scispace - formally typeset
Patent

Distributed authentication in a protocol-based sphere of trust in which a given external connection outside the sphere of trust may carry communications from multiple sources

TLDR
In this article, the authors propose a distributed authentication model that operates within a protocol-based sphere of trust, where the external computing systems initially communicate with a specific edge internal computing system, and then delegate the task of authentication to the edge computing system.
Abstract
A distributed authentication model that operates within a protocol-based sphere of trust. Rather than being able to communicate with any one of the computing systems internal to the sphere of trust, the amount of authentication is reduced by having the external computing systems initially communicate with a specific edge internal computing system. Many if not all of the internal computing systems then delegate the task of authentication to the edge computing system, and will rely on any authentication performed by the edge computing system. This allows the task of authentication to scale well for large protocol-based spheres of trust.

read more

Citations
More filters
Patent

Multiple independent authentications for enhanced security

TL;DR: In this article, a system and associated method for providing enhanced site access security by use of multiple authentications from independent sources is presented, which includes a user authentication process, a service application, a multi-authentication module and an authentication database.
Patent

Role passing and persistence mechanism for a container

TL;DR: Role Passing and Persistence (RPS) as mentioned in this paper is a role-passing and persistence mechanism that implements role-based access control at a container level, which is used to persist role information for a session between a client and a container.
Patent

Defined zone of authentication

TL;DR: In this article, a level of authentication is calculated for the user based on the information from a defined zone of an environment surrounding the user, and when the level is greater than or equal to a predetermined threshold, the user is authenticated at the electronic computing device to perform a requested activity.
Patent

Edge computing task scheduling method based on QoE perception

TL;DR: In this article, an edge computing task scheduling method based on QoE perception is proposed, which comprises the following steps: periodically collecting equipment resource state information and network state information by a router; when the router receives a task scheduling request, predicting the execution time of a task on different devices according to a prediction model; on the basis, based on the device resources state information, the network states information and the task data, establishing an edge calculation task scheduling model, and solving the task-solving model by using a linear programming model solver to obtain the task scheduling result
Patent

Device and method for pki based single sign-on authentication on low computing security device

TL;DR: A device and a method for PKI based single sign-on authentication on a low computing security device are provided to minimize the delay of an authentication operation by allowing one symmetric key based server to manage the authentication device divided by regions as mentioned in this paper.
References
More filters
Patent

Extensible security system and method for controlling access to objects in a computing environment

TL;DR: In this article, a method and computing system for extending access control of system objects in a computing environment beyond traditional rights such as read, write, create and delete is presented. But the system administrator or user application is able to create control rights that are unique to the type of object, but rather define how a user may control the object.
Patent

Protected content distribution system

TL;DR: In this paper, a system and method for managing use of items having usage rights associated therewith is presented, where the identification mechanism associated to the license requesting user is an access list (120) having identification mechanisms associated with authorized users.

Private Extensions to the Session Initiation Protocol (SIP) for Asserted Identity within Trusted Networks

TL;DR: Private extensions to the Session Initiation Protocol (SIP) that enable a network of trusted SIP servers to assert the identity of authenticated users, and the application of existing privacy mechanisms to the identity problem are described.
Patent

Method for providing a security facility for a network of management servers utilizing a database of trust relations to verify mutual trust relations between management servers

TL;DR: In this article, a method for providing security for distributing management operations among components of a computer network using a network of mutually trusting, mutually authenticating management services to dispatch operations to selected host systems is presented.
Patent

Method and apparatus for processing requests in a network data processing system based on a trust association between servers

TL;DR: In this paper, the authors present instructions for handling requests in a network data processing system, where a first server receives a request from a client to access a resource, performs an authentication process with the client, add information to the request in which the information indicates that the request is from a trusted source to form a modified request, and sends the modified request for processing.