[go: up one dir, main page]

Changelog - Google Patents

View this document as: a single page| multiple pages. Wed, 28 Aug 2024 20: 39: 12-0500

Changelog

View HTML
Document ID
14334911839393663330
Author
Changelog C

External Links

Snippet

This guideline focuses on the use of federated identity and the use of assertions to implement identity federations. Federation allows a given credential service provider to provide authentication attributes and (optionally) subscriber attributes to a number of …
Continue reading at pages.nist.gov (HTML) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden

Similar Documents

Publication Publication Date Title
Grassi et al. Draft nist special publication 800-63-3 digital identity guidelines
US10666657B1 (en) Token-based access control and grouping
Burr et al. Electronic authentication guideline
TWI470989B (en) Method and apparatus for providing trusted single sing-on access to applications and internet-based services
Grassi et al. Draft nist special publication 800-63b digital identity guidelines
US7926089B2 (en) Router for managing trust relationships
US8353016B1 (en) Secure portable store for security skins and authentication information
US8220035B1 (en) System and method for trusted embedded user interface for authentication
CN109196500B (en) Unified VPN and identity based authentication for cloud based services
US20040199768A1 (en) System and method for enabling enterprise application security
US20100250955A1 (en) Brokered information sharing system
US20080263644A1 (en) Federated authorization for distributed computing
US20130125197A1 (en) Relying Party Specifiable Format for Assertion Provider Token
EP2957064B1 (en) Method of privacy-preserving proof of reliability between three communicating parties
Singh et al. OAuth 2.0: Architectural design augmentation for mitigation of common security vulnerabilities
Faynberg et al. On dynamic access control in Web 2.0 and beyond: Trends and technologies
Danquah et al. Public key infrastructure: an enhanced validation framework
Bichsel et al. An architecture for privacy-ABCs
Burr et al. Sp 800-63-1. electronic authentication guideline
Madsen et al. Challenges to supporting federated assurance
Changelog View this document as: a single page| multiple pages. Wed, 28 Aug 2024 20: 39: 12-0500
Aiemworawutikul et al. Vulnerability Assessment in National Identity Services
Ofleh Future of Identity and Access Management: The OpenID Connect Protocol
Hosseyni et al. Formal security analysis of the OpenID FAPI 2.0 Security Profile with FAPI 2.0 Message Signing, FAPI-CIBA, Dynamic Client Registration and Management: technical report
Baxter et al. ENHANCING IDENTITY AND ACCESS MANAGEMENT IN THE US NAVY VIA MIGRATION TO MORE MODERN STANDARDS OF AUTHENTICATION