Proxy authentication network

作者: Michael J. Whitcomb

DOI:

关键词: EncryptionBusinessPersonally identifiable informationComputer securityComputer networkKey (cryptography)AuthenticationProxy (statistics)

摘要: A Proxy Authentication Network includes a server that stores credentials for subscribers, along with combinations of devices and locations from which individual subscribers want to be authenticated. Data is stored in storage: the storage can selected by subscriber. The data storage, personally identifiable information, an encrypted form. key used encrypt such divided between server, hi addition, third parties store portions encrypting key. Subscribers authenticated using their recognized device/location combinations; out-of-band authentication supports authenticating other locations. Once authenticated, party request released. are then assembled at storage. decrypts data, generates new key, re-encrypts transmission requester.

参考文章(12)
Marco Casassa-Mont, Richard Brown, Digital credential monitoring ,(2002)
Kim Cameron, The Laws of Identity Identity Weblog. ,(2005)
Wilson How Kiap Gueh, Transaction system and method ,(2001)
Dan Banay, Steven Mark Mushero, Drummond Shattuck Reed, Kevin Benard Jones, Jeffrey Todd Oberlander, Peter Earnshaw Heyman, Communications system for transferring information between memories according to processes transferred with the information ,(1996)
Michelle Fawcett, Kevin Kershaw, Bradley Schuler, Patrick Furlong, Presence, location and availability communication system and method ,(2002)
Hans Hurvig, Nikolaj Nyholm, System and a method for managing digital identities ,(2002)
Moshe Levy, Jong Eduard K De, Albert Y Leung, Privacy and identification in a data communication network ,(2002)
Mark S. O'Hare, Roger S. Davenport, Rick L. Orsini, Steven Winick, Secure data parser method and system ,(2012)