Sso framework for multiple sso technologies

作者: Andreas Leicher , Louis J. Guccione , Yogendra C. Shah , Inhyok Cha , Andreas Schmidt

DOI:

关键词: Computer scienceUser equipmentAuthentication protocolService providerIdentity managementComputer securityThe InternetProtocol (object-oriented programming)AuthenticationProvisioningComputer network

摘要: Users desire useable security or a seamless means for accessing internet services whereby user interaction in the provisioning of credentials may be kept to minimum even eliminated entirely. The Single Sign-On identity management concept enables user- assisted and network- authentication access desired services. To enable users, unified framework protocol layer interface managing multiple methods used. A equipment, UE, comprises application (202, 204) configured communicate with service provider plurality modules (208 - 216), each network-assisted module corresponding different protocol. UE further single sign-on subsystem (206) authenticate based on user-assisted information at and/or network select one more policies.

参考文章(28)
Denise Marie Genty, Shawn Patrick Mullen, Method and system for a single-sign-on access to a computer grid ,(2004)
Peter J. K. Tuton, Gavin G. Bray, Patrick R. Wardrop, Parley A. Salmon, Single sign-on for web applications ,(2008)
Andreas Leicher, Dolores F. Howry, Louis J. Guccione, Yogendra C. Shah, Inhyok Cha, Andreas Schmidt, Method And Apparatus For Trusted Federated Identity ,(2011)
Paul Funk, Roger A. Chickering, Single sign-on for network applications ,(2014)
Robert A. Sartini, Paul T. Schultz, Mark J. Hahn, Identity management and single sign-on in a heterogeneous composite service scenario ,(2010)
Aravindan Ranganathan, Sangeeta Varma, Yahya Al-Salqan, Cryptographic authorization with prioritized and weighted authentication ,(2000)
Terry M. Olkin, Rafiul Ahad, Padmanabha Vedam, Amar Padmanabha, Richard J. Hall, Eric S. Chan, User definable policy for graduated authentication based on the partial orderings of principals ,(2007)
Nancy Cam-Winget, Jeremy Stieglitz, Hao Zhou, Patrice R. Calhoun, Robert B. O'Hara, Method and apparatus for selecting an appropriate authentication method on a client ,(2006)
Petri Asunmaa, Thomas Reichler, Timo Skytta, Robert Aarts, Virtual identity apparatus and method for using same ,(2003)