[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Zhang, 2008 - Google Patents

Network Security Middleware Based on USB Key

Zhang, 2008

Document ID
18078041144452013925
Author
Zhang D
Publication year
Publication venue
2008 Fifth IEEE International Symposium on Embedded Computing

External Links

Snippet

USB key represents one of the smallest computing platforms today. With the development of USB key chips, more and more security features will be supported by USB key. Network security middleware is a Java and HTTP-based development framework on USB key …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogramme communication; Intertask communication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • G06F9/5005Allocation of resources, e.g. of the central processing unit [CPU] to service a request
    • G06F9/5027Allocation of resources, e.g. of the central processing unit [CPU] to service a request the resource being a machine, e.g. CPUs, Servers, Terminals
    • G06F9/5055Allocation of resources, e.g. of the central processing unit [CPU] to service a request the resource being a machine, e.g. CPUs, Servers, Terminals considering software capabilities, i.e. software resources associated or available to the machine

Similar Documents

Publication Publication Date Title
JP5619007B2 (en) Apparatus, system and computer program for authorizing server operation
US7748609B2 (en) System and method for browser based access to smart cards
EP2634703B1 (en) Removable storage device, and data processing system and method based on the device
US20100146609A1 (en) Method and system of securing accounts
CN105897668A (en) Third party account authorization method, device, server and system
US9055061B2 (en) Process of authentication for an access to a web site
JP2017535833A (en) System for transaction approval
CN111832005B (en) Application authorization method, application authorization device and electronic equipment
CA2779654A1 (en) Method for secure interaction with a security element
Funfrocken Protecting mobile web-commerce agents with smartcards
Zhang et al. Trusted e-commerce user agent based on USB Key
Zhang Network Security Middleware Based on USB Key
CN117063174A (en) Security module and method for inter-app trust through app-based identity
Akram et al. Application management framework in user centric smart card ownership model
CN106534047A (en) Information transmitting method and apparatus based on Trust application
Arnosti et al. Secure physical access with NFC-enabled smartphones
Uddin et al. USB Key as an active device of Security System
Gruntz et al. MOONACS: a mobile on-/offline NFC-based physical access control system
KR20200014545A (en) User integrated authentication service system and method thereof
Ghosh Security risks of java cards
Kehr et al. PCA: Jini-based personal card assistant
KR101073022B1 (en) Method for distributing a unique key value of user's own
Perrotis Development of cryptographic algorithms in the trusted execution environment
SI25524A (en) Procedure and system for the authentication and authorization of a transaction