CA2468351C - Mecanismes d'authentification de systeme de gestion d'identite hierarchique repartie - Google Patents

Mecanismes d'authentification de systeme de gestion d'identite hierarchique repartie Download PDF

Info

Publication number
CA2468351C
CA2468351C CA 2468351 CA2468351A CA2468351C CA 2468351 C CA2468351 C CA 2468351C CA 2468351 CA2468351 CA 2468351 CA 2468351 A CA2468351 A CA 2468351A CA 2468351 C CA2468351 C CA 2468351C
Authority
CA
Canada
Prior art keywords
user
homesite
identity information
appliance
user identity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CA 2468351
Other languages
English (en)
Other versions
CA2468351A1 (fr
Inventor
Dick C. Hardt
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Callahan Cellular LLC
Original Assignee
Sxip Networks Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sxip Networks Inc filed Critical Sxip Networks Inc
Priority to CA 2468351 priority Critical patent/CA2468351C/fr
Publication of CA2468351A1 publication Critical patent/CA2468351A1/fr
Application granted granted Critical
Publication of CA2468351C publication Critical patent/CA2468351C/fr
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/102Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measure for e-commerce
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/166Implementing security features at a particular protocol layer at the transport layer

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer And Data Communications (AREA)
  • Storage Device Security (AREA)
CA 2468351 2004-06-16 2004-06-16 Mecanismes d'authentification de systeme de gestion d'identite hierarchique repartie Expired - Fee Related CA2468351C (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CA 2468351 CA2468351C (fr) 2004-06-16 2004-06-16 Mecanismes d'authentification de systeme de gestion d'identite hierarchique repartie

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CA 2468351 CA2468351C (fr) 2004-06-16 2004-06-16 Mecanismes d'authentification de systeme de gestion d'identite hierarchique repartie

Publications (2)

Publication Number Publication Date
CA2468351A1 CA2468351A1 (fr) 2004-08-28
CA2468351C true CA2468351C (fr) 2006-10-31

Family

ID=32873403

Family Applications (1)

Application Number Title Priority Date Filing Date
CA 2468351 Expired - Fee Related CA2468351C (fr) 2004-06-16 2004-06-16 Mecanismes d'authentification de systeme de gestion d'identite hierarchique repartie

Country Status (1)

Country Link
CA (1) CA2468351C (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8959652B2 (en) 2004-06-16 2015-02-17 Dormarke Assets Limited Liability Company Graduated authentication in an identity management system

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9928508B2 (en) 2000-08-04 2018-03-27 Intellectual Ventures I Llc Single sign-on for access to a central data repository
US7257581B1 (en) 2000-08-04 2007-08-14 Guardian Networks, Llc Storage, management and distribution of consumer information
US8566248B1 (en) 2000-08-04 2013-10-22 Grdn. Net Solutions, Llc Initiation of an information transaction over a network via a wireless device
WO2003104947A2 (fr) 2002-06-06 2003-12-18 Hardt Dick C Gestion repartie des identites hierarchiques
US9245266B2 (en) 2004-06-16 2016-01-26 Callahan Cellular L.L.C. Auditable privacy policies in a distributed hierarchical identity management system
US8504704B2 (en) 2004-06-16 2013-08-06 Dormarke Assets Limited Liability Company Distributed contact information management
CN114221783B (zh) * 2021-11-11 2023-06-02 杭州天宽科技有限公司 一种数据选择加密解密系统

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8959652B2 (en) 2004-06-16 2015-02-17 Dormarke Assets Limited Liability Company Graduated authentication in an identity management system

Also Published As

Publication number Publication date
CA2468351A1 (fr) 2004-08-28

Similar Documents

Publication Publication Date Title
US7454623B2 (en) Distributed hierarchical identity management system authentication mechanisms
US9245266B2 (en) Auditable privacy policies in a distributed hierarchical identity management system
JP5795604B2 (ja) アプリケーションおよびインターネットベースのサービスに対する信頼されるシングル・サインオン・アクセスを提供するための方法および装置
US6996718B1 (en) System and method for providing access to multiple user accounts via a common password
Pashalidis et al. A taxonomy of single sign-on systems
KR100800339B1 (ko) 제휴 환경에서 사용자에 의해 결정된 인증 및 단일 사인온을 위한 방법 및 시스템
US8117649B2 (en) Distributed hierarchical identity management
US9002018B2 (en) Encryption key exchange system and method
US7320073B2 (en) Secure method for roaming keys and certificates
US20130125222A1 (en) System and Method for Vetting Service Providers Within a Secure User Interface
US20080263644A1 (en) Federated authorization for distributed computing
ZA200500060B (en) Distributed hierarchical identity management
Danquah et al. Public key infrastructure: an enhanced validation framework
CA2468351C (fr) Mecanismes d'authentification de systeme de gestion d'identite hierarchique repartie
CA2468585C (fr) Politiques de confidentialite verifiable dans un systeme de gestion d'identite hierarchique repartie
Chen et al. Ubiquitous one-time password service using the generic authentication architecture
CA2458257A1 (fr) Gestion d'identite hierarchique repartie
Sánchez et al. Levels of assurance and reauthentication in federated environments
Lowman Secure Computer Applications in an Enterprise Environment
Suchon Android in the enterprise
Safavi-Naini et al. Information Security and Privacy-8th Australasian Conference, ACISP 2003, Wollongong
Evans Information cards and a design to extend the claim model to incorporate geolocation

Legal Events

Date Code Title Description
EEER Examination request
MKLA Lapsed