http://dbpedia.org/ontology/abstract
|
Closed-loop authentication, as applied to … Closed-loop authentication, as applied to computer network communication, refers to a mechanism whereby one party verifies the purported identity of another party by requiring them to supply a copy of a token transmitted to the canonical or trusted point of contact for that identity. It is also sometimes used to refer to a system of mutual authentication whereby two parties authenticate one another by signing and passing back and forth a cryptographically signed nonce, each party demonstrating to the other that they control the secret key used to certify their identity.secret key used to certify their identity.
|
http://dbpedia.org/ontology/wikiPageID
|
2211700
|
http://dbpedia.org/ontology/wikiPageLength
|
3183
|
http://dbpedia.org/ontology/wikiPageRevisionID
|
978620800
|
http://dbpedia.org/ontology/wikiPageWikiLink
|
http://dbpedia.org/resource/Computer_network +
, http://dbpedia.org/resource/Secret_key +
, http://dbpedia.org/resource/Category:Computer_security +
, http://dbpedia.org/resource/Authentication +
, http://dbpedia.org/resource/Category:Computer_access_control +
, http://dbpedia.org/resource/Cryptography +
, http://dbpedia.org/resource/Password +
, http://dbpedia.org/resource/Anonymity +
, http://dbpedia.org/resource/Pseudonymity +
, http://dbpedia.org/resource/Digital_identity +
, http://dbpedia.org/resource/Internet_bot +
, http://dbpedia.org/resource/Shared_secret +
, http://dbpedia.org/resource/Cryptographic_nonce +
, http://dbpedia.org/resource/Security_token +
, http://dbpedia.org/resource/Information_Security +
|
http://dbpedia.org/property/wikiPageUsesTemplate
|
http://dbpedia.org/resource/Template:Unreferenced +
, http://dbpedia.org/resource/Template:Main +
|
http://purl.org/dc/terms/subject
|
http://dbpedia.org/resource/Category:Computer_access_control +
|
http://www.w3.org/ns/prov#wasDerivedFrom
|
http://en.wikipedia.org/wiki/Closed-loop_authentication?oldid=978620800&ns=0 +
|
http://xmlns.com/foaf/0.1/isPrimaryTopicOf
|
http://en.wikipedia.org/wiki/Closed-loop_authentication +
|
owl:sameAs |
http://www.wikidata.org/entity/Q104840668 +
, http://rdf.freebase.com/ns/m.06w7wd +
, http://yago-knowledge.org/resource/Closed-loop_authentication +
, https://global.dbpedia.org/id/7dGtU +
, http://dbpedia.org/resource/Closed-loop_authentication +
|
rdfs:comment |
Closed-loop authentication, as applied to … Closed-loop authentication, as applied to computer network communication, refers to a mechanism whereby one party verifies the purported identity of another party by requiring them to supply a copy of a token transmitted to the canonical or trusted point of contact for that identity. It is also sometimes used to refer to a system of mutual authentication whereby two parties authenticate one another by signing and passing back and forth a cryptographically signed nonce, each party demonstrating to the other that they control the secret key used to certify their identity.secret key used to certify their identity.
|
rdfs:label |
Closed-loop authentication
|