摘要 |
<p>An event consumer (28) designates a certain alarm/event service it desires. An event requestor (20) responds thereto by first obtaining certain authentication related data from a trusted third party authority (54). A request for service including not only this third party provided authentication data but also authentication data generated by the requestor (20) is then issued towards an event provider (14). The event provider (14) decrypts the plural pieces of authentication data, and compares the data to ensure authentication of the event requestor (20). An encrypted response confirming authentication is then sent to event requestor (20) where it is processed to ensure authentication of the event provider (14). As an added process, the authentication performed by the event provider (14) may further include operations to ensure that authorization exists for the event provider (14) and event consumer (28) to communicate with respect to the requested event/alarm notification service.</p> |