Trust-based cross-domain authentication method
An authentication method and trust domain technology, applied in the field of trust-based cross-domain authentication, can solve cumbersome and inefficient problems, achieve the effect of simplifying the cross-domain authentication process and improving the efficiency of cross-domain authentication
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0012] A trust-based cross-domain authentication method includes the following steps:
[0013] Step (1) Establish a trust relationship based on the PKI authentication system between authentication servers in different trust domains. The specific method is: assign the authentication servers in different trust domains to the same trusted authentication center CA in the PKI authentication system, and the trusted authentication center CA issues certificates for each authentication server. According to the PKI authentication theory, all of a CA Entities automatically trust all certificates issued by the CA, thus establishing a trust relationship between authentication servers. Here, at least two trust domains may be included, and correspondingly, there are at least two authentication servers. The entity may be a user, an application server, and the like.
[0014] When the entity a of domain A in the above at least two trust domains wants to access the entity b of domain B across ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com