Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and apparatus for trusted federated identity management and data access authorization

A technology for data and wireless devices, applied in the field of trusted federated identity management and data access authorization and devices, and can solve security problems and other issues

Inactive Publication Date: 2012-10-31
INTERDIGITAL PATENT HLDG INC
View PDF4 Cites 35 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Using single sign-on (SSO) for TS may present potential security issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for trusted federated identity management and data access authorization
  • Method and apparatus for trusted federated identity management and data access authorization
  • Method and apparatus for trusted federated identity management and data access authorization

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] Figure 1-Figure 21 Example implementations may be made in which the disclosed systems, methods, and instrumentalities may be practiced. However, while the invention may be described in connection with example embodiments, it is not limited thereto, and it is to be understood that other embodiments may be utilized or modifications and modifications may be made to the described embodiments without departing from the invention. added to perform the same function of the present invention. Additionally, the figures may show call flows, which are for example purposes. It is understood that other implementations may be used. Also, the order of the streams can be changed appropriately. Also, streams can be omitted if not required, and additional streams can also be added.

[0032] The term "wireless transmit / receive unit (WTRU)" referred to below includes, but is not limited to, user equipment (UE), mobile station, fixed or mobile subscriber unit, pager, cellular telephone...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Systems, methods, and instrumentalities are disclosed that may provide for integration of trusted OpenID (TOpenID) with OpenID. The authentication may be accomplished, in part, via Communications between a trusted ticket server on a UE and a network application function. The UE may retrieve platform validation data (e.g., from a trusted platform module on the UE). The UE may receive a platform verification in response to the platform validation data. The platform verification may indicate that the network application function has verified the platform validation data and the user. The platform verification may indicate that the platform validation data matches a previously generated reference value.

Description

[0001] Cross References to Related Applications [0002] This application is based upon and claims the benefit of priority from US Provisional Patent Application No. 61 / 297,446, filed January 22, 2010, the entire contents of which are hereby incorporated by reference. Background technique [0003] A basic use of Trusted Computing (TC) for authentication may be to provide credentials for authentication to a Trusted System (TS) protected by eg a hardware Trusted Platform Module (TPM). As a primary security feature, this can bind credentials to a specific TS. Application of such authentication in wireless networks may be via Extensible Authorization Procedure-Transport Layer Security (EAP-TLS). Using single sign-on (SSO) for TS may present potential security issues. Contents of the invention [0004] Systems, methods and means are disclosed that can provide Trusted Open ID (TOpenID) (as disclosed herein) integration with Open ID (OpenID). [0005] A user of a wireless device...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/00H04L29/06
CPCG06F21/57H04L2463/121H04L63/0807G06F2221/2115G06F21/335H04W12/06H04W12/069H04L9/32
Inventor I·查A·施米特A·莱切尔Y·C·沙阿
Owner INTERDIGITAL PATENT HLDG INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products