Securely updating information identifying services accessible via keys

作者: David Feuer , Thaddeus J. Dudziak

DOI:

关键词:

摘要: A first device may receive a service authorization instruction from second device. The include one or more parameters and an to associate disassociate key, with service, permit prevent the be accessed using key. key embedded in application used provide corresponding request for service. validate based on parameters; update, validating instruction, information identifying services that are accessible without modifying application.

参考文章(18)
TaeKyoon Kim, Han-Seung Koo, O-Hyung Kwon, Eun-Jung Kwon, Chieteuk Ahn, Method for updating key in DCATV conditional access system ,(2003)
Warren Wan, Marco Gazzetta, Centrally controllable instant messaging system ,(2003)
Robert A. Sartini, Paul T. Schultz, Mark J. Hahn, Identity management and single sign-on in a heterogeneous composite service scenario ,(2010)
Brett Jason Schoppert, Kyle Dean Austin, Michael Almond, Identity broker configured to authenticate users to host services ,(2010)
Christopher Richard Jacques de Kadt, Marc J. Brooker, Kevin Ross O'Neill, Mark Joseph Cavage, David Brown, Eric Jason Brandwine, Techniques for credential generation ,(2016)
Allan David Lewis, Thomas Leonard Trevor Plestid, Ian Michael Patterson, Data session authentication credentials update for a wireless communication device ,(2011)