TECHNIQUES FOR SECURING AND CONTROLLING ACCESS TO DATA
    5.
    发明公开
    TECHNIQUES FOR SECURING AND CONTROLLING ACCESS TO DATA 审中-公开
    保证和控制数据访问的技巧

    公开(公告)号:EP3274903A1

    公开(公告)日:2018-01-31

    申请号:EP16714708.1

    申请日:2016-03-24

    申请人: Intel Corporation

    IPC分类号: G06F21/62

    摘要: Various embodiments are directed to techniques for controlling access to data in a decentralized manner. An apparatus includes an apportioning component to divide an item of data into multiple portions based on an organizational structure of the item of data; a tree component to generate a PRN tree including a multitude of nodes and a branching structure based on the organizational structure, the multitude including at least one branching node and multiple leaf nodes that correspond to the multiple portions; a PRN component to generate a PRN for each node of the multitude, the PRN component to use a PRN of a branching node of the PRN tree to generate a PRN for a leaf node that depends therefrom; and a communications component to transmit the multiple portions and multiple addresses based on PRNs of leaf nodes of the PRN tree to a server. Other embodiments are described and claimed.

    CONTINUOUS MULTI-FACTOR AUTHENTICATION
    6.
    发明公开
    CONTINUOUS MULTI-FACTOR AUTHENTICATION 有权
    KONTINUIERLICHE MEHRSTUFIGE AUTHENTIFIZIERUNG

    公开(公告)号:EP3014507A1

    公开(公告)日:2016-05-04

    申请号:EP13887611.5

    申请日:2013-06-27

    申请人: Intel Corporation

    IPC分类号: G06F21/30

    摘要: Technologies for continuously authenticating a user via multiple authentication factors include a computing device for generating a continuous authentication assertion indicating that continuous authentication of a user is being monitored, sending the continuous authentication assertion to a key distribution center server, and requesting and receiving an initial ticket from the key distribution center server. Such technologies may also include requesting a service ticket from the key distribution center server for accessing a service provider server, receiving a service ticket from the key distribution center server including the continuous authentication assertion, requesting access to the service provider server with the service ticket including the continuous authentication assertion, and accessing the service provider server in response to the continuous authentication assertion being verified.

    摘要翻译: 用于经由多个认证因素连续认证用户的技术包括:计算设备,用于生成指示正在监视用户的连续认证的连续认证断言,向密钥分发中心服务器发送连续认证断言,以及请求和接收初始票证 从密钥分发中心服务器。 这样的技术还可以包括从密钥分配中心服务器请求服务票据以访问服务提供商服务器,从密钥分发中心服务器接收包括持续认证断言的服务票据,请求对服务提供商服务器的访问,服务票据包括 连续认证断言,以及响应于正在验证的连续认证断言而访问服务提供商服务器。

    TECHNOLOGIES FOR AUTHENTICATING A USER OF A COMPUTING DEVICE BASED ON AUTHENTICATION CONTEXT STATE
    9.
    发明公开
    TECHNOLOGIES FOR AUTHENTICATING A USER OF A COMPUTING DEVICE BASED ON AUTHENTICATION CONTEXT STATE 审中-公开
    基于认证上下文状态对计算设备的用户进行认证的技术

    公开(公告)号:EP3238115A1

    公开(公告)日:2017-11-01

    申请号:EP15873951.6

    申请日:2015-11-20

    申请人: Intel Corporation

    IPC分类号: G06F21/31 G06F21/30

    摘要: Technologies for authenticating a user of a computing device based on an authentication context state includes generating context state outputs indicative of various context states of a mobile computing device based on sensor data generated by sensors of the mobile computing device. An authentication manager of the computing device implements an authentication state machine to authenticate a user of the computing device. The authentication state machine includes a number of authentication states, and each authentication state includes one or more transitions to another authentication state. Each of the transitions is dependent upon a context state output. The computing device may also include a device security manager, which implements a security state machine that includes a number of security states. Transition between security states is dependent upon the present authentication state of the user. The device security manager may implement a different security function in each security state.

    摘要翻译: 用于基于认证上下文状态认证计算设备的用户的技术包括基于由移动计算设备的传感器生成的传感器数据来生成指示移动计算设备的各种上下文状态的上下文状态输出。 计算设备的认证管理器实现认证状态机以认证计算设备的用户。 认证状态机包括多个认证状态,并且每个认证状态包括到另一个认证状态的一个或多个转换。 每个转换都依赖于上下文状态输出。 计算设备还可以包括设备安全管理器,其实现包括多个安全状态的安全状态机。 安全状态之间的转换依赖于用户的当前认证状态。 设备安全管理器可以在每个安全状态中实施不同的安全功能。