CA2561906A1 - System, method and program for user authentication, and recording medium on which the program is recorded - Google Patents

System, method and program for user authentication, and recording medium on which the program is recorded Download PDF

Info

Publication number
CA2561906A1
CA2561906A1 CA002561906A CA2561906A CA2561906A1 CA 2561906 A1 CA2561906 A1 CA 2561906A1 CA 002561906 A CA002561906 A CA 002561906A CA 2561906 A CA2561906 A CA 2561906A CA 2561906 A1 CA2561906 A1 CA 2561906A1
Authority
CA
Canada
Prior art keywords
authentication
program
server300
com
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CA002561906A
Other languages
French (fr)
Other versions
CA2561906C (en
Inventor
Masahiro Takehi
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
International Business Machines Corp
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of CA2561906A1 publication Critical patent/CA2561906A1/en
Application granted granted Critical
Publication of CA2561906C publication Critical patent/CA2561906C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F15/00Digital computers in general; Data processing equipment in general
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • H04L63/205Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved

Abstract

[PROBLEMS] To realize more convenient user authentication. [MEANS FOR SOLVING
PROBLEMS] There is provided a user authentication system for a computing environment containing a plurality of servers which can be trusted by one another. The system includes: an authentication policy table containing authentication policy of at least one of the servers; means for receiving authentication information from a user; means for specifying at least one of the servers employing an authentication policy matched with the authentication information among the servers by using the authentication policy table; means for transmitting a signal for instructing to perform user authentication by using the authentication information, to an authentication mechanism of the server specified by the means for specifying a server; and means for permitting the user to access the computing environment if the user authentication is successful.

Description

~-~---'~a~al~oy~~oO;i~?.~, ~~~, ~~'~~°r~i~~.~~~~'~b'a~~°r~~.
G~" ~~~ p~"
~~r~~~r [0001] ~~'~1~~'~, ~f'~~~b~~'~, ,~-'-'~'w n~~ %~7b~~~L, ~~p~~~b~~'~, ~~[S'fLc'~~'I~~'~~,'~
~°~~---T~.~~w~y~~~ ~z, .~~---.~=:~~ p~~~--~ ~~T~,, ~~~~~~r~°~~v~,c~
~~ ~~~r [0002] '~~r~, ~~~~~~°~.~--~~~ ~~~~, ~~~~--~W~~fr~~~l~LZ~'~i~~~u~l ~~, ~c~~~~T~,~~~z~ ~~-r~~~ I ~~~~~f ~~~~~~~~~ ~ ~~~~~~
[0003] ~~~'~~'~'~/~.7 ~'~w--~'~~~'~~~'~~~.~T~f'f~'~~~"WS-Security"~a~', ~~---. j-. ~~~>v ~ ~' ,i~~ ~ -~ ;i~---.ice ~ ~ ~---%~ v~--- ~~ ~, -~~~~1~ 1~ w ~---%~ v~---~,'/~~'~'~~'~'~,'/~~,'/tlb'~~'~~~~ct~~'(~~~~p~~Cl)° "WS-Security"
~(~~~'~, "WS-Federation"~L'~~~~ct~'~~'~(~~~~p~~C2)°
[0004] ~~r~~%~T'~~'~, ,~-'-'t~'y'~, ~C~'~',--~y~,~' ~~[S'f~~~~'~~,'~~°~.,--T-f','l_~.~
'~~il~~~~aa~'~'-»~W tl~;i~T,h,~~~LZ.~-'--~-W tI~~TT'~o ~b~, ~f~L~~
'~~.~.~T~f ~ ~'-tl'/~ ~ !'SOAP (Simple Object Access Protocol) ~JW--~i6~~-~~L~~~z, ~_~ ~~~-~w~~~~~~~-~;y'~~soAP~W~-~i~
~~fa'~~o SOAPW '~'-;i~~~faL~'~'~',--~sy~, ~c~SOAP~~'~'-;ib~~,~~~
~~.~.~T-r ~ ~.~---~~~p~L, p~c~~r~L~~~~c~ ,~,.LZ, .~.~---.~=: c'~LZ-~-~---~, ~~~~F~ ~~~o [0005] ~u~~"WS-Security"~~~a~~b'~~ct~'f,, p~L'~~~ct~'f,~~~'~
Jx'~~o.~~, ~~~~~~Ty,~~~--y,v~~~'~~-~a~p~~~o., ~~J~~~, ~~t~~~
~T,b,~a~~Jp'~~~C~~'~'7°TT~'s.,--~/~ ;/~T,b,~a~~'~~~~~'~o [0006] ~~~~p~~Cl:~L[lf~y~~a~, Web Service Security (WS-Security), 200 1~171~ w'-%~L,--;/~,'//~~'~'~,'/ ~ ~,'/tI~TT
~~~~p~~C2:~L[lf~~~~a~, Web Service Federation Language (WS-Fe deration) ~ , 2003 7I~ 8 ~ , ~,'~~~--'~' ;/~'~'>L ~ ~' ;%%7~ ~ -~ ;/~--,'~~ ~
~ ~--L,--;/~,'//-~~t11~171~ w'-%~L,--;/~,'//~~'~'~,'/ y,'/tI~TT
~1~~~~~
~~~aa~~:L~~~'~~~~
[0007] ~~[5~~~~~~~~~°.~.~--T-r~~'~~y~~~~z, ~~~z~-~-~--,~~~ p~~~T.v,~a tllGiJ~l ;/'- (~ tllGiJ~l ;/'-~~, ~k~ ~~ tllG, ~ ~~~ tl~~~'~,~p~ p~~I
~T~,~ ~ n'~a~~LZ~ ~~~~aa~ ~ ~~~~~~~, ~ ~,~ r~~~~ ~ p~r~~~
~LZ.~-~---.~.=~ p~~T7~~, ~~[S~f~~~o.~~~'~~°.~~---T-~'~~'~~~yl~'~~~~~az ~~~~~~o [0008] L~aL~~~a~, ~~[5~~~~'~.~~~'~~°~.,--T-r'~~w~y~ ~ ~~'~.~~C~'~-,--~;~
~~~~a~~~~z~ ~~~aa~z~~o ~c~~~~~~N~~b~~[~f Lz ~~[S~f ~~~~~~~~°~.

L'~L~~~r~, ,~-'--'~''~'~~1~'~~w--~;~~2~'~J~..,--~;~~-~,~c~b~~L'~, ~~'~~~'~
p~%~~~~---c';~ a ~-~~ p~-~~~~~~-~~~c'~~~o ~0009~ ~~~'~~'~~,'~~°~.,--T-f'/'l_"~~'~~'~, ,~-'-'~'~'~, '~',--~yw n~;/7.T,b,~w n~~~~
~;~~-,~,,~a~~~L~~~z, ~ ~~ ~ n~~a~ ~~ p~~~T.v,c~~~ ~z~ p~~~z~ ~~
~~o ~~fs~~~~~~~~~°.~.~---T~.~~'~~y~~~p~~-~-~---"~~~pc~~~~~JLZ, .~.
~~~~~~~~~~~~W~a~~o 0010 ~'~7~~'~~~'~, ~u~G~i~c~~ ~- a'~c~~w nt~;/7.~,b,~ w nt~~l , w ~~~,~'~~c~-~-~--"~a ~'~'~~°.~.~--T-f.~'7~'~~y~;cj-'~-~,~-~--.~='w p~~T7'~~'~~
~ w nt~', w nt~~~~ t' ~~ ~ ~'~.~-,-- w nt~~'fT'~ ~'~ b~'~ir n '~~'~a ~~ ~~'~a '~
~.~~, .~-'--'~~''~ p~~a~'cr~L~~~~~~4~~L'z, .~-'--'~~''~~'i~°~.,--T-f'il'~~~
~0012~ ~~~, ~~~~~~2~~.,ny~~~,~~, ~~~y~~a~~~:~a~~~,~~~c~~-~--"
~1~~~ ni~%~~;W--~~c"~-~L~~w nib%~~;W--y--7>L~/r~~'~~~~1~~"c~L, ,~-'-'~'~Ja~w nt~'~~t'~~~~~~TJ7°~, w nt~%~~;/~--T,--7>L~~L~'~, ~C~'~',--y r~~~~~z.~.~---.~='~ p~~T7'~~'~6~-~~- n'~~~fa~~~~fa'~~~TW°~, .~.~---.~=' p~~a~'cr~L~~~~~~4~~L'z, ~'i~°~.,--T-f'il'~~.~~~7~~~a p~~~~~~

