[go: up one dir, main page]

Curie - Google Patents

IdeNtity verifiCatiOn with privacy-preservinG credeNtIals for anonymous access To Online services

Curie

View PDF
Document ID
7169948084532773738
Author
Curie M

External Links

Snippet

The current deliverable documents the reference architecture of the INCOGNITO project and is part of the Work Package 2. The development of the project is taking place under a partnership that involves both academic and industrial expertise. Considering the …
Continue reading at incognito.socialcomputing.eu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • G06F21/335User authentication using certificates for accessing specific resources, e.g. using Kerberos tickets
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/0815Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/104Grouping of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/102Entity profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/0892Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network by using authentication-authorization-accounting [AAA] servers or protocols

Similar Documents

Publication Publication Date Title
Lux et al. Distributed-ledger-based authentication with decentralized identifiers and verifiable credentials
JP7083892B2 (en) Mobile authentication interoperability of digital certificates
US9300653B1 (en) Delivery of authentication information to a RESTful service using token validation scheme
Carretero et al. Federated identity architecture of the European eID system
Laborde et al. A user-centric identity management framework based on the W3C verifiable credentials and the FIDO universal authentication framework
Berbecaru et al. Providing login and Wi-Fi access services with the eIDAS network: A practical approach
Alonso et al. An identity framework for providing access to FIWARE OAuth 2.0-based services according to the eIDAS European regulation
Yildiz et al. Connecting self-sovereign identity with federated and user-centric identities via SAML integration
TW201141176A (en) Method and apparatus for providing trusted single sing-on access to applications and internet-based services
Pérez-Méndez et al. Identity federations beyond the web: A survey
Kiourtis et al. Identity management standards: a literature review
Ribeiro de Mello et al. Multi-factor authentication for shibboleth identity providers
Singh et al. Identity management in cloud computing through claim-based solution
Catuogno et al. Achieving interoperability between federated identity management systems: A case of study
van den Broek et al. Securely derived identity credentials on smart phones via self-enrolment
Baker OAuth2
Vanella Evolution of Digital Identity in Europe: Experimenting with the eIDAS 2.0 Framework and the EU Digital Identity Wallet
Zwattendorfer et al. Middleware architecture for cross-border identification and authentication
Li Context-aware attribute-based techniques for data security and access control in mobile cloud environment
Hauck OpenID for Verifiable Credentials: formal security analysis using the Web Infrastructure Model
Al-Sinani et al. Client-based cardspace-openid interoperation
Curie IdeNtity verifiCatiOn with privacy-preservinG credeNtIals for anonymous access To Online services
Mourya Implementing an IDaaS for Azure Active Directory using Azure Conditional Access Policies
Paul et al. UI Component and Authentication
Keil Social Security