Cloud Service Validation

作者: Tiwari Arvind

DOI:

关键词:

摘要: In one embodiment, a method includes sending, to user device, token, wherein the token identifier and signature based on key data regarding cloud service provider, receiving, from validation request for identifier, provider in response first request, key.

参考文章(8)
David Wentker, Gabriel Wachob, Transaction secured in an untrusted environment ,(2009)
Yinian Mao, Qing Li, Anand Palanigounder, Authentication of access terminal identities in roaming networks ,(2011)
Andreas Leicher, Vinod K. Choyi, Identity management with generic bootstrapping architecture ,(2013)
Allan Edwin Wetter, Adrian Frei, Peter M. Tsang, Yordan Rouskov, Cloud service authentication ,(2011)
Ricardo A. Morin, Maria E. Torino, Jesse Walker, Juan M. Da Cruz Pinto, Generation, requesting, and/or reception, at least in part, of token ,(2009)
Phalguni Mukherjee, Vipin Namboodiri, Boppana Visweswara Rao, Broker-Based Authentication System Architecture and Design ,(2015)
J Korhonen, Risto Piiroinen, Jukka Paasivaara, Token and a distributed service network which uses it ,(2008)