A computer receives a request for authentication from a client. The computer forwards the authentication request to an authentication source. Once the authentication source has validated the authentication request, the computer requests authentication and cache control information from the authentication source. The computer uses the authentication and cache control information to populate a user object stored in a container hierarchy and enable the computer to authenticate an authentication request without forwarding the authentication request to the authentication source.

 
Web www.patentalert.com

< Method and system for authenticating software

< Tunneling security association messages through a mesh network

> Method and apparatus for storing and distributing encryption keys

> Public key encryption with digital signature scheme

~ 00600