Peer based authentication

作者: Sarah Glickfield , Isaac David Guedalia , Ravinder Paul Chandhok

DOI:

关键词: User deviceUser identifierComputer scienceHuman–computer interactionIdentity (object-oriented programming)World Wide WebAuthenticationIs-aUnique user

摘要: The disclosure is related to confirming an identity of a first user device. An aspect includes receiving request confirm the user, determining whether or not there relationship between device and second based on list interactions associated with device, that

参考文章(22)
Brant D. Thomsen, Method for managing network access ,(2002)
Yuji Yamasaki, Mamoru Tomita, Masaki Fukumoto, Satoshi Kondo, Hirofumi Torigai, Communication device, wireless network, program, and storage medium ,(2005)
Sarah Glickfield, Isaac David Guedalia, Ravinder Paul Chandhok, Jacob Guedalia, Methods to discover, configure, and leverage relationships in internet of things (iot) networks ,(2014)
Jiandong Ruan, Hui Shen, Abhishek Abhishek, Managing associations in ad hoc networks ,(2007)
Steven Belz, Marc Sullivan, James Pratt, Systems, Methods, and Computer Program Products for User Authentication ,(2010)
Mihaela Gittler, Gavin Brebner, Dynamic user authentication ,(2003)