[미국특허]
Method and system for preventing impersonation of a computer system user
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06F-007/04
G06F-015/16
G06F-017/30
G06F-012/00
G06F-012/14
G06F-013/00
G06F-021/00
H04L-029/06
G11C-007/00
H04N-007/16
출원번호
US-0451847
(2008-06-11)
등록번호
US-8443426
(2013-05-14)
국제출원번호
PCT/SE2008/050704
(2008-06-11)
§371/§102 date
20100405
(20100405)
국제공개번호
WO2008/153496
(2008-12-18)
발명자
/ 주소
Mattsson, Ulf
출원인 / 주소
Protegrity Corporation
대리인 / 주소
Fenwick & West LLP
인용정보
피인용 횟수 :
1인용 특허 :
99
초록▼
A system and method for preventing an administrator impersonating a user from accessing sensitive resources on a target system is provided. The method comprises receiving a first request from a user to change the user's password on a target system to be changed, sending a “change password” request f
A system and method for preventing an administrator impersonating a user from accessing sensitive resources on a target system is provided. The method comprises receiving a first request from a user to change the user's password on a target system to be changed, sending a “change password” request for the user to the target system, storing the user's new password, receiving a second request from the target system on behalf of the user for access to a sensitive resource, wherein the second request contains information about the user's password, and denying the second request if the information about the user's password is not consistent with the user's stored new password.
대표청구항▼
1. A method of changing a user password on a target system, the method comprising: receiving a first request from a user at an access control system to change a user password of the user for a target system to a new password;storing at the access control system the new password;changing, by the acce
1. A method of changing a user password on a target system, the method comprising: receiving a first request from a user at an access control system to change a user password of the user for a target system to a new password;storing at the access control system the new password;changing, by the access control system, the user password on the target system to the new password;receiving, at the access control system, a second request from the target system to grant access to a sensitive resource at the target system to the user, the second request responsive to a prior request received at the target system from the user for access to the sensitive resource, the prior request including an input user password and wherein the second request includes information associated with the input user password;comparing, by the access control system, the information associated with the input user password and the stored new password; andresponsive to a determination by the access control system that the information associated with the input user password is not consistent with the stored new password, denying access to the sensitive resource to the user. 2. The method of claim 1, further comprising: authenticating, by the access control system, the identity of the user prior to changing the user password on the target system. 3. The method of claim 2, wherein authenticating the identity of the user comprises: receiving, from the user at the access control system, a second user password for the access control system; anddetermining whether the user is authorized to change the user password at the target system based on the received second user password. 4. The method of claim 1, wherein the information associated with the input user password comprises the input user password in plain text. 5. The method of claim 1, wherein information associated with the input user password comprises the input user password in encrypted text. 6. The method of claim 1, wherein information associated with the input user password comprises a hash value of the input user password. 7. The method of claim 1, wherein the sensitive resource is encrypted data. 8. The method of claim 1, wherein the target system is a database. 9. The method of claim 1, wherein the target system is a file system. 10. The method of claim 1, wherein the target system is an application. 11. The method of claim 1, wherein the target system is a network. 12. The method of claim 1, wherein the target system is a data at rest system. 13. The method of claim 1, further comprising: responsive to a determination by the access control system that the information associated with the input user password is consistent with the stored new password, granting access to the sensitive resource to the user. 14. The method of claim 13, wherein the sensitive resource at the target system comprises data stored at the target system, and further comprising: encrypting, by the access control system, the data stored at the target system. 15. The method of claim 14, wherein granting access to the sensitive resource comprises transmitting an encryption key to the target system. 16. The method of claim 14, wherein granting access to the sensitive resource comprises decrypting, by the access control system, the encrypted data. 17. A non-transitory computer-readable medium whose contents cause a computer to perform a method of changing a user password on a target system by the steps of: receiving a first request from a user at an access control system to change a user password of the user for a target system to a new password;storing at the access control system the new password;changing, by the access control system, the user password on the target system to the new password;receiving, at the access control system, a second request from the target system to grant access to a sensitive resource at the target system to the user, the second request responsive to a prior request received at the target system from the user for access to the sensitive resource, the prior request including an input user password and wherein the second request includes information associated with the input user password;comparing, by the access control system, the information associated with the input user password and stored new password; andresponsive to a determination by the access control system that the information associated with the input user password is not consistent with the stored new password, denying access to the sensitive resource to the user. 18. A system for changing a user password on a target system, the system comprising: a non-transitory computer-readable storage medium storing executable computer program instructions comprising instructions for: receiving a first request from a user to change a user password of the user on a target system server to a new password;storing the new password;receiving a second request from the target system server to grant access to a sensitive resource at the target system to the user, the second request responsive to a prior request received at the target system from the user for the sensitive resource, the prior request including an input user password and wherein the second request includes information associated with the input user password;comparing the information associated with the input user password and stored new password; andresponsive to a determination that the information associated with the input user password is not consistent with the stored new password, denying access to the sensitive resource to the user; anda processor for executing the computer program instructions.
