TRUSTED RELYING PARTY PROXY FOR INFORMATION CARD TOKENS
An apparatus can include a secret mapping module running on a machine and configured to create a mapping that maps a secret to a claim stored in an information card, a receiver running on the machine and configured to receive a request for the secret from a remote application, a mapping query module...
Saved in:
Main Authors | , , |
---|---|
Format | Patent |
Language | English |
Published |
15.04.2010
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | An apparatus can include a secret mapping module running on a machine and configured to create a mapping that maps a secret to a claim stored in an information card, a receiver running on the machine and configured to receive a request for the secret from a remote application, a mapping query module running on the machine and configured to perform a search for the mapping, a credential provider application running on the machine and configured to retrieve the secret based at least in part on the claim, and a transmitter configured to transmit the secret to the remote application. |
---|---|
Bibliography: | Application Number: US20080248815 |