Changelog - Google Patents
View this document as: a single page| multiple pages. Wed, 28 Aug 2024 20: 39: 12-0500Changelog
View HTML- Document ID
- 14334911839393663330
- Author
- Changelog C
External Links
Snippet
This guideline focuses on the use of federated identity and the use of assertions to implement identity federations. Federation allows a given credential service provider to provide authentication attributes and (optionally) subscriber attributes to a number of …
- 238000011161 development 0 abstract description 3
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0407—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Grassi et al. | Draft nist special publication 800-63-3 digital identity guidelines | |
US10666657B1 (en) | Token-based access control and grouping | |
Burr et al. | Electronic authentication guideline | |
TWI470989B (en) | Method and apparatus for providing trusted single sing-on access to applications and internet-based services | |
Grassi et al. | Draft nist special publication 800-63b digital identity guidelines | |
US7926089B2 (en) | Router for managing trust relationships | |
US8353016B1 (en) | Secure portable store for security skins and authentication information | |
US8220035B1 (en) | System and method for trusted embedded user interface for authentication | |
CN109196500B (en) | Unified VPN and identity based authentication for cloud based services | |
US20040199768A1 (en) | System and method for enabling enterprise application security | |
US20100250955A1 (en) | Brokered information sharing system | |
US20080263644A1 (en) | Federated authorization for distributed computing | |
US20130125197A1 (en) | Relying Party Specifiable Format for Assertion Provider Token | |
EP2957064B1 (en) | Method of privacy-preserving proof of reliability between three communicating parties | |
Singh et al. | OAuth 2.0: Architectural design augmentation for mitigation of common security vulnerabilities | |
Faynberg et al. | On dynamic access control in Web 2.0 and beyond: Trends and technologies | |
Danquah et al. | Public key infrastructure: an enhanced validation framework | |
Bichsel et al. | An architecture for privacy-ABCs | |
Burr et al. | Sp 800-63-1. electronic authentication guideline | |
Madsen et al. | Challenges to supporting federated assurance | |
Changelog | View this document as: a single page| multiple pages. Wed, 28 Aug 2024 20: 39: 12-0500 | |
Aiemworawutikul et al. | Vulnerability Assessment in National Identity Services | |
Ofleh | Future of Identity and Access Management: The OpenID Connect Protocol | |
Hosseyni et al. | Formal security analysis of the OpenID FAPI 2.0 Security Profile with FAPI 2.0 Message Signing, FAPI-CIBA, Dynamic Client Registration and Management: technical report | |
Baxter et al. | ENHANCING IDENTITY AND ACCESS MANAGEMENT IN THE US NAVY VIA MIGRATION TO MORE MODERN STANDARDS OF AUTHENTICATION |