~ools~ ~~y~, ~~~~~~3~~.,ny~~~,~~, ~~~y~~a~~~:~a~~~,~~~c~~-~--~~1~~~ ni~%~~;W--~~c"~-~L~~w nib%~~;W--y--7>L~/r~~'~~~~1~~"c~L, w nI~7°h~J~7,1~,~'~~ ,~-" '~w nI~'~~3t'~~~~~~TJ7°~, w nI~%~~;/'-T'-'7>L~~
~ w nt~', w nt~'~~ t' ~~ ~ ~'~.~-,-- w nt~~'fT'~ ~'~ b~'~ir n '~~'~a ~~ ~~'~a '~
~W 7°~, .~-'--'~~ p~~a~r~L~~~~~~4~~L'z, ~'i~°~.,--T-f'il~~~.~~~J
~~~ap~~~~,~~Tm°~, ~~~~°.~~---~c'~T7~~-~~°~~v~,~a~~~~,~o 0014 ~~, ~~~1~~~4~~,n~L'z, ~~~L~~7°~~~~,t~,~a~L~~~'i~°~.,--~~w4 ~l~ o~' ~
~~~'~~W tl~~a~~G~~~~o ~'~~~~~'~~~~~Oy~Oyi~.u ~0016~ L~~, ~~~1~~~'~~~~~~~~~3F~~,n~"~C~~b~~~L~'zp~~~b~p5~,~1~'~~0 ~~
~~~~a~0~'~~~, ~~~I'~.,n~u~l~1 =a-b~I~~~L'z ~~~~~'z~'~~~~, ~~~~~3FI~,n~~#''zp5~~l~~~'zL~~~~
'f~c~~~~ a ~~.-~-~~z~a~~l~~~fi~;~.~6~:~..'~~~~f~~~~~~ ~~~6~~~ ~ ~~,~~~ ~o ~~~, ~~~:~,n~p~~~~~~~~ ~LZnL~~c~~~nL~~~~~-LZ~~~o ~0017~ L~~~~~~:~.,nz~~, ~y~~~~~~~~~T.v,y~~~~zp~~~~~~a, ~~z ~~~~~l~~~aa~~'~~, ~~~1~~~~~~°.~.~---~z~~~~~~~~°~~'~.v,~LZ~~z~
~o L~~~a~'z, ~~~1~~'~, »,--~'%~.~~L'z~~3F~~,n, 17I~%~.~~L'z~~
~Fi'~,n~~'~~'~17I~%~.'~~~w--~'%_'~~~~A~~~r,~'~~~Fi'~,n~~~~~~a'~~~o 7°~
~~7.~y'~, »,_...~.-T,f~tl, CD-ROM, "a~~~~~~~'~
~~~ a ~.~~°~~---~~~~#~~~y~a~z~~o looo~~, ~W~~-~2ooz~~'y~~~~~~~-~~~I~loo~~~~c~~-~-~;
300-1~300-N (L~~, :~~~b"i,,L'~'~w--~s300~:~:'~'~) ~~, Iv'~L '~o [0019] 'l-7~'~,'~I~100~'~, a ~fl~~,'~W--~JI~b~~~~~'~~'~~~o ~~~'~, ~
'7~--~7200~~'~, ~~~'~>L'~J7°''~~b'~~ISP(Internet Service Provie r, "~~~~"~)~ f L'~TT'~~~L'o ~'~~, t17~'~,'~I~100~a~ISP~~~'~~~~'~>L
'~J7°b'r~~~~ct~'I~~~~'~~'~~'~~, ~(~~~~'~, ~~, LAN (Local Area Netw ork) , WAN (Wide Area Network) , ADSL (Asymmetric Digital Subscri ber Line) , CATV (Cable Television) ~~L '~'~;~, H~6'~~TT~'~~~~ 'o [0020] ~J1~'7~--'l-200~'~,'l-7~'~,'~1~100, '~'~--~s300~'~'~ ~~fp~~'~~~, ~~f~~
~LZ~~~~-~W6~~~~~~~~~~az~~o ~~~~-~Wz~~~W~~-X200 ~'~ a ~f~ ~~, TCP/IP(Transmission Control Protocol/Internet Proto col)~~~''~;/~T,b,~~~~'~~o %'7W'7,--11200'~~'~~~~'-~s>L'~1~L~~~'~~'~
y-- fJ>L'~~' L~'~~cc'~~~IP'~~' L7.b~~~'~~~~b~ ~'(p'~~;/7.T,b,~Ja~~~c'~~~

[0021] 't~''--~s300~'~,'l- 7~'~,'~I~loo~a~~~~b~,;,,L'~'~',--~y~~'~'~~~,'~~°.~.,--~~~'~~~o ~~p~~~c~~'~, '~',--~s300-1300-N~'~, a ~fl~~/s.7 .-t~-,--~y~
~f7~~~LZ, ~~~~~I~loo~aa~~~~-~W~~b~~LZ, ~~'b~ ~LZi=~ .
'~w--~~~~~'~'~'~o ~~~b'~'~, '~w--»300-1300-N~'~, ~U~~~"WS-Federa tion"~b~ri.~~'~, ~L'b~'fa~~'f~:~a~~~'f,~'~ ~~[S~f ~~~'f,~'~~,'/~°.~.~---T-f.~~T~
~~looo~~:~~~o [0022] "~~2~'~, ~~~~~'~,nb~~6~~'~''--~s300~~~7 t~l'l- ",~~'~~~o "~~2~~~7 W 'l- "~C~ b~~'~~-~.~-~. ~'~, 'f~~~'~~ "~C~ 11 b~~~J~L~~~w--~'%_'~~~~'~~~,'i~°
[0023] -~-,--~s300~'~, ~'far~~'fi~1p~310, .~-,--.~.=w p~~~p~320, '~7°~~T~--;~~,'~~TTp~
330~~, ~!'o ~'~a r~~ i p~310~'~, %'~J~''7,--'>200~a~~~~~'~''T ,--~~, ~-'-'~'w n~

~~pf~320~~'~~'~'~7°~~T~--;~~,'~~TTpf~330~~'~~o ~'fa~~ i pf~310~'~, ,~.
'-'~'w n~~~p~320~~'~~'~'~7°~~T~--;~~,'~~TTp~330~a~~~~~'~''T,--~~, %'~J~''7 ~0024~ ~-'-'~'w n~~~p~320~'~, ~'~ar~~ i p~310~ ~L'~~6~~'~'l-7~'~,'~~'100~,~.,_...
~=~~~~~~~c~,~,,LZ~ p~~~~T7~o ~~~c~~~, ~~~~~~~~, ~~-~~~~1 oo~~=~'~~~-~='y~~~~z~~~~,, ~W~~-~2ooy~~~~~,~-~-~;3ooy~
~'fact~'f,~'~HTTP(HyperText Transfer Protocol)~~7~~~~L'~~~ct~'f,~~a , ~ '. I~c~~~~L~o .~-'-'~'w ni~~~n~320~'~, w pt~ ~~pfS321, w ni~~~~3t' ~p[~322, LDAP'~7~'~'~I~323, ~ p~%~~;w--W--7>L324, ~(~J~IDW--7>L
325~~'~~ p~y~LDAP326~~,~0 ~0025~ w n~~~~~p~321~'~,'l-7~'~,'~~'100.~-,--'~.'~a~~'~'l_'.~-~7.~~~~~FfL,'~
tl'~7y~~~ aL ~.~-'- ' w n1~'~~~~"~~~c~~~~~rm a~ ~'~, ,~- w n1~
TT'~~o ~~~, w n~~~~~p~321~'~, w n~%~~;W--y--7>L324~~"~,'.L'~, ~~~~~~,~~~~~°~.~-T-r~~W~loooy~ a ~~,~~~~-~-~;~~ p~~~T~,~
L'z.~-,--'~.'~ p~~~TT'~'~o ~0026~ ~ ~ p~~~ b~~'~, w n~~~~~ p~321 ~'~, '~'l- '~7.~~~~'~a L~'~'l- 7~'~,'~~' 100~.~-~i~~~-~~~~-~~~I~looy~~~a~~~~~~~~o ~~~, ~ p~~~~~p~321 W w nt~~~~3t'~fJ~%=7 '.w--;/'~~L'~ '.~-'--'~.'~a nt~~~~3t'~~W
w ni~%~ ~ ;W--y--7 >L324~'~~ L'~, ~ new ni~'~~ t' ~Ja, ~~~'~~c'~~~~~,'~~°~.,--T
b~~L ~'y w nt~~~~ t' ~~ ~ ~'~.~-,-- w nt~ n '~~'~a ~~ ~~'~a '~~0~~~'~~o ~0027~ ~~y~, w p~~~~~p1~321~'~, w p~~~~~a~~'~w p~%~~;~~--y';~a'~~~~~~W
c'~~'l~~'~~~a b~, ~n~w n~'~~t'~, LDAP'l-7~'~,'~~'323~ ~L'~~~L~'~w n~'~~t' LDAP326b'~f~lc'~~'l~~'~w n~'~~t'~~~ a ~'~'~TT'~w n~~~'~'~o c'~~b', w ni~~~~~p~321~'~, ,~-'-'~'w ni~~Ja~rfJL~'~~~a b~,'l_7~'~,'~~'100b~ ~~~'~~c'~

