Authorization based on access token

作者: Plamen Pavlov , Yanislav Mihaylov

DOI:

关键词:

摘要: A mobile device may include an authenticator and a processor. The generate authorization request with secure token to access server. processor the server using token, if receives in response request. embed plurality of parameters allow determine, based upon at least one parameters, should be given device.

参考文章(24)
Giridhar Vishwanath Lakkavalli, Kiran Kumar Byrapura Rajanna, Raghuveer Krishna, Securing A Virtual Environment And Virtual Machines ,(2010)
Ruifeng Wang, Hanyu Wei, Xiaohui Chen, Resource control method and apparatus ,(2014)
Mihai Christodorescu, Rajarshi Gupta, Andres Valencia, Methods, Devices, and Systems for Communicating Behavioral Analysis Information ,(2014)
Soorgoli Ashok Halambi, Vinay Sridhara, Sudha A. Gathala, Rajarshi Gupta, Communicating behavior information in a mobile computing device ,(2013)
Shahzad Subedar, Paul Thomas Woodward, System and method for wlan roaming traffic authentication ,(2011)