Patent
Distributed authentication in a protocol-based sphere of trust in which a given external connection outside the sphere of trust may carry communications from multiple sources
TLDR
In this article, the authors propose a distributed authentication model that operates within a protocol-based sphere of trust, where the external computing systems initially communicate with a specific edge internal computing system, and then delegate the task of authentication to the edge computing system.Abstract:
A distributed authentication model that operates within a protocol-based sphere of trust. Rather than being able to communicate with any one of the computing systems internal to the sphere of trust, the amount of authentication is reduced by having the external computing systems initially communicate with a specific edge internal computing system. Many if not all of the internal computing systems then delegate the task of authentication to the edge computing system, and will rely on any authentication performed by the edge computing system. This allows the task of authentication to scale well for large protocol-based spheres of trust.read more
Citations
More filters
Patent
Multiple independent authentications for enhanced security
TL;DR: In this article, a system and associated method for providing enhanced site access security by use of multiple authentications from independent sources is presented, which includes a user authentication process, a service application, a multi-authentication module and an authentication database.
Patent
Role passing and persistence mechanism for a container
TL;DR: Role Passing and Persistence (RPS) as mentioned in this paper is a role-passing and persistence mechanism that implements role-based access control at a container level, which is used to persist role information for a session between a client and a container.
Patent
Defined zone of authentication
Barakat Wayne,Barkas Sotirios K,Chang Michael,Fontana Laura Marie,Jiron Julio,Beth S. Moss,Nguyen Traci,Vittimberga Paul +7 more
TL;DR: In this article, a level of authentication is calculated for the user based on the information from a defined zone of an environment surrounding the user, and when the level is greater than or equal to a predetermined threshold, the user is authenticated at the electronic computing device to perform a requested activity.
Patent
Edge computing task scheduling method based on QoE perception
TL;DR: In this article, an edge computing task scheduling method based on QoE perception is proposed, which comprises the following steps: periodically collecting equipment resource state information and network state information by a router; when the router receives a task scheduling request, predicting the execution time of a task on different devices according to a prediction model; on the basis, based on the device resources state information, the network states information and the task data, establishing an edge calculation task scheduling model, and solving the task-solving model by using a linear programming model solver to obtain the task scheduling result
Patent
Device and method for pki based single sign-on authentication on low computing security device
TL;DR: A device and a method for PKI based single sign-on authentication on a low computing security device are provided to minimize the delay of an authentication operation by allowing one symmetric key based server to manage the authentication device divided by regions as mentioned in this paper.
References
More filters
Patent
Extensible security system and method for controlling access to objects in a computing environment
TL;DR: In this article, a method and computing system for extending access control of system objects in a computing environment beyond traditional rights such as read, write, create and delete is presented. But the system administrator or user application is able to create control rights that are unique to the type of object, but rather define how a user may control the object.
Patent
Protected content distribution system
TL;DR: In this paper, a system and method for managing use of items having usage rights associated therewith is presented, where the identification mechanism associated to the license requesting user is an access list (120) having identification mechanisms associated with authorized users.
Private Extensions to the Session Initiation Protocol (SIP) for Asserted Identity within Trusted Networks
TL;DR: Private extensions to the Session Initiation Protocol (SIP) that enable a network of trusted SIP servers to assert the identity of authenticated users, and the application of existing privacy mechanisms to the identity problem are described.
Patent
Method for providing a security facility for a network of management servers utilizing a database of trust relations to verify mutual trust relations between management servers
Ram Sudama,David Michael Griffin,Brad C Johnson,Dexter Sealy,James Shelhamer,Owen Harold Tallman +5 more
TL;DR: In this article, a method for providing security for distributing management operations among components of a computer network using a network of mutually trusting, mutually authenticating management services to dispatch operations to selected host systems is presented.
Patent
Method and apparatus for processing requests in a network data processing system based on a trust association between servers
TL;DR: In this paper, the authors present instructions for handling requests in a network data processing system, where a first server receives a request from a client to access a resource, performs an authentication process with the client, add information to the request in which the information indicates that the request is from a trusted source to form a modified request, and sends the modified request for processing.
Related Papers (5)
Cross-trust-domain authentication method used for distributed network system
Zhang Wenfang,Wang Xiaomin +1 more
Design and Implementation of Multi-tier Authentication Scheme in Cloud
Maninder Singh,Sarbjeet Singh +1 more