A security architecture has been developed in which a single sign-on is provided for multiple information resources. Rather than specifying a single authentication scheme for all information resources, the security architecture associates trust-level requirements with information resources. Authentication schemes (e.g., those based on passwords, certificates, biometric techniques, smart cards, etc.) are employed depending on the trust-level requirement(s) of an information resource (or information resources) to be accessed. Once credentials have been obtained for an entity and the entity has been authenticated to a given trust level, access is granted, without the need for further credentials and authentication, to information resources for which the authenticated trust level is sufficient.

 
Web www.patentalert.com

< Method and system for retrieving an anti-virus signature from one or a plurality of virus-free certificate authorities

< Inter-method control transfer for execution engines with memory constraints

> Methods and systems for generating and validating value-bearing documents

> System and method for enabling failover for an application server cluster

~ 00207