Method and arrangement for integration of different authentication infrastructures

A technology of infrastructure and user equipment, applied in security devices, electrical components, transmission systems, etc., can solve problems that hinder the development and provision of new services

Active Publication Date: 2009-10-28
TELEFON AB LM ERICSSON (PUBL)
View PDF0 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, there are considerable problems in managing such keys

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and arrangement for integration of different authentication infrastructures
  • Method and arrangement for integration of different authentication infrastructures
  • Method and arrangement for integration of different authentication infrastructures

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] Figure 1 shows an overview of signaling according to the Free ID-FF framework. At 110, the user entity 101UE makes a request for a service at the service provider 102SP, which request goes through a free enabling proxy 104LEP. At 120, the SP requests authentication. At 130, an authentication request-response communication is shown with the identity provider 103IdP, which at 131 processes the authentication request. The Authentication Response includes an assertion that the UE is authenticated. At 140, the assertion is communicated with the service provider SP, which at 141 processes the assertion. At 150, the proxy LEP responds to the request 110 that the UE is authenticated to access services at the SP.

[0043] Figure 2 illustrates a prior art deployment of GBA / GAA with an Authentication Proxy 260 acting as a Network Application Function NAF with respect to the GBA / GAA infrastructure. The Generic Bootstrap Server Function 210BSF and the User Entity 101UE authentic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method is disclosed that provides efficient integration of infrastructure for federated single sign on, e.g. Liberty ID-FF framework, and generic bootstrapping architecture, e.g. 3GPP GAA/GBA architecture. An integrated proxy server (IAP) is inserted in the path between a user and a service provider (SP). The proxy server differentiates type of access and determines corresponding operative state to act as a liberty enabled server or as a GAA/GBA network application function. A Bootstrapping, Identity, Authentication and Session Management arrangement (BIAS) leverages on 3GPP GAA/GBA infrastructure to provide an integrated system for handling Liberty Federated SSO and 3GPP GAA/GBA bootstrapping procedures at the same time. The method and arrangement provides improved use of infrastructure elements and performance for authenticated service access.

Description

technical field [0001] In general, the present invention relates to the authentication of users attempting to access services provided in a communication network. In particular, the invention relates to authentication in networks of different infrastructures for integrated service access. Background technique [0002] In telecommunications systems, users must authenticate using some method of network authentication in order to access the telecommunications network. 3GPP has standardized Authentication and Key Agreement Architecture (AKA), where user equipment (UE) and network functionality share a common key as the basis for authentication. Keys are managed when subscribing to network services and are preferably stored on a secure card (eg SIM card). [0003] Furthermore, a user requesting access to a web service must re-authenticate to the service, for example in order to establish the basis for billing. It is common in the art to base the trust between the service provi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/04H04W12/06H04W80/12H04W88/18H04L29/06H04L29/08H04L9/40
CPCH04L63/0815H04L63/0407H04W80/12H04W12/06H04W12/75H04W12/0431
Inventor L·巴里加D·卡斯特拉诺斯-扎莫拉
Owner TELEFON AB LM ERICSSON (PUBL)
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products