[0028] w n~'~~t' ~ ~p~322~'~, ~~[S~(~c'~~'l~~'~~,'~~°.~.~--T-f'~'l-~~~~1000b'~6~~w n~
~~W~loooy~a~~,~~-~-~;~~ p~~~T~,~~ p~%~~~~-~~ p~%~~~~-T~-7>L324~~~, ~~ff~~'~~,~~~~~TT'~~~~~'~~o ~~'~, w p~'~~
~pf~322~'~, LDAP'l-7~'~,'~I~323~ ~L'~, '~''--~~-~a~~~~~~~ p~~~~~~ p~~~~
LDAP~~'~'~~~~~'~~o ~~b~, w p~'~~~ ~pf~322~'~, ~ff~-'-'~'~
,~-'-'i~'ID~~'~~I~rb~, Ip7~~w nt~%~~;/~--~~~'~~'~~'~'~--~yw nt~;/7~~
b,b~~J~~.~-,--'~.'ID~a~b~~~.~.cc'~~'l~'~L~~~a~'~~a~~~~~~L, Ip7~~.~-'-'t~'ID~a~c c'~~'l~'~L ~~~' ~~~~c'~~'l~~'~~~ a b~, ~ n~~-'-'~'ID~'~~~~IDT~--7 >L325 b~~~.~-c'j-'~
[0029] LDAP'~7~'~'~I~323~'~, ~ p~y~LDAP326~~~,'~~~--7s.~--~~~~'~'~o ~~p~~~b~~'~, LDAP'l-7~'~,'~1~323~'~, '~',--~s300~7°t~~l-"~,b,~~~~,--~,'~1~~
'~'~o LDAP'l-7~'~,'~~'323~'~,'~~~'~~~~, w n~'~~t' ~ ~p~322~a~~~~~'~w n~'~~
t'~w n~'~~t'LDAP326~~~.~-c'j-'7-~~~~a'~~, ~~'~, w n~~~~~p~321''~~~~
~b~,;,,LZw p~'~~LDAP326b~~~~'~L~~w p~'~~~~X~"'~~~~a'~~~o [0030] w n~%~~;W--y--7>L324~'~, ~~[S~(~c'~~'l~~'~~,'~~°~.,--T-f'/'l_"~~1000b~~,~~'l~
~~''~'"~Ww tii~;/7vT,h~~ tii~~~;/'-~'~c,','~--~T"7>L'~~~o [0031] "~~9~'~, ~~'~1~~~~i'~,nb~~6~~w n~%~~;W--y--7>L324~~'~~~~~L~'~ "~C~'~
~~o w p~%~~;w--y--7>L324b~~'~, ~~[S'f~~~~'~~,'~~°~.,--T-f','l_"~~1000b~
uRL~fiv~»a, ~ p~%~~~~-~~~ ~~~c~~~.z~~~.z~~~o CI96~~~J~~~
ni~%~~;W--y--7>L324'~~'~, ~~~'ub~w ni~%~~;W--~a~c"~-~c'~~, ~~~'ub~~~~y ~w nt~%~~;/~--~~~'~~'~''-~y~l'L7.~a~c,~,ct~-~,'~L~~o [0032] ~'~~, w n~%~~;W--W--7>L324b'~'~, ~~[S~(~c'~~'l~~'~~,'~~°~.~--T-f'~'l-~~~~1000b' WO 2005/101220 $ PCT/JP2005/002143 ~a~~~LL ~o L~aaL, ~~~'~~~'~ b~., ~~3FI~,n~.~-~-.'~~ p~~'~, ~ p~%~:~ ~,-.T
~,~ac~~~~z.~.~--..~=:~ p~~a~r~L~~~~c~,~,.LZ ~~rs~~~~,~~~~~°.~.~--.T~.~~w L0033~ c'~~b', ~~'~1~~~~i'~,nb'~6~~w n~%~~;W-.W-.7>L324'~~'~, Ip7~~w n~
,~-'-'~'w nt~~~~~TT'~~Ja~~'~7°7~~'~T~f~Ja'~''-W'~l'L7.~~~ ~'(~6~'~~
~~~0 7°~~~~T-f~'f~~'~, ~~T,t~, ~ ~~~a-~~.~.~>L'zJ~j7~L'z~~L~L, p~~~T~,b~~~~o.z~~~.~-~--..~.=~~,~~lil.~.~~~~p~l~~~~~~, ~~'~b~~:~
L'z~~L ~o L0034~ ~~ ~'~~~~Jb~~'~, ~~'~~~~~i'~,nb~~6~~w n~%~~;W-.y-.7>L324b~~'~, ,~-'-.
'~'ID~a ~'~>L7~~J~3~C~+~C~3~C~J ~a'~~s~r]~-.~' ~a f'~>L7~~J~4~C~J
w pt~%J'~;/~--~~~'~'~3~~'~w--~s('~~L~~'~"server300-l.com", "
server300-2.com", "server300-3.com") ~a~ct~'f,'~L ~~o ~~'~, .~-'-'~'ID~a ~~>L
7 y'~Wa~C~J ~Ja~»~r]~-.~ ~a ~,(~ ~ J ~w ni~%~~ ;/~-.~~~'~~2~~'~'~-.~~
'~~ L~~'~"server300-4.com", "server300-5.com") ~~,.~-cct~'f,'~L ~~o L0035~ c'~~b', w n~%~~;W-.W-.7>L324b'~'~, ~~~~~Cw n~J~a''~~~~~Cw n~~~s~'j-'~''T~-.~
~'~'~~ ~a ~100bytesJ ~~ nt~%~~ ;/,-.~~~'~~2~~'~''-~s ('~~ L~~.~»
server300-6.com", "server300-7.com") ~~'~ ~ j ~~Cw pt~J ~J''~j ~~Cw nt~~»~'~'~
''T'-~~'~'~~~a~200bytesJ~~ nt~%~~;/,-.~~~'~~1~~'~''-~s('~~L~~.~»
server300-8.com") ~~,.~-cct~'l,'~L ~~o L0036] 'f~~~IDW--7>L325~'~, ~~I~'f~~~'l,~'~~,'~~°~.,--T~,',~~~~1000b~~,~~'1,~~--~-,-.~yw nt~;/7.T,b,~~~~'~Ip7~~.~-'-'~'ID~~~1~.~-,-.'f~..'~;'(~~L'~L~~~~r~~~
6' , ~n~.~-,-.'~.'IDS'f~~~ID~L'~~'~'~T~-.7>L'~~~o [0037] "~~10~'~, ~~~1~~~3F~'~,nb~~6~~'f~~~IDW-.7>L325~~'f~~~~L~'~"~t~'~~
~o 'f~~~IDW-.7>L325b~~'~, ~~I~'f~~~~'~~,'~~°~.,-.T-f','l_"~~1000b~~,~~
7>L325'z~'~, ~~~'~Jb~'~',--~s~~v7.~a~c~~, ~~~'~Jb'~~~'~J~'~',--~s~w pt~;/~T,b,~~(~~~ID~a~~~'~L ~~o [0038] '~7°~~T,--;~~,'~~TTp~330~'~, w n~c'~~'l~~'~.~-,--'~.'~'~.',--~'~~~~~~'~~~'~~
y', ~~-~~~l~loo~~~/~~~~~ ~~~~~~~,~~~~~°~.,--T~.~~y~loooy'a ~~~y'~~, ~~°~~~--~,~~~T7p~s33oy'~~z~T7~~,~~~°~~~--~,~~~~°~~'~
3F~'~,nb'~L ~'~~'~, '~7°~~T~--;~~,'~A(331) , '~7°~~T~--;~~,'~B
(332) , '~7°~~T~--;~
~,'~C (333) ~~'~'~7°~~T~--;~~,'~D (334) ~4~'~7°~~T~--;~~,'~~~TT'~~~
~~az~~~~ c'~~,z~ ~~o [0039] "~t~3~'~, C~'~''--~s~~~~,(a~~'f~.~~'~~~J~~~~'-~~L~'~7t~,--~'-~'-~
'~~~o ~~~3F~'~,nb'~L~'~~'~, ~C~'~',--~s300-1300-N~a~L~b''fa~~
'(~.~~'~~~~a, ~'~, '~',--~s300-lea, "~t~3b~a~'cL~'~~J~I~~~'-b'fi~~'~~~' 'fa~~'f~.~~~~'~L~~~L~-~-,--~s300-2300-N~~~fa~~'f~.~~'~~o y', '~.',--~s300-2~a, Ip7b'"~~4b'a~'cL~~~J1~~~'-b'f~~'~, ~~~~fa~~'f~.~
~~~'~L ~~~L ~-~-,--~s300-3300-N~~~f a~~'f~.~~'~~o ~~~'~',--~s 300-(N-1) ~'~~i~'~'~~'~, ~C~'~w--»300-1300-N~~L ~~~(p~~J
[0040] L~~b', '~''--»300-lea'~w--»300-2300-N~~~~~'~~(p~~J~;~~'~'~~~r~', a ~~~~~L'z, "~c~3b'~'~~J1~~~'-~p~~~b'p5~,~1~'~~0 ~~J16', '~',--~s300-1~'~, ~ C,~~ p~%~~;y--~w n~%~~;W--y--7>L324~~~~~'c'~'~(53010)0 ~b', a ~'fI
~PKI (Pubulic Key Infrastracture) f'-J- ~b'~~'~ ~~-pt~~J~ ~ ~~X'''~'~~~
'~, '~.w--»300-1~'~',--»300-2~~~~~~fa~~'f~;~~'~'~(S4020)0 [0041] fib', '~'~--»300-1~'~, S3020b'~L~'~'(p~~J~;~~L~'~~~~~~'~'~--»'~~
300-2b~tw--~>Ly~~~'~~'~',--~s300-2~ ~ ~~~'~~~L~'~~ p~%~~;w--~a~
W L~'~7°t~7~~>L.T,--7>Ly~'~'l-~~~'~~~'~, '~',--~s300-2~~ p~%~~;w--~
