A secure access system provides security for a computer connected to a data store. Initially, an authentication key, a user name, and a computer identifier are received. The authentication key is parsed to obtain a parsed user name and computer identifier. The parsed user name and computer identifier are validated using the received user name and computer identifier. Additionally, if the received user name and computer identifier are validated, the authentication key is parsed to obtain a server user identifier and a server password. Then, the parsed server user identifier and server password are used to connect to a database server computer.

 
Web www.patentalert.com

< Negotiating secure connections through a proxy server

< Apparatus, system, and method for simulated access to restricted computing resources

> Mapping between remote procedure call system primitives and event driven execution environment system primitives

> Method and apparatus for providing user support based on contextual information

~ 00224