Zhang, 2008 - Google Patents
Network Security Middleware Based on USB KeyZhang, 2008
- Document ID
- 18078041144452013925
- Author
- Zhang D
- Publication year
- Publication venue
- 2008 Fifth IEEE International Symposium on Embedded Computing
External Links
Snippet
USB key represents one of the smallest computing platforms today. With the development of USB key chips, more and more security features will be supported by USB key. Network security middleware is a Java and HTTP-based development framework on USB key …
- 239000003795 chemical substances by application 0 description 8
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/54—Interprogramme communication; Intertask communication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/50—Allocation of resources, e.g. of the central processing unit [CPU]
- G06F9/5005—Allocation of resources, e.g. of the central processing unit [CPU] to service a request
- G06F9/5027—Allocation of resources, e.g. of the central processing unit [CPU] to service a request the resource being a machine, e.g. CPUs, Servers, Terminals
- G06F9/5055—Allocation of resources, e.g. of the central processing unit [CPU] to service a request the resource being a machine, e.g. CPUs, Servers, Terminals considering software capabilities, i.e. software resources associated or available to the machine
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP5619007B2 (en) | Apparatus, system and computer program for authorizing server operation | |
US7748609B2 (en) | System and method for browser based access to smart cards | |
EP2634703B1 (en) | Removable storage device, and data processing system and method based on the device | |
US20100146609A1 (en) | Method and system of securing accounts | |
CN105897668A (en) | Third party account authorization method, device, server and system | |
US9055061B2 (en) | Process of authentication for an access to a web site | |
JP2017535833A (en) | System for transaction approval | |
CN111832005B (en) | Application authorization method, application authorization device and electronic equipment | |
CA2779654A1 (en) | Method for secure interaction with a security element | |
Funfrocken | Protecting mobile web-commerce agents with smartcards | |
Zhang et al. | Trusted e-commerce user agent based on USB Key | |
Zhang | Network Security Middleware Based on USB Key | |
CN117063174A (en) | Security module and method for inter-app trust through app-based identity | |
Akram et al. | Application management framework in user centric smart card ownership model | |
CN106534047A (en) | Information transmitting method and apparatus based on Trust application | |
Arnosti et al. | Secure physical access with NFC-enabled smartphones | |
Uddin et al. | USB Key as an active device of Security System | |
Gruntz et al. | MOONACS: a mobile on-/offline NFC-based physical access control system | |
KR20200014545A (en) | User integrated authentication service system and method thereof | |
Ghosh | Security risks of java cards | |
Kehr et al. | PCA: Jini-based personal card assistant | |
KR101073022B1 (en) | Method for distributing a unique key value of user's own | |
Perrotis | Development of cryptographic algorithms in the trusted execution environment | |
SI25524A (en) | Procedure and system for the authentication and authorization of a transaction |