Authenticating a user device to access services based on a device ID

作者: Fenglin Yin

DOI:

关键词: Hash functionHash chainComputer securityKey (cryptography)Session IDComputer networkSession (computer science)User deviceComputer scienceIdentifier

摘要: A first device may receive a session token from second device; determine that the is expired or invalid; provide security input to cause generate hash value of using key corresponding identifier (ID); ID and ID; matches value; establish with based on determining value.

参考文章(6)
Venkata Subba Rao Ravilisetty, Vikram Nagulakonda, Lakshmi Narasimha Reddy Ankireddipally, Identifier Binding for Automated Web Processing ,(2008)
Joshua Allen, Session-state manager ,(2004)
Reiner Sailer, Dinesh Chandra Verma, James Ryan Giles, Method and apparatus for serving content from a semi-trusted server ,(2001)
John Nicholas Jitkoff, Ben Goodger, Glen Murphy, Henry Bridge, Background auto-submit of login credentials ,(2011)
Narayanan Venkitaraman, Mahsa Nakhjiri, Madjid F. Nakhjiri, Token-based distributed generation of security keying material ,(2006)