Unlock instant, AI-driven research and patent intelligence for your innovation.

Method, system and medium for medium-based authentication and authorization of security services

A safe medium and safe technology, applied in the transmission system, user identity/authority verification, electrical components, etc., can solve problems such as complex design of equipment

Inactive Publication Date: 2019-03-08
SAMSUNG ELECTRONICS CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This can lead to complex designs for devices as a single device needs to be authenticated with multiple ecosystems deploying different types of authentication mechanisms

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, system and medium for medium-based authentication and authorization of security services
  • Method, system and medium for medium-based authentication and authorization of security services
  • Method, system and medium for medium-based authentication and authorization of security services

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] BEST MODE OF THE INVENTION

[0022] One or more embodiments generally relate to authenticating and authorizing electronic devices using secure media. In one embodiment, a method requests authentication of an electronic device by a service provider in response to a request for service by the electronic device. In one embodiment, the authentication element is provided to the service provider via a secure medium of the electronic device. In one embodiment, the authorization server provides proxy authorization to the service provider by receiving the authorization element from the service provider and installing the authorization element on the secure medium in response to the request for the service. In one embodiment, upon authentication and authorization of the electronic device using the secure medium, the requested service is accessed.

[0023] In one embodiment, a system includes: an electronic device; a secure media device coupled to the electronic device; and an a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

One method requests authentication of an electronic device by a service provider in response to the electronic device's request for service. The authentication element is provided to the service provider via the secure medium of the electronic device. In response to the request for service, the authorization server provides proxy authorization to the service provider by receiving the authorization element from the service provider and installing the authorization element on the secure medium. When the electronic device is authenticated and authorized using the secure medium, the requested service is accessed.

Description

technical field [0001] One or more embodiments relate generally to centralized authentication and authorization for access to services, and in particular to a security medium for an electronic device for obtaining authentication and authorization of access to cloud-based services. Background technique [0002] Cloud-based ecosystems are becoming increasingly popular to provide a wide range of services such as content distribution, mobile finance and e-health. Many of these new cloud-based services are or will be available in mobile devices now. In order for a mobile device to access these services, the ecosystem must first authenticate the device before an authorization token is issued to the user of the device. Every time a device user needs to access a subscribed service, he / she presents an authentication and authorization token to the cloud service provider. [0003] A cloud-based ecosystem may be a closed monolithic ecosystem providing all services under a single umbre...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32
CPCH04L63/062H04L63/0815H04L63/0853H04L63/0884
Inventor S.弗马
Owner SAMSUNG ELECTRONICS CO LTD