作者: Michael J. Whitcomb
DOI:
关键词: Encryption 、 Business 、 Personally identifiable information 、 Computer security 、 Computer network 、 Key (cryptography) 、 Authentication 、 Proxy (statistics)
摘要: A Proxy Authentication Network includes a server that stores credentials for subscribers, along with combinations of devices and locations from which individual subscribers want to be authenticated. Data is stored in storage: the storage can selected by subscriber. The data storage, personally identifiable information, an encrypted form. key used encrypt such divided between server, hi addition, third parties store portions encrypting key. Subscribers authenticated using their recognized device/location combinations; out-of-band authentication supports authenticating other locations. Once authenticated, party request released. are then assembled at storage. decrypts data, generates new key, re-encrypts transmission requester.