inter Partes Reexamination filed Jan. 12, 2012.
U.S. Appl. No. 95/001,872 Reexamination Response to Office Action filed Oct. 5, 2012, including Exhibits K, L, L-1, L-2, L-3, and L-4.
U.S. Appl. No. 95/001,872 Reexamination Right of Appeal Notice mailed Apr. 23, 2013.
U.S. Appl. No. 95/001,872, Inter Partes Reexamination , Third Party Requester's Comments on the Patent Owner Response to Aug. 6, 2012 Office Action, dated Nov. 1, 2012.
U.S. Appl. No. 95/001,872, Inter Partes Reexamination Renewed Petition (Third Party Requester to Response to Mar. 1, 2012 Office Action), dated Aug. 9, 2012.
U.S. Appl. No. 95/001,872, Inter Partes Reexamination, Decision Denying Petition (Third Party's Petition filed Aug. 9, 2012), dated Nov. 1, 2012.
U.S. Appl. No. 95/002,115 Reexamination Decision dated Oct. 11, 2012 Granting Request for Inter Partes Reexamination.
U.S. Appl. No. 95/002,115 Reexamination Exhibit T submitted Dec. 10, 2012 with Response to Office Action.
U.S. Appl. No. 95/002,115 Reexamination Exhibits A-K to Request for Inter Partes Reexamination filed Aug. 31, 2012.
U.S. Appl. No. 95/002,115 Reexamination Office Action dated Oct. 11, 2012.
U.S. Appl. No. 95/002,115, Patent Owner's Statement in Inter Partes Reexamination, filed Dec. 10, 2012.
U.S. Appl. No. 95/002,115 Reexamination Action Closing Prosecution dated Feb. 5, 2013.
U.S. Appl. No. 95/002,115 Reexamination Exhibits L-S submitted Dec. 10, 2012 with both Patent Owner's Statement and Response to Office Action.
U.S. Appl. No. 95/002,115, Reexamination Notice of Appeal of Patent Owner, filed May 22, 2013.
U.S. Appl. No. 95/002,115 Reexamination Right of Appeal Notice dated Apr. 23, 2013.
U.S. Appl. No. 95/002,115, Respose to Office Action in Inter Partes Reexamination, filed Dec. 10, 2012.
USPTO Patent Full-Text and Image Database, Search for “ISD/Aug. 22, 1978-> Dec. 19, 2005 and ‘biometric authentication’”, (Exhibit III to U.S. Appl. No. 95/001,872, Inter Partes Reexamination Renewed Petition (Third Party Requester to Response to Mar. 1, 2012 Office Action), dated Aug. 9, 2012.
Ventuneac et al., A policy-based security framework for Web-enabled applications, Proceeding ISICT '03, Proceedings of the 1st International Symposium on Information and Communication Technologies, pp. 487-492.
Jun. 18, 2013 Listing of Related Applications.
Related Publications (1)
Number Date Country
20120192256 A1 Jul 2012 US
Continuations (1)
Number Date Country
Parent 11352693 Feb 2006 US
Child 13333650 US