Wagner et al., 2019 - Google Patents
Unified Data Model for Tuple-Based Trust Scheme PublicationWagner et al., 2019
View PDF- Document ID
- 2916766616201588785
- Author
- Wagner S
- Kurowski S
- Roßnagel H
- Publication year
- Publication venue
- Open Identity Summit 2019
External Links
Snippet
Trust schemes are widely used by authorities to support verifiers of electronic transactions to determine the trustworthiness of relying parties. With a tuple-based publication, in addition to the trust scheme membership, the requirements of the trust scheme are published. For this …
- 238000000034 method 0 description 20
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices
- G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
- G06Q20/367—Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes involving intelligent token, e.g. electronic purse
- G06Q20/3674—Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes involving intelligent token, e.g. electronic purse involving authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
- G06F21/645—Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN110874464B (en) | User authentication data management method and device | |
| AU2021206913A1 (en) | Systems and methods for distributed data sharing with asynchronous third-party attestation | |
| US11849050B1 (en) | Systems and methods of ring usage certificate extension | |
| AU2020284514B2 (en) | Systems, methods, and storage media for permissioned delegation in a computing environment | |
| EP3817320B1 (en) | Blockchain-based system for issuing and validating certificates | |
| South et al. | Authenticated delegation and authorized ai agents | |
| Danquah et al. | Public key infrastructure: an enhanced validation framework | |
| Jøsang | Identity management and trusted interaction in Internet and mobile computing | |
| Kyriakidou et al. | Decentralized identity with applications to security and privacy for the internet of things | |
| WO2024112394A1 (en) | Sharing security settings between entities using verifiable credentials | |
| Ghanmi et al. | Blockchain‐cloud integration: comprehensive survey and open research issues | |
| US7313689B2 (en) | Method, system and service for the authentication of a public key certificate | |
| Chandersekaran et al. | Claims-based enterprise-wide access control | |
| Sharif et al. | Protecting digital identity wallet: a threat model in the age of eidas 2.0 | |
| Chadwick et al. | Adding support to xacml for dynamic delegation of authority in multiple domains | |
| Kumagai et al. | Distributed Public Key Certificate‐Issuing Infrastructure for Consortium Certificate Authority Using Distributed Ledger Technology | |
| Wagner et al. | Unified Data Model for Tuple-Based Trust Scheme Publication | |
| US20090044011A1 (en) | Systems, Devices and Methods for Managing Cryptographic Authorizations | |
| Put et al. | Attribute-based privacy-friendly access control with context | |
| Xu et al. | Tiupam: A framework for trustworthiness-centric information sharing | |
| Rak et al. | Static evaluation of certificate policies for grid pkis interoperability | |
| Magendanz | Data Sharing and Traceability: Improving User Trust in Data Management within Open Banking and Beyond | |
| US20220301376A1 (en) | Method and System for Deployment of Authentication Seal in Secure Digital Voting | |
| Klingelbrunner | Datenschutz in SSI Systemen basierend auf Hyperledger Technologie | |
| Bedmutha et al. | Securing the private smart home: lightweight digital certificates for resource-constrained IoT networks |