System for Managing Computer Data Security Through Portable Data Access Security Tokens

作者: Lars Reinertsen

DOI:

关键词:

摘要: A data storage system for controlling access to data, including: (a) a user facility create request and attach digital signature thereto; (b) owner to: (i) verify the identity of user; (ii) determine whether meets permission conditions should be granted, and: (iii) public key request, thereby creating portable token; (c) management third party holder user, establish that is making same authorized by then, identify requested (iv) grant data.

参考文章(12)
Rodrigo Philander, David Irvine, Keith Barraclough, Michael J. Albanese, James Roland Henderson, Token-based remote data access ,(2006)
Melih Abdulhayoglu, Method and system for managing email ,(2007)
Yasuyuki Kinoshita, Yoichi Kobori, Kensuke Baba, Keigo Ihara, Access control processing method ,(2004)
Matt Higgins, Cecilia Dahl, Kevin McLaughlin, Rob Cartwright, Systems and methods for improved access to an attraction ,(2012)
Philip Hawkes, Gregory G. Rose, System and method for audio tickets ,(2003)
Eric Strellis, James Kleckner, Minh Triet Tran, Renee Villaescusa, Using digital signatures to streamline the process of amending financial transactions ,(2002)
Jon Olnes, Judith Rossebo, Single sign-on secure service access ,(2003)