Systems and methods of using a temporary private key between two devices

作者: Paul Saxman , J. Leslie Vogel

DOI:

关键词: Multi-factor authenticationComputer access controlPublic-key cryptographyToken passingAuthentication serverComputer scienceNetwork Access DevicePersonally identifiable informationAccess tokenComputer security

摘要: A method executes at a personal user device associated with user. The receives request from shared device, the seeking access to information is stored resource server. authentication then sends an server, and token. token grants privileges information. thereby permitting application executing on use for retrieving least portion of detects physical movement message server revoke

参考文章(30)
Lawrence Fried, David Scott Shefferman, System for sharing personal and qualifying data with a third party ,(2012)
Thomas S. Messerges, John Richard Kane, Method and apparatus for providing access to personal information ,(2003)
Cornell N. Bogdan, Mark S. Cashman, Hugh J. Quinn, James A Madison, System and method for providing dynamic insurance portal transaction authentication and authorization ,(2011)
Gregory M. Gutt, Rachel Rane' Schmalzried, David A. Whelan, David G. Lawrence, Michael L. O'Connor, Arun Ayyagari, Contextual-Based Virtual Data Boundaries ,(2012)
John Shewchuk, Arun Nanda, Kim Cameron, Xiao Xie, Remote access of digital identities ,(2014)
Mustafa Ergen, Wi-fi authentication by proxy ,(2012)
Steven A. Fain, John M. Whalley, Jan G. Eugenides, Brian E. Mansell, David M. Leatham, Tracking and management system ,(2012)