7~~'~~o ~L'~, 7~~L~'~'~',--~s300-2~~ p~%~~;w--~w p~%~~;w--y--7>L3 24b~~L~'~~'~(S3030), ~ c,~~ p~%~~;w--~~~~~'~',--»300-2~~ p~:~
w--~;Ip7~~,~'~~a~"f~~'~~(53040)0 't~',--~s300-1~'~',--~s300-2~~ p~
;~~ ~~--~; n~z~~~ '~"~m~~,~~~~ a ~~, ~a~~~:~~~~~LZ~ '~~~ '~-~--~a~~~~~a~ ~~a~' ~~W~~~~~ y~NO~~~n~a~s3o9o~~~0 [0042] S3040b'~L''~~-~--~s300-1~W--»300-2~~ p~:~~;w--~alp7~~"~~~~~~' bra ~'~, YES~~~p~a~S3050~~~, '~w--»300-1~'~w--»300-2~~ pt~~~~
LDAP326b'Ip7~~.~-~--'~=ID~aI~-~'~'~~'~'~~'~p~l~~~o S3050b'~L''~~---»300-1~W--»300-2~~ p~~~~LDAP325b'Ip7~~.~-~--'~=ID~aI~-~L~'~
~ '~"~J~~~o.~~~~~~~, ~a~~~:~~~~~LZ~ '~~~ '-~-~---,s~;~~'~~~aa~ ~~aa~
~y~~~~~ y~NO~~~n~a~s3o9o~~~0 [0043] S3050b'~L''~~-~--~s300-1~W--»300-2~~ p~~~~LDAPb'Ip7~~.~-~--'~'ID~aI~-~'~~~"~~~~~~'~~~a ~'~, YES~~~h~a~~TJ7°3060~~~, "~~6b~
W~~~'~~o ~~~~I'~,n'~~y '-~\300-1 ''."~\30 0-2~~~b~, "ABC001"~L '~.~-,--'~.'ID~a~~~'~L '~'~~L'~, ;~~T,b, ~ ~~
y'~n~~-'-'~'ID~Jalp7~~.~-'-'iJ~'~a'(~~'~~~~~Ja~'~~Jab~~L''~w ~'~'~'L'~L'~
o ~'~~, 'f~!I~ID~w ~~1 b~~'~, ;/7.T,b, ~ ~~b~w ~~,'~1~~~ ~'~'~~'~~ b' '~.',--»~,, .~-,--.~.:ID~~~ ~~~6~'~~~ ('~w--»300-1~.~-,--.~.=ID"ABC001"
b'X~'~'~~~ ~L'~"Tanaka Taro", '~w--»300-2~.~-~--'~'ID"ABC001"b' X~'~'~~~ ~L'~"Hirota Keisuke") ~a~c~ct~'f,~o [0044] ~b~, S3070b~~~, ;~~T.h, ~ ~~~a, 'f~~y~.ID~ ~~b~~~~~'l,~'~.~-,--.~:I
D~a, '~''--~s300-1~'~',--~s300-2'~~~'~~.~-'--'~.'~;~~L'~L'~~"~~'~f~tL~'~~~a IDW--7>L325b~~~~~o ~~'f~,'fa~~'f~.~~~'~~L'~L'~~L''~',--~s~;~
~'~~~a~'~~a~"~~~'~~~'~~ b~NO~~~h~a~S3090~~~'0 [0045] S3070b~~L ''~, ;~~T.h ~ ~~~a, 'f~~~LID~ ~~b~~~~~'l,~'~.~-,--.~:ID~a, -~-,--»300-1~'~''--~s300-2'~Ip7~~.~-'-'t~'~a~~L'~L'~~"~~'~f~tL~'~~~a, .~-~~~a~ ~~a~' ~~W~~~~~ y~NO~~~n~a~s3o9o~~~0 [0046] S3090'~~'~, '~'~--~s300-l~a~~'~~fa~~'f,~'.~~L'~L'~'~L''~'~--~s~y~~a~~
~a~a,~f~~~~~o S3090'~~~'~'fa~~'f~.~~L'~L'~~L''~',--~s~,~~~"~~~~~
~'~~~r~, a ~'~, 7t~~--y~S3030~F:~, ~~'~'fa~~'f~.~~L'~L'~'~L''~'~--~s~S3030 ~S3080~~TJ7°~~TT'~~~~'~'~''-»300-1~'~, '~'~'~~~(th~'~w--»300-2300-N~'fp~~'(~.~~'~'~~~~~'~~o S3090'~~~'~'fa~~'f,~.~~L'~L' [0047] ~a~~'~, '~''--»300-lea, ~(the'~w--»300-2300-N~~fp~~~,~~'~'~
~b~~L''~p5$~l~L~'~o Ip7~~~~300-2300-Nb~~L''~~~TT'~~~~'~, 't~' --» 300-1 ~ 300-N~ ~~~'~~L 'b~'f a ~~'f~.~~L~'~ ~~[S'f ~~~~'~~,'~~°~.,--T
~,'/~~~~1000~a~i~c'~~'l~~o [0048] "~~4~'~, ~ff~-'-'~'w n~'~~t'~'~'"~'~~~J'~~7~'-~~L~'~7t~,--~'-~'-~'~~~o L~~b', ~b'~C~'~'~--~s300-1300-N'~~L'b'~fa~~'f,~.~a~~~'l,~'~ ~~[S
'f~~~~'~~,'~~°~.,--T-f','l_"~~1000b~~~Jp'~~'~',--~s300-1~~ p~;~~T,b,b~~
~''z, ~fr~-'--'~='~ pt~r~~~'~'~fii~~'~~~, "~LI4~~,~L'zp~~~Hb~pS~,~l~'~'~o ~~
~, '~~'~',--~s300-2~300-N~~ n~;~7.T,b,b~~L''~~lT~-'-'~'w n~'~~t'~
~'~~~~,~Ip7~~~z~~~~~z~~~~b~~~ ~ ~~,~~~'o [0049] ~'~, ~-'-'~'~'~~'~~'l-7~'~,'~~'100~a~~ffw n~'~~t'~~~~'~~6~~~54010)0 ~'~~, S4010'~~'~, '~w--»300-1~'~, '~w--»300-1~ ~ ~~~a'~~~L~'~w n~%~~
/'-~u~G~7~L~~7°h7~~>L~T,--7>L~'(~~L'~, ~ffw nt~'~~t'~Ja~ C,~~ nt~%~~
'-b~~aL'~L'~~a~'~~a~p~~TT~'~L'~o ~b~, ~ ~,~~ p~'~~LDAP326 6~, t17~'~,'~~'100~a~~~~~'~w nt~'~~t'b~~~~'1~~~-'-'~'ID~Ip7~~.~-'-'~'ID~aI~-~'~~~a~'~~a~"~~~'~~~54020)o S4020'~Ip7~~.~-'-'t~'ID~aI~-~'~~~"~~~~
~,~~~~a ~~, n~~~-~-~;~,~ p~~~T~,z~~n~~~.~-~=ID~a~~~~-~~~~~
p~~~~~~ '~z, ~~1~~ p~'~~~~-~-~=~aa~~~~~~c~~~~~ 6~YES~~~n~aa~s4o 10~F:~, ~lx~ff~-'-'~'w n~'~~t'~~~~'~~6~~o S4020'~Ip7~~.~-'-'~'ID~aI~-~L~'~L '~"~~~~~~'~~~ a ~'~, NO~~~h~a~S4030~~~'0 [0050] S4030'~~'~, '~'~--»300-1~'~, ~ ~,~"~'~~~b'u~'~c'~~'l~'~L'~w n~%~~;W--T
-~-,--~s~~'~~~~~~ n~'~~t'LDAP326b~~1T~-'-'~'w n~'~~t'b~~,~~'1~~.~-,_...
'~'ID~Ip7~~.~-'-'t~'ID~aI~-~'~~~a~'~~a~"~~~'~~ X54040) o [0051] S4040b'~L''~, S4030'~~~~c'~~'l,~'~'~'~--»~'~'~~~~~w p~'~~t'LDAP32 6b~~J~~.~-,--'~.'ID~aI~-~L~'~L'~"~~~~~~'~~~a ~'~, ~b~S4030'~~~~~~~'~3 NO~~~p~a~S4080~~~0 [0052] S4040b'~L''~, S4030'~~~~c'~~'l,~'~'~'~--»~'~'~~~~~w p~'~~t'LDAP32 6b~~J~~.~-,--'~.'ID~aI~-~'~~~"~~~~~~'~~~a ~'~, YES~~~h~a~S4050~~
"~~6b~~'~'~~~~ID~w ~~~, w nt~'~~t'~~L~'~~L'~L'~~-'-'~'~Ja 'z~b~L~~~'z, ~~'z~'~p~~~b~~'~p5~~l~L~~L'o [0053] ~b', S4060b'~~, w n~'~~t'~~L~'~~'~'~~-'--'~'~a, '(~~~ID~ ~~6' ~c~ct~'I~~'~.~-,--'~'ID~ ~ n'~a'~~L'~L '~~~'~~'~~'~L '~"~~f'~~TL~'~~r a , ,~-'--'~'~'~
~'~~~b"i,,L'~7w--~'~S4070b'~~, ~p~.~-~--'~'ID~'~, 'f~~S~IDT~--7>L325b'~
c'~~'l~~o ~C~'f~, '~b'S4030'~~~~c'~~'l~~'~300-l~lp7~~w n~%~~;W--~~~'~
[0054] ~'~~, S4060b~~L''~, w n~'~~t'~~L~'~~'~~~-'--'~.'~;,'~~~~ID~ ~~6' ~c~ct~'I~~'~.~-,--'~'ID~ ~ n'~a'~~L'~L '~~~'~~~~"~~f'~~TL~'~~r a , ,~-'--'~'~'~'f~J
~~~~y"~,,LZ, ~y's4o3oz~~~~~,~~3oo-l~n~~~ p~%~~~~-~~~~~
