User device security manager

作者: Rajeev Angal

DOI:

关键词:

摘要: Systems and methods are disclosed to authenticate authorize a user for web services using devices. In various embodiments, method may comprise: identifying, by device security manager executing at corresponding of service, first request issued from an application access remote resources associated with the separate manager; acquiring, manager, information in response identifying request, including least one identification, scope or nonce application; transmitting second service based, part, on identification.

参考文章(46)
Melora Zaner-Godsey, Martin Hall, Michael Kunz, Allison O'Mahony, User Persona Content Targeting ,(2006)
Juha Henrik Arrasvuori, Hannu Juhani Korhonen, Marion Boberg, Jaakko Tapani Lehikoinen, Petri Matti Olavi Piippo, Method, Apparatus, and Computer Readable Medium for Editing an Avatar and Performing Authentication ,(2008)
Rabih Zahr, Nedal Makarem, Matthew D. Hetland, Akito Nozaki, Amir Kashani, Eric Poulsen, Tolga Tarhan, Kirk Waldfogel, Devices, systems and methods for secure verification of user identity ,(2010)
Clarence T. Tegreene, Mark A. Malamud, Matthew G. Dyor, Royce A. Levien, Daniel A. Gerrity, Marc E. Davis, Robert W. Lord, Roderick A. Hyde, Richard T. Lord, Nathan P. Myhrvold, Xeudong Huang, Behavioral fingerprinting with social networking ,(2012)
Mohamed E. Dekhil, Riddhiman Ghosh, Selecting one of plural user profile personae based on context ,(2009)
Steve Rehfuss, Geoff Hulten, Andrew Newman, Ron Franczyk, Christopher A. Meek, John Scarrow, Application reputation service ,(2008)