Ways to extend single sign-on to relying parties of federated sign-on providers
An associative, identity technology used in computer hardware and software for generating and managing security tokens
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0022] In the following description of various embodiments, reference is made to the accompanying drawings identified above and forming a part hereof, and in which are shown by way of illustration various embodiments in which aspects described herein may be practiced. It is to be understood that other embodiments may be utilized and structural and functional modifications may be made without departing from the scope described herein. The various aspects are capable of other embodiments and of being practiced or being carried out in various ways.
[0023] It is to be understood that the phraseology and terminology used herein are for the purpose of description and should not be regarded as limiting. Instead, phrases and terms used herein should be given their broadest interpretations and meanings. The use of "including" and "comprising" and variations thereof is meant to encompass the items listed thereafter and equivalents thereof as well as additional items and equivalents t...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