~-~-~;~a~~~~~a~ ~~a~' ~~W~~~~~ y~yES~~~n~a~s4o8o~~~0 [0055] S4080'~y'~, S4030'~~~~c~~'l,~'~'~'~--»300-l~lp7~~w pl~:~~;W--~~~'~' ~'~.',--~s~,~~'~~'~L~~~a~a,~f~~~~~o S4080'~~~'~I7~~w p~%~~;w--~
W--»~S4040~S4070~~TJ7°~~TT'~~~~'~, '~''-»300-ly'~, :~~~~'~'~~
~'f~~~IDT~--7>Ly~~'~~o S4080'~~~'~Ip7~~w p~%~~;w--~~~'~~'~' --~s~,~'~L ~~~L ~~"~~~~~~'~~~ a y'~, NO~~~h~a~S4090~~~, '~',--~s30 0-ly'~, ~ff~-'-'~'w n~'~~t'~~ C,~~ n~'~~t'I-DAP326y~~~~~'c'~'~o [0056] "~~5y'~, ~~'~1~~~~i'~,ny~~6~~.~-'--'~~.'w n~~~~'l~~~L~'~7t~,--~'-~'-~'~~
~~1000y~ ~, ~~~~C~'~''--~s~~.~'~~~'~',--~s300-1 y~~L'~'~'l- ~~~
~o ~'~~, ~~'~',--~s300-2300-N~~ p~;~~T,b,y~~L~'~.~-,--'~.'w p~~TT'~
~l~l~l a~n~~~~~~~~G~~~~~y~~~ ~ ~~,~~~1 ~o [0057] -t~-,--y300-l y'~, .~-,--'~.'~,~'~'l_ '~~~~~~6~~ (55010) o ~L'~, '~'l-'~~~
~y~~~.~~T-r ~ ~.~---~~~a ~ ~~,~~a~ ~~a~p~~~-~~~y~~~z~ p~~~~~~
~~~'L~'~.~-,--'~.'~;~w n~'~~~~"~~~L~'~'~',--~s300-ly'~, ,~-'-'~'~'~~'~~'l-y'«y~~,»~%~~~~~L, -~>v~-~ p~~~-1~ ~~RL~~~~ a y~, ~~y~s5o4o~~
~o ~~~, .~-~---.~=~a "~L~7y~~~J~'~~~ p~~~---~'~~R~~y~y~~~~»~%~.~'~~~L, ''-m'~' w ni~~,--~ ~a~RL~~~~ a y'~, ~~y'~S5030~7~~, w ni~%~~;W--T--7>L~
~ ~ ~f'y W (1~~~ W (1~~~~~~~~o ~ ~7 W (llGyd.v G
P1-' /1'W y ~'.. y d. ti7G ~~ ~ ~~~ ~1 ~ o [0058] ~y~, ~-~-~;3oo-lye, CIBy~~~-~>v~-~ p~~~-fiz~~~~~,~~ p~~~~~~-~~.~.~--.~='~~~-~~~I~y~~~a~~(s5o4o)0 ~ p~~~~~~--~~~~~-~~.~-~--.~=' y'~, w n~'~~t'~~fJ'~~(55050)0'l-7~'~,'~~'y'~, ~fJc'~~'l~~'~w n~'~~t'~'~',--~s3 00-1'~~~I~ ~~o [0059] ~~p~~~y'y'~, .~-,-.'~.'ID~~~L'~.~-,-.'~.'w p~~TT'~~~a y'~, .~- , >
--~=:y~ u8 y~.~~-w n~~~~t'~fJ~~l~~~TTy~y-.%y-.~~'~~'~~~~'~.~-,-.'p.'ID~~fJ'~~o ,~.
-..~=ID~~~~-~==y~.~-~-..~=~ p~~T7~~~a y~, .~-~-..~=y.~, ~~T7~«,~~L~~~,»
~~-=W%~W~~~-=W'~~o ~~~, ~s~~~-~~~~L'~~-'-~W ti~~~T~~l~l~l a y~, .~~-..~=:y.~, u8y'~~~--~ p~u~~~~T7y~~~-.%~~-.~~~~~~--~~~z»~~~-.
~~~~-~o ~;~~~-.~ ~~~~-~==y~.~~-..~='~ p~~T7~~~ a y~, .~~-..~='y~, ~~T7 ~~~~~L~~'~\»~~=J~~J~~~'~=J~~~o ~~J~~W t1y Pq~~W tll~~~'~'T~~~' :~,-.~L~~ ('~'~'~~'~, ~'~'~'~'T,-.~) ~'~~L'~.~-,-.'~'w p~~TT'~~r a y'~, .~-,-.'~' y~, u8y'~~-~ p~u~~~~T7~«,~~L~~~,"~~-=m~m~~~-=m~-~=
~~~~--~~~»my'~~~~~, ~~~~ pay'~-LZy~-~-~~y'r~~a~z~~~~--~~~~
> ~T7~o »~~~-.~ ~~~~-~y~.~-~-.. j.=~ p,~~T7~~~ a y~, .~.~-.. j.=y.~, ~~T7~«,f~
[0060] ~~y'~S5050y'~~, '~',-.»300-ly'~, ~ ~,~~ p~%~~;w-.y-.7>L~~,~L, .~-a L~~w ni~~~~3't~7t~~n w ni~%~~;/'-~~~ ~1L~~~'~',-.~\~~j' L~~~Xf~'~~(55060)o'f~~~y'~, '~',-.~s300-l~a"~t~9~w p~%~~;w-.y-.7>L~
'~~L, w n~'~~t'y~,~-,-.'~.'ID~a«XYZ001", Ayr],-.~~;yYZ"~a~~~'1~~~~
a y'~, .~-,-.'~.'ID~a ~'~>L7~~J~3~C~+C~3~C~J ~a~~s~r],-.~ ~; f'~>L7~.~
J~'4~C~J ~w n~%~~;W-.y'~ ~ '~~~'~, '~',-.~s300-ly'~, 3~~'~l' L7~'~
server300-l.com", "server300-2.com", "server300-3.com"~~ (~'~'~o [0061] ~y', '~',-.y300-1y'~, .~-,-.'~.'~,~~w n~'~~t'y'~,~~'1~~.~-'-.'~.'ID~a'~~~~IDT
-.7 >Ly~~~~'~L \~~a~'~~'~, 55060'~~ f~~~~'~'~1~ I~~~~'~''~',-.~sy'~cJ-L'~~p~ a '~'~TT'~~~'~"~J~'~~ (55070) o w p~'~~y' ~, ~~~.~-'-.'~.'ID~a'f~~~ID
T,-.7>Ly~~~~'~L\~~"~J~~~~'~~~a y'~, YES~~~I7~a~S5080~~~'f~~
~~~~aTT~~'l~~o '~~~~IDT~-.7 >Ly~~c'~~'l~'~L \~.~-,-..~.:IDy'~, L ''~'~'l,~w n1~
~~T.v,y~~~ \z.~-~-.. j.=~ p~'~--.~~~a,~"~J~~1'~~~~~az~~~~ '~z, ~~JS~~~z y'~, '~.',-.y300-ly'~, .~-,-.'~.'~t17~'~,'~I~y'~~~.~-,-..~=~IDy'~~(~~~ID'~'~'~'~, -~
>L~-w nt~W-.~ ~'~~'~'~~~y'~'~~~~'Ivo '~~- ,~, w nt~y~'~.~-,-.'~~.'w nt~~TT~'~~~' ~L 'o J ~L ''~W'W-.,%~i~L, ~~~~~'~~o [0062] S5070y~~L''~, ~-'-'~'~a~~~ p~'~~y~~,~~~~-'-.'~.'ID~aL''~'~'l,~a~-~-,-.
~y'f~~~IDT~-.7 >Ly~~~~~'~~'~L '~"~~~~~~'~~~ a y'~, NO~~~h~a~S50 90~~~o S5090'~y'~, '~w--»300-ly'~, S5060y~~L''~~~~L~'~'~1~L~~~
L'z, ~ p~%~: ~ ~,-.~ a ~C'~ ,-.~\ y'~ p~'~~ ~~~f a L, ~ p~'~~ ~x~f a L
L'~.~-'- W p~~TT'~o ~~~y'. ~, '-~\300-ly'~, L''~' ~'I,~'~''-~y~,~.,-.'~'w nl~~TT'~~Ja~, w n1~%~~;/~-.T'-7>L~~7°7~~'~T~~
'f~y~'(,~~'~fi~~'~'~o 'f~J~y'~, '~',-.~s300-lea "~t~9~~ p~%~~;w-.y-.7>L~~~
L, S5070y~~L''~'~'~--~s300-1~a3~~'~~L~"server300-l.com", "
server300-2.com", "server300-3.com"~~ (~L~'~~~r~', a y'~, 7°7~~'~T~f~'~~~'~~
~L'"server300-l.com"~~ pt~;/~T.h,~a.~-~--'t~'w pt~~~~Jly'u~~~~~~~'~~o [0063] ~~y'~S5100~~~, ~-'-'~'w n~~a~rfJL~'~~"~~~c'~~'l~~'~~~ a y'~, ,~-'-'~'w n~~
TT~~''~''-'»y~, P'T'T ~T~T~'~~'t~~X f~L (S5110) , ~ (~L~~~~'T ~T~T~
'~~~~~LZ, ~vT~~fi>v,~~~~W~--~1~~L, ~-~~y~~~a~~ (s512 0) o ~'~~, tlL~,'/;/-fi>L,~~ZJ'tlJ~'-~'~~~~~ZJ',~-'-'t~',~~i~'fa y'~, ,~-'-.'~.'w ni~~TT~~~'~',-.~y~,~.,-.'~'w ni~~Ja~r~JL~~~~ ~~~'-[I~~~~~~'~',-.y300-l~JaTT
~'z~~L'o ~cL'z, .~-'-.'~y'~~~faL~~II~T'ice-fi>L,~~ZTIW-.~~~L'z, ~[s~~~~,~~~~~°~.~--~-r~~W~loooy~~~~~~~~~~~ap~~~~,, ~ p~~~
