WIPO logo
Mobile | Deutsch | Español | Français | 日本語 | 한국어 | Português | Русский | 中文 | العربية |
PATENTSCOPE

Search International and National Patent Collections
World Intellectual Property Organization
Search
 
Browse
 
Translate
 
Options
 
News
 
Login
 
Help
 
Machine translation
1. (WO2000027089) SECURE AUTHENTICATION FOR ACCESS TO BACK-END RESOURCES
Latest bibliographic data on file with the International Bureau   

Pub. No.:    WO/2000/027089    International Application No.:    PCT/US1999/025215
Publication Date: 11.05.2000 International Filing Date: 28.10.1999
Chapter 2 Demand Filed:    23.05.2000    
IPC:
H04L 29/06 (2006.01)
Applicants: LOCKSTAR, INC. [US/US]; 1200 Wall Street West 3rd Floor Lyndhurst, NJ 07071 (US)
Inventors: ORRIN, Steven, M.; (US).
RUSSELL, James, P.; (US).
GOLDBERG, Brian, D.; (US).
OLIK, Zbigniew, T.; (US).
OVITS, Mordechai; (US).
BENENSON, Paul; (US).
MARCELLUS, Daniel, H.; (US)
Agent: MILLER, Joel; 17 Westwood Drive South West Orange, NJ 07052-1822 (US)
Priority Data:
60/106,290 30.10.1998 US
Title (EN) SECURE AUTHENTICATION FOR ACCESS TO BACK-END RESOURCES
(FR) AUTHENTIFICATION PROTEGEE POUR ACCES A DES RESSOURCES SECONDAIRES
Abstract: front page image
(EN)By establishing a secure channel from a client to a back-end resource after the client is authenticated, both security and authentication can be achieved. Before access is permitted, two levels of authentication are provided by first seeking a client-side certificate and then having the client subsequently decrypt an encrypted message. Authorization for access to a back-end resource can be controlled by requiring a transaction-specific authorization device provided to the client in the encrypted message.
(FR)L'établissement d'un canal protégé entre un client et des ressources secondaires après authentification du client permet d'assurer à la fois la sécurité et l'authentification. Avant d'autoriser l'accès, on fournit deux niveaux d'authentification en recherchant d'abord un certificat du côté client puis en donnant au client la possibilité de décrypter un cryptogramme. On peut contrôler l'autorisation d'accès aux ressources secondaires en fournissant au client un dispositif d'autorisation propre aux transactions dans le cryptogramme.
Designated States: AE, AL, AM, AT, AU, AZ, BA, BB, BG, BR, BY, CA, CH, CN, CR, CU, CZ, DE, DK, DM, EE, ES, FI, GB, GD, GE, GH, GM, HR, HU, ID, IL, IN, IS, JP, KE, KG, KP, KR, KZ, LC, LK, LR, LS, LT, LU, LV, MA, MD, MG, MK, MN, MW, MX, NO, NZ, PL, PT, RO, RU, SD, SE, SG, SI, SK, SL, TJ, TM, TR, TT, TZ, UA, UG, UZ, VN, YU, ZA, ZW.
African Regional Intellectual Property Organization (GH, GM, KE, LS, MW, SD, SL, SZ, TZ, UG, ZW)
Eurasian Patent Organization (AM, AZ, BY, KG, KZ, MD, RU, TJ, TM)
European Patent Office (AT, BE, CH, CY, DE, DK, ES, FI, FR, GB, GR, IE, IT, LU, MC, NL, PT, SE)
African Intellectual Property Organization (BF, BJ, CF, CG, CI, CM, GA, GN, GW, ML, MR, NE, SN, TD, TG).
Publication Language: English (EN)
Filing Language: English (EN)