首页>
外国专利>
In-band identity verification and man-in-the-middle defense
In-band identity verification and man-in-the-middle defense
展开▼
机译:带内身份验证和中间人防御
展开▼
页面导航
摘要
著录项
相似文献
摘要
A variety of techniques for performing identity verification are disclosed. As one example, a verification request is received from a remote user. The verification request pertains to a cryptographic key. In response to receiving a confirmation from a local user of the local device, a verification process is initiated. A result of the verification process is transmitted to the remote user. As a second example, a verification request can be received at the local device, from a local user of the device. A verification process with respect to the local user is initiated, and a result of the verification process is transmitted to a remote user that is different from the local user.
展开▼