y~~~~~o [0064] ~'~~, ~~~1~~~3FI'~.,n'~y'~, ,~- y~ ~~~'~~,'~~°.~.,-.T-f~'l_~~~.,~~
~~~~~p~~~-~~~~y~, ~vT~~fi>v~~~~m~--.~~~~-~~.,ny~~~zp~
~l~~L~~o L/JaL, tlL~,'~;/-fi>L,~~~tIJW-.~'~~~L'~URL~.,'~w-..-T,f,',~~, y~y~ ~ ~~z~~o [0065] S5100'~.~-,-.'~.'w p~~a'~~CL~'~~"~~~c~~'l~~'~~~ a y'~, S5060'~~~~c~~'l,~'~.~-,-.'~.' ~~ p~'~~y~~ p~%~~~~-.~;;~~~~-~-~-."~;~z~'~~a~~~a~a,<<W~~,~(s 6130)o S5130y~~L''~, ~~'~S5060'~~~~c'~~'l,~'~.~-~--'~'~w p~'~~t'y'w n~%~~
'(t_,h~~'~L~~'~J~',-.~sy'~-L'~S5090L~I~~~~~TT'~~~'~, ~'~.~-,-.'~.'w n~~
~~~~~~'~~o ~U~~~'~',-.~s300-lea "~t~9~~ p~%~~;w-.y-.7>L~~~L, S5 070y~~L~'~'~w--~s300-1~a3~~'~~L~"server300-l.com", "server300-2.com ~y server300-l.com ~
" "server300-3.com"~~ (~L~'~~~r~', a y'~, '" " w nt~;/~T.h,y ~~~ p~y~~~CL~~~z, ~~-~;3oo-lye, ~°~~~~T-r~~~~a~y~,~~,»
server300-2.com"~~ pt~;/~T.h,~a.~-~--'t~'w pt~~~~Jly'u~~, ~~'1,~~~CL~'~~~r~', a y'~, "server300-3.com"~~ pt~;/~T.h,~a.~-~--'t~'w pt~~u~~~~~~~'~~o [0066] S5130'~~~~c'~~'l~~'~.~-,-.'f~..'~w n~'~~t' y~w n~%~~;W-.y'~ ~ '~~'~',-.~s~,~
z~ ~~~~ ~, ~~--~~~~~~--~z~-~-~--." y'~~,z~ p~~a~~cL~~~~ ~~m~~,~~~~ a y~, 7t~,-.y'~S5140~~~, w p~~~C~L'~.~-,-.'~.'y'~ ~~[S'f~~~~'~~,'~~°~.,-.T-f','l_"~
~1000'~~'~'~~~~p~~~~~'~il ~~~~~'W w p~
[0067] "~~lly'~, ~~~1~~~~3F:'~.,ny~~L~'~~~~~,~'~',--~;300~~~'~~~'~~y' ~~~~~(CPU) 1~~~,'~~~~4~~,1v'~L~~o CPU1~~~,'~~~~4y'~, ~s~2~
I L'~, ~~~Ja~'~~~~L'~~»,-.~''T-f~'l_~~13~~~'~L~~o ~~'~, 7I~~
;~7>L~~~~~~20, M0~~28, CR-ROM~~26, 29~'~~~~,b,~--~s7>L~
~w-.,iCa~~T-~~~~~~~~~S~pfSa~'~~~T.v,) ~a~~ ~~~7L~~7>LT-~
~'~ ~ ~,'~I~t~~--719, IDE~,'~I~t~~--725, SCSI~,'~I~t~~--727~'~~ ~ I L'~»~2~
~~'~L ~~o [0068] 7L~;~7>L~~~~~~20, M0~~28, CR-ROM~~26, 29~'~~ ~~,b,~--~s 7>L~~L~--;%y~y'~, ~~'f,~~'f,7L~;/7>L~~~~, MO, CD-ROM~'~~~a~' '~~~a7~~~, ~~7L~;~7>L~~~'~''~~'~»'-j: ''T-f~'~~~13, ROMl4y~y'~, ~-.,w'.~-r~~v ~~T~,~f~LZCPUy~~n ~~-~, ~~~~~~~~~~~
~~~y~~~z~~~°.~~--.~~~°~~v~,y~~T7~~,~0 ~~~°.~~--.~~~°~~v~,y~r~
L, ~~~~Cy~n'pilL'z~C~#~~f~y~a~'~~~~~'z~~o [0069] 't~',-.~s300y'~, ~~y~, ,~.,-.-~='.~,',y-.7s.~~.~,,-.~'%='~~L'~, '~%~''~~~%~
[0070] ~~°,--~23~~, ~',--''T-f~'~~,'i~t~,--~21b'~~'~D/A'~~'',(''T;i~>L/'~'~'~
'l_"'~~''J) ~~~'~ ~ j 'fa~~'~,'~7°22~ I L'~~6~~X~, ~ ~ ~L'~"fJ'~~o ~~'~, ~' ~~~c'LZ~~~o [0071] L~~~p~,~~y'~~, ~~~~~~~~:~,ny'~c~-~~-~-~;300~~, ~-~~w~-~,, ~
~'~~~6~'~ ~'~~'~L ~o [0072] ~~b', ~~'~p5$~l~L~'~~w--~~-/_'~~~'~'~, ~L~;~7>L~~~~~~20, MO
~~28, CR-ROM~~26, 29~'~~~~,b,~--~s7>L~~L~--;i, ~s7L>L:~~--~16, ~t~,--721, '~,'~7°22, -~~'l- t~7~J-'~24~'~~ ~'~~'~~'~~, ~~~1~~~~3F~'~,n~'~~
[0073] ~~'~~~~b''~~c~~'l~~'~',--~s300~~-~w--~rs-/='~~~.~-~.~, ~C~-~;~
,~ z~~o [0074] -t~-,--~s300~'~, ~'~Iw--T-f','l-~~~;~~T,b,~L'~, -~~'l-~171~w--%~L,--;~~,'~
TJ1~ ~a~'~'~~MacOS, ~~L ~~'~Linux~'~~ ~GUI'~>L~-~/~,'/~ ~/~~~-~J-~~--1~'~~~~~~~'~~~~~a'~~~o [0075] '~''--y300~~, ~'~I~,--T-f'~'l_'v;i~T,b,~L'~, ~,'iW--'~-';i~'~'>L~~~;i~~~-~
;W--,'/~ ~ ~,--%~L,--;~~,'~~a~'G~'~~PC-DOS, -~~'l- t~171~ w--%~L,--;~~,'~~a '~'~~MS-DOSS'~~~~-fi7'~~w--~~~~~~~~'~~~~~'~~~o ~~b' '~.',--y300~~, ~,'iW--'~-';i~'~'>L~~~;i~~~'~;w--,'~~ ~~,--%~L,--;i~,'i~a~'G~
'~'~OS/Open, Wind River Systems, Inc. ~Vx Works~'~~ ~~'~>L~~,b, OS, Java (R) OS~'~~ ~%'7W'7,--tl ~ ~,'~~°~.,--~ b'~A~i~~~'~L,--T,f',tl'~ ~ ;/~
Ty,~~~'~~~~~'z~~o [0076] J-~~~a~, '~',--~;300~'~, ~~~~~-~I~,--~-f','l_"~;~~T,b~~y~l~~~~~,~~~
'~ ~'~~'~L ~~~~~~'~~~~~a'~~~o '~',--~s300-1300-N~'~~~~~~~'~~~' [0077] J-~y ~~~3FI'~,nb~~ d'~, ,~- yy ~~~'~~,'~~°.~.,--T-f~'l_~~~10 ~' '~~..''-'>\~w til~;~~T.h~w til~~~~3~X~ ~L~~11 ~-- ~W ~~~, ~ ~~ ~ 7J~~a ~p~p~;~~T.~~u..~Jjl ~~~ p~~~~~~1 ~~~a~W ..,~ ~ ~~ .~' p ni~~~~~~~~~Ja~~~~~~~o [0078] ~~W ~~~~FI~,"'~'~W- ' ~~ ~~-w nt~~~~t'b'7t~a w nt~%~~;/~--~~
'~~-.''-'~\~a ni~;~7.T.h,yu..,~JjI~Z~~,~-" p-~?tli~~T7'~~y 1~77~~~~'~ a p1G ~ o [0079] L~~, ~~~~ c~~~~~, ~~[s~~~~~~~~~°.~.~--T~.~~'~~y~~~ ~z, ~~~~1~W
0080 J- y ~~~1~~~~3FI'~,n~~~~'~p5$~l~L~'~~y ~~~1~~~~7~,~~'~~a~
~~F:~.,ny~a~~~,C~y~~~f~~~~~,~~~~o ~a~~~~~F:~.,ny~, h~~~~~~~~
~~c~~~p~~~~~a~~~z~~~~~a~~c~~~~~az~~o '~~z, ~~~~~~~~
v [0081] [ "~~1]~~'~~~~~~i'~,n~ ~~[S~(~c'~~'l~~'~~~/~°~.'-T~f'/tl'~~~100~;/7.T.1~, ~~~~~J~~L~~,~ az~~o ~2~~~~~~~~I~n~~ ~ ~ "~\3~~~,~G7 ~1~~~~~o a3~~~~1~~~3FI~,nb~ 6 ~'y--~\~~~~~fa~~~.~~.'~~l~~w--~~L
a4~~~~1~~~3FI~,nb~ 6 ~ ~- '~~ p~~~~~~~l~~w--~~L~~
~a5~~~~1~~~3FI~,nb~ 6 ~.~-,--'~~ p~~~Jl~~w--~~L~~7~,--~-y--~'~
~~o ~a7~~~~1~~~3FI~,nb~ 6~~~ p~~,--~~R~~~~~~--~~~L~~a'z ~o a8~~~~1~~~3FI~,nb~ 6 ~~ p~~~~7~~~~~~~~--~~~L~~a'z ~ "~L~9~~~'~1~~~~i'~,nb~~6~~w n~%~~;W--y--7>L324~~'~~~~~L~'~,~ "~L~
C "~~10~~~~1~~~3F~'~,nb~~6~~'f~~~IDW--7>L325~~'f~~~~L~'~,~ "~~'~~
~o _~~~~~~J~~L~~az~~o