Arlein, Robert M.; Lieuwen, Daniel Francis; Michael, Gavin C.; Ordille, Joann Janet; Silva, Juliana Freire, Active database trigger processing using a trigger gateway.
Heinrich, David F.; Le, Hung Q.; Rawlins, Paul B.; Stancil, Charles J., Apparatus and method for providing access security to a device coupled upon a two-wire bidirectional bus.
Matyas ; Jr. Stephen M. (Manassas VA) Meyer Carl H. W. (Kingston NY) Brachtl Bruno O. (Boeblingen DEX), Controlled use of cryptographic keys via generating station established control values.
Groeneveld, Bennett J.; Austad, Wayne E.; Walsh, Stuart C.; Herring, Catherine A., Digital data storage systems, computers, and data verification methods.
Abraham Robert L. (Marietta GA) Mitchell Herman (Lithonia GA) Panuganti Badari N. (Mableton GA) Stowers Laura A. (Smyrna GA), Method and apparatus for controlling access to data elements in a data processing system based on status of an industria.
Cooper Thomas Edward ; Philips Hudson Wayne ; Pryor Robert Franklin, Method and apparatus for enabling trial period use of software products: method and apparatus for utilizing an encryptio.
Basani, Vijay R.; Mangiapudi, Krishna; Murach, Lynne M.; Karge, Leroy R.; Revsin, Vitaly S.; Bestavros, Azer; Crovella, Mark E.; LaRosa, Domenic J., Method and apparatus for scalable distribution of information in a distributed network.
Angelo Michael F. ; Miller Craig A., Method and apparatus for secure execution of software prior to a computer system being powered down or entering a low.
Leighton Frank T. (965 Dedham St. Newton Center MA 02159) Micali Silvio (224 Upland Rd. Cambridge MA 02140), Method and system for personal identification using proofs of legitimacy.
Bass Walter E. (Sunnyvale CA) Matyas Stephen M. (Kingston NY) Oseas Jonathan (Hurley NY), Method for establishing user authenication with composite session keys among cryptographically communicating nodes.
Cromer, Daryl Carvis; Freeman, Joseph Wayne; Goodman, Steven Dale; Springfield, Randall Scott; Ward, James Peter, Method of providing enhanced security in a remotely managed computer system.
Morris,Scott; Conner,William, Methods of resetting passwords in network service systems including user redirection and related systems and computer-program products.
Elko David A. (Poughkeepsie NY) Frey Jeffrey A. (Fishkill NY) Mohan Chandrasekaran (San Jose CA) Narang Inderpal S. (Saratoga CA) Nick Jeffrey M. (Fishkill NY) Strickland Jimmy P. (Saratoga CA) Swans, Multiple processor system having software for selecting shared cache entries of an associated castout class for transfer.
Boebert William E. (Minneapolis MN) Hanson Mark H. (Eagan MN) Markham Thomas R. (Anoka MN), Secure computer network using trusted path subsystem which encrypts/decrypts and communicates with user through local wo.
Bulfer Andrew F. (Mountain Lakes NJ) Kaplan Michael M. (Rockport MA) McNair Bruce E. (Holmdel NJ) Wegrzynowicz Carol A. (Holmdel NJ), Secure telecommunications.
Robusto John D. (Herndon VA) Boswell William H. (State College PA) Meckley Mary E. (Las Vegas NV) Niechwiadowicz Deanna R. (State College PA) Watt David J. (Freeport PA) Findley Gorman N. (Boalsburg , System and method for monitoring and controlling one or more computer sites.
Gough,Richard Bruce; Crosby,Charles A.; O'Connell,Ellen R.; Deckard,Jennifer L.; Funk,Steven R., System and method for synchronizing a user password between mainframe and alternative computer operating environments.
McDonnal William D. (Tigard OR) Lohstroh Shawn (Beaverton OR) Grawrock David (Aloha OR), System for automatic decryption of file data on a per-use basis and automatic re-encryption within context of multi-thre.
Yoshimoto Masahiko,JPX, System for controlling the authority of a terminal capable of simultaneously operating a plurality of client softwares which transmit service requests.
Webb ; Jr. Frederick W. (Edina MN) Almendinger Allen D. (Bloomington MN) Bright Kevin L. (Minneapolis MN) Hendren Kenneth J. (Eagan MN) Petersen Donald D. (Long Lake MN) Dandrea Michael B. (Minneapol, Time clock system including scheduling payroll and productivity analysis capability.
Abraham Dennis G. (Concord NC) Aden Steven G. (Charlotte NC) Arnold Todd W. (Charlotte NC) Neckyfarow Steven W. (Charlotte NC) Rohland William S. (Charlotte NC), Transaction system security method and apparatus.
Kajimoto, Kazuo, Video file providing apparatus, video receiving/reproducing apparatus, internet broadcast system, and computer-readable recording medium.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.