System and method for implementing a two-person access rule using mobile devices

作者: Michael R. Horton

DOI:

关键词:

摘要: A system using mobile devices and a network provides access authentication, authorization accounting to computing resources two-person rule solution approach. central control server coordinates rule-based process in which requesting user one or more authorizing users are engaged real-time communications facilitate approved sensitive resource. The technique utilizes cellular interfaces location service technologies, while also providing traditional security measures of voice visual verification identities.

参考文章(37)
Pavan K. Muddana, Ronald F. Richards, Bradley N. Rotter, Determining Identity Of Individuals Using Authenticators ,(2014)
Hans-Joerg Kolbe, Thomas Dietz, Nico D'heureuse, Method for operating a flow-based switching system and switching system ,(2011)
Valerie Guralnik, Ashwin G, Santhanakrishnan Ponnambalam, Sriram Subramanian, Sivakumar Balakrishnan, Walt Heimerdinger, Access control system based upon behavioral patterns ,(2010)
Kamran Asghari-Kamrani, Nader Asghari-Kamrani, Direct authentication system and method via trusted authenticators ,(2012)
W.A. Jansen, Determining privileges of mobile agents annual computer security applications conference. pp. 149- 158 ,(2001) , 10.1109/ACSAC.2001.991531
Sidharth Subhash Ghag, Sachin Prakash Sancheti, Dynamic pin dual factor authentication using mobile device ,(2011)
Balasubramanian Rajagopalan, Ashutosh Tripathi, Rahul Singh, Executing commands on devices through presence applications ,(2009)