Claims

CA2561906A 2004-03-30 2005-02-14 System, method and program for user authentication, and recording medium on which the program is recorded Expired - Fee Related CA2561906C (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
JP2004-099243 2004-03-30
JP2004099243 2004-03-30
PCT/JP2005/002143 WO2005101220A1 (en) 2004-03-30 2005-02-14 User authentication system, method, program, and recording medium containing the program

Publications (2)

Publication Number Publication Date
CA2561906A1 true CA2561906A1 (en) 2005-10-27
CA2561906C CA2561906C (en) 2014-03-25

Family

ID=35150179

Family Applications (1)

Application Number Title Priority Date Filing Date
CA2561906A Expired - Fee Related CA2561906C (en) 2004-03-30 2005-02-14 System, method and program for user authentication, and recording medium on which the program is recorded

Country Status (8)

Country Link
US (5) US7712129B2 (en)
EP (1) EP1732008A4 (en)
JP (1) JP4750020B2 (en)
KR (1) KR100968179B1 (en)
CN (1) CN1965304B (en)
CA (1) CA2561906C (en)
TW (1) TWI350095B (en)
WO (1) WO2005101220A1 (en)

Families Citing this family (40)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8468126B2 (en) 2005-08-01 2013-06-18 Seven Networks, Inc. Publishing data in an information community
US7917468B2 (en) * 2005-08-01 2011-03-29 Seven Networks, Inc. Linking of personal information management data
WO2005101220A1 (en) 2004-03-30 2005-10-27 Ibm Japan, Ltd. User authentication system, method, program, and recording medium containing the program
US20190268430A1 (en) 2005-08-01 2019-08-29 Seven Networks, Llc Targeted notification of content availability to a mobile device
US7502761B2 (en) 2006-02-06 2009-03-10 Yt Acquisition Corporation Method and system for providing online authentication utilizing biometric data
US20080066158A1 (en) * 2006-09-08 2008-03-13 Microsoft Corporation Authorization Decisions with Principal Attributes
US20080065899A1 (en) * 2006-09-08 2008-03-13 Microsoft Corporation Variable Expressions in Security Assertions
US20080066169A1 (en) * 2006-09-08 2008-03-13 Microsoft Corporation Fact Qualifiers in Security Scenarios
US8095969B2 (en) 2006-09-08 2012-01-10 Microsoft Corporation Security assertion revocation
US8060931B2 (en) 2006-09-08 2011-11-15 Microsoft Corporation Security authorization queries
US7814534B2 (en) 2006-09-08 2010-10-12 Microsoft Corporation Auditing authorization decisions
US8201215B2 (en) 2006-09-08 2012-06-12 Microsoft Corporation Controlling the delegation of rights
US8656503B2 (en) 2006-09-11 2014-02-18 Microsoft Corporation Security language translations with logic resolution
US8938783B2 (en) * 2006-09-11 2015-01-20 Microsoft Corporation Security language expressions for logic resolution
US20080066147A1 (en) * 2006-09-11 2008-03-13 Microsoft Corporation Composable Security Policies
US9807096B2 (en) 2014-12-18 2017-10-31 Live Nation Entertainment, Inc. Controlled token distribution to protect against malicious data and resource access
US8220032B2 (en) * 2008-01-29 2012-07-10 International Business Machines Corporation Methods, devices, and computer program products for discovering authentication servers and establishing trust relationships therewith
US20090307744A1 (en) * 2008-06-09 2009-12-10 Microsoft Corporation Automating trust establishment and trust management for identity federation
US20100162369A1 (en) * 2008-12-19 2010-06-24 Iomega Corporation Automatically Adding User Names to Server User List
CN101505217B (en) * 2008-12-31 2011-07-20 成都市华为赛门铁克科技有限公司 Method, apparatus and system for managing intranet host
KR101156087B1 (en) * 2009-07-28 2012-06-20 인하대학교 산학협력단 Method for workload prediction based task scheduling method for multi-server biometric authentication system
KR101147683B1 (en) * 2009-10-08 2012-05-22 최운호 System for Tracking and Securing Container and Logistics Using Biometric Identification Card and CSD
JP5355487B2 (en) * 2010-04-26 2013-11-27 キヤノン株式会社 Image transmitting apparatus and authentication method for image transmitting apparatus
JP5430797B2 (en) * 2011-04-12 2014-03-05 パナソニック株式会社 Authentication system, information registration system, server, program, and authentication method
JP2013037704A (en) * 2012-09-11 2013-02-21 Fuji Xerox Co Ltd Use restriction management device, method, and program
CN102970308B (en) * 2012-12-21 2016-08-10 北京网康科技有限公司 A kind of user authen method and server
JP5429414B2 (en) * 2013-01-15 2014-02-26 富士通株式会社 Integrated identification information management system, identification information integrated management server, and identification information integrated management program
US20150242597A1 (en) * 2014-02-24 2015-08-27 Google Inc. Transferring authorization from an authenticated device to an unauthenticated device
JP2015194947A (en) * 2014-03-31 2015-11-05 ソニー株式会社 Information processing device and computer program
US10547599B1 (en) * 2015-02-19 2020-01-28 Amazon Technologies, Inc. Multi-factor authentication for managed directories
US9961076B2 (en) * 2015-05-11 2018-05-01 Genesys Telecommunications Laboratoreis, Inc. System and method for identity authentication
CN105141586B (en) * 2015-07-31 2018-07-10 广州华多网络科技有限公司 A kind of method and system verified to user
US10522154B2 (en) 2017-02-13 2019-12-31 Google Llc Voice signature for user authentication to electronic device
KR101986244B1 (en) * 2017-10-12 2019-06-05 한국인터넷진흥원 Method of telebiometric authentication based on mobile devices
JP7234699B2 (en) * 2019-03-05 2023-03-08 ブラザー工業株式会社 Application program and information processing device
JP7215234B2 (en) 2019-03-05 2023-01-31 ブラザー工業株式会社 Application program and information processing device
JP7222792B2 (en) * 2019-04-03 2023-02-15 キヤノン株式会社 Information processing system, information processing device, control method and program for information processing device
CN110210200A (en) * 2019-05-28 2019-09-06 浪潮商用机器有限公司 Server intelligent operating method, device, intelligent server and storage medium
US11627138B2 (en) * 2019-10-31 2023-04-11 Microsoft Technology Licensing, Llc Client readiness system
CN111611572B (en) * 2020-06-28 2022-11-22 支付宝(杭州)信息技术有限公司 Real-name authentication method and device based on face authentication

