Process For Implementing A Single Login Process For Internal Computer Services

Logging in to internal computer services (such as server hard drives or internal proprietary applications) can be a cumbersome task since each requires different login information. This publication explains a process where Linux can automatically track these computer services and login information, save and secure this information in its own encrypted login database, then use this information to automatically log in authenticated users whenever they access an internal computer service.

Publication Date
24 February 2009

Tags
authentication database


Download-publication


Click here to download link on ip.com


Click to share this page via your favorite social network.

LEARN MORE
Learn more about defensive publications with our examples and frequently asked questions

What we are trying to do?

We are attempting to mobilize the creativity and innovative capacities of the Linux and broader open source community to codify the universe of preexisting inventions in defensive publications that upon publication in the IP.COM database will immediately serve as effective prior art that prevents anyone from having a patent issued that claims inventions that have already been document in a defensive publication. In addition to creating a vehicle to utilize this highly effective form of IP rights management for known inventions, it is hoped that the community will use defensive publications as a means of codifying future inventions should the inventors prefer not to make their invention the subject of a patent disclosure and application.

Sponsors: