System and method for verifying a security token

作者: Emmanuel Wurth

DOI:

关键词:

摘要: A policy description for a web service is received at client. The includes predefined security constraint, requires that an application requesting execution of the also provide token generated by service, and complies with constraint. message compliant obtaining token. sent to service. in response receipt message. compared against constraint verify compliance

参考文章(7)
Kyle S. Young, Khaja E. Ahmed, Daniel Salvatore Schiappa, John Hal Howard, Authentication broker service ,(2004)
Duane F. Buss, Thomas E. Doman, Andrew A. Hodgkinson, Daniel S. Sanders, James G. Sermersheim, James M. Norman, System and method for application-integrated information card selection ,(2008)
Stuart L.S. Kwan, Vijay K. Gajjala, Arun K. Nanda, Colin H. Brace, Derek T. Del Conte, Vijayavani Nori, Rashmi Raj, Provisioning of digital identity representations ,(2008)
Manish Mittal, Dilip K. Pai, Monte C Christensen, Token generation method and apparatus ,(2004)