Family Cites Families (41)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5963915A (en) * 1996-02-21 1999-10-05 Infoseek Corporation Secure, convenient and efficient system and method of performing trans-internet purchase transactions
US7580919B1 (en) * 1997-03-10 2009-08-25 Sonicwall, Inc. Query interface to policy server
US6021496A (en) * 1997-07-07 2000-02-01 International Business Machines Corporation User authentication from non-native server domains in a computer network
US5948064A (en) * 1997-07-07 1999-09-07 International Business Machines Corporation Discovery of authentication server domains in a computer network
EP0956818B1 (en) * 1998-05-11 2004-11-24 Citicorp Development Center, Inc. System and method of biometric smart card user authentication
US6449615B1 (en) * 1998-09-21 2002-09-10 Microsoft Corporation Method and system for maintaining the integrity of links in a computer network
JP2000106552A (en) * 1998-09-29 2000-04-11 Hitachi Ltd Authentication method
US6832377B1 (en) * 1999-04-05 2004-12-14 Gateway, Inc. Universal registration system
JP2000311138A (en) 1999-04-28 2000-11-07 Nec Corp System and method for decentralized authentication of server
US6697948B1 (en) * 1999-05-05 2004-02-24 Michael O. Rabin Methods and apparatus for protecting information
JP3636948B2 (en) * 1999-10-05 2005-04-06 株式会社日立製作所 Network system
EP1104133A1 (en) * 1999-11-29 2001-05-30 BRITISH TELECOMMUNICATIONS public limited company Network access arrangement
US20010020231A1 (en) * 2000-04-24 2001-09-06 Desktopdollars.Com Marketing System and Method
WO2002030041A2 (en) * 2000-10-03 2002-04-11 Omtool, Ltd Electronically verified digital signature and document delivery system and method
US7362868B2 (en) * 2000-10-20 2008-04-22 Eruces, Inc. Hidden link dynamic key manager for use in computer systems with database structure for storage of encrypted data and method for storage and retrieval of encrypted data
US8117254B2 (en) * 2000-12-15 2012-02-14 Microsoft Corporation User name mapping in a heterogeneous network
US7941669B2 (en) 2001-01-03 2011-05-10 American Express Travel Related Services Company, Inc. Method and apparatus for enabling a user to select an authentication method
US6959336B2 (en) * 2001-04-07 2005-10-25 Secure Data In Motion, Inc. Method and system of federated authentication service for interacting between agent and client and communicating with other components of the system to choose an appropriate mechanism for the subject from among the plurality of authentication mechanisms wherein the subject is selected from humans, client applications and applets
US20020194499A1 (en) * 2001-06-15 2002-12-19 Audebert Yves Louis Gabriel Method, system and apparatus for a portable transaction device
GB2378010A (en) * 2001-07-27 2003-01-29 Hewlett Packard Co Mulit-Domain authorisation and authentication
US7530099B2 (en) * 2001-09-27 2009-05-05 International Business Machines Corporation Method and system for a single-sign-on mechanism within application service provider (ASP) aggregation
US7610390B2 (en) * 2001-12-04 2009-10-27 Sun Microsystems, Inc. Distributed network identity
JP2003224562A (en) 2002-01-28 2003-08-08 Toshiba Corp Personal authentication system and program
US7584262B1 (en) * 2002-02-11 2009-09-01 Extreme Networks Method of and system for allocating resources to resource requests based on application of persistence policies
US7221935B2 (en) * 2002-02-28 2007-05-22 Telefonaktiebolaget Lm Ericsson (Publ) System, method and apparatus for federated single sign-on services
JP4304362B2 (en) * 2002-06-25 2009-07-29 日本電気株式会社 PKI-compliant certificate confirmation processing method and apparatus, and PKI-compliant certificate confirmation processing program
US20040002878A1 (en) * 2002-06-28 2004-01-01 International Business Machines Corporation Method and system for user-determined authentication in a federated environment
US7328237B1 (en) * 2002-07-25 2008-02-05 Cisco Technology, Inc. Technique for improving load balancing of traffic in a data network using source-side related information
US7747856B2 (en) * 2002-07-26 2010-06-29 Computer Associates Think, Inc. Session ticket authentication scheme
JP2004070416A (en) * 2002-08-01 2004-03-04 Ricoh Co Ltd User authentication method and system for network system
US7249177B1 (en) * 2002-11-27 2007-07-24 Sprint Communications Company L.P. Biometric authentication of a client network connection
US7599959B2 (en) * 2002-12-02 2009-10-06 Sap Ag Centralized access and management for multiple, disparate data repositories
US7219154B2 (en) * 2002-12-31 2007-05-15 International Business Machines Corporation Method and system for consolidated sign-off in a heterogeneous federated environment
US20040162996A1 (en) * 2003-02-18 2004-08-19 Nortel Networks Limited Distributed security for industrial networks
US8244841B2 (en) * 2003-04-09 2012-08-14 Microsoft Corporation Method and system for implementing group policy operations
US7640324B2 (en) * 2003-04-15 2009-12-29 Microsoft Corporation Small-scale secured computer network group without centralized management
US8108920B2 (en) * 2003-05-12 2012-01-31 Microsoft Corporation Passive client single sign-on for web applications
WO2005003907A2 (en) * 2003-06-26 2005-01-13 Ebay Inc. Method and apparatus to authenticate and authorize user access to a system
US7346923B2 (en) * 2003-11-21 2008-03-18 International Business Machines Corporation Federated identity management within a distributed portal server
US7849320B2 (en) * 2003-11-25 2010-12-07 Hewlett-Packard Development Company, L.P. Method and system for establishing a consistent password policy
WO2005101220A1 (en) 2004-03-30 2005-10-27 Ibm Japan, Ltd. User authentication system, method, program, and recording medium containing the program

Also Published As

Publication number Publication date
WO2005101220A1 (en) 2005-10-27
US9584548B2 (en) 2017-02-28
JPWO2005101220A1 (en) 2008-03-06
US8689302B2 (en) 2014-04-01
CN1965304B (en) 2011-06-01
TW200610351A (en) 2006-03-16
KR100968179B1 (en) 2010-07-07
KR20070014124A (en) 2007-01-31
CA2561906C (en) 2014-03-25
US20100212000A1 (en) 2010-08-19
US20160142444A1 (en) 2016-05-19
EP1732008A1 (en) 2006-12-13
CN1965304A (en) 2007-05-16
US20130305313A1 (en) 2013-11-14
US9253217B2 (en) 2016-02-02
EP1732008A4 (en) 2010-05-26
JP4750020B2 (en) 2011-08-17
TWI350095B (en) 2011-10-01
US20070199059A1 (en) 2007-08-23
US20140366083A1 (en) 2014-12-11
US7712129B2 (en) 2010-05-04
US8839393B2 (en) 2014-09-16

Similar Documents

Publication Publication Date Title
CA2561906A1 (en) System, method and program for user authentication, and recording medium on which the program is recorded
Zhang et al. An attribute-based collaborative access control scheme using blockchain for IoT devices
CN109495559B (en) Service registration and calling method and system of micro-service client
JP2004537090A5 (en)
KR101602094B1 (en) Information processing system, print server, information processing apparatus, control method of information processing system, and content printing system
EP2169580A3 (en) Graduated enforcement of restrictions according an application&#39;s reputation
CN108809988A (en) A kind of authentication method and system of request
WO2008151925A3 (en) Managing computer resources in a distributed computing system
WO2007047691A3 (en) Application service provider delivery system
JP5626919B2 (en) Network system, authentication cooperation apparatus, authentication cooperation method, and program
CN107658011A (en) The login method and system of a kind of medical system
JP2013254404A (en) Data communication system and method
BR112014018152B1 (en) file transmission system including print and / or scan jobs, and method for secure file transmission
CN106130732A (en) The method and apparatus that a kind of user registers
JP2014142734A (en) Batch printing control in cloud printing
US20140139865A1 (en) Information processing apparatus, information processing method, and non-transitory computer readable medium
JP2008123018A (en) Device for determining availability
CN106204048A (en) Method is checked in identity security checking
Cabrera-Gutiérrez et al. Secure sensor prototype using hardware security modules and trusted execution environments in a blockchain application: wine logistic use case
Cloud Architecture and security overview
Rosen et al. Correlated mutations at gp120 positions 322 and 440: implications for gp120 structure
Qutaishat et al. Bioterrorism preparedness: the smallpox vaccine debate
Popov TLS 1.3 client authentication
Liu et al. Fine-Auth: A Fine-Grained User Authentication and Key Agreement Protocol Based on Physical Unclonable Functions for Wireless Body Area Networks
Jo et al. The Effects of HIV‐1 Gp120 on the Puncta Count and Expression of α5‐Containing GABAA Receptors in Cultured Rat Hippocampal Neurons

Legal Events

Date Code Title Description
EEER Examination request
MKLA Lapsed

Effective date: 20220214

MKLA Lapsed

Effective date: 20220214