IDENTIFICATION SERVICE BASED AUTHORIZATION

Using various embodiments, methods and systems for securing user data are described. In one embodiment, a system receives a user authentication token, an application identification, and a cryptographically random number from a software application. It then generates an identification hash value usin...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Dharmarajan, Baskaran
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Using various embodiments, methods and systems for securing user data are described. In one embodiment, a system receives a user authentication token, an application identification, and a cryptographically random number from a software application. It then generates an identification hash value using the received information and determines whether the generated identification hash value corresponds to another identification hash value known to the system. If the hash values correspond, it authorizes the software application to perform actions on behalf of a user.