Method and apparatus for web-based application service model for security management
A public network and security profile technology, applied in the field of authentication, distribution and use of access license certificates or codes, and management, can solve the problems of lack of access management and inability to provide electronic confidentiality
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0074] PX 3 (precisely scalable authentication, authorization, and authentication) allows distribution of encrypted data objects to general audiences from distributors over a decentralized public network, where the distributors are unaware of each audience member's identity and associated access permissions. PX 3 Provides the basis for securely broadcasting and storing sensitive material over public networks, such as the Internet or cellular telephone networks. New audience members are authorized based on their credentials, which are assigned by the certification authority and assigned to members on the public network. PX 3 A feature of existing CKM techniques that can take multiple encrypted data objects and encrypt them into another encrypted data object is used. This "nested object" feature enables the PXa 3 The ability to optionally decrypt objects based on access permissions previously assigned to members.
[0075] The detailed description below discusses PXa 3 The ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 