GB201200991D0 - Method of authenticating a user - Google Patents

Method of authenticating a user

Info

Publication number
GB201200991D0
GB201200991D0 GBGB1200991.6A GB201200991A GB201200991D0 GB 201200991 D0 GB201200991 D0 GB 201200991D0 GB 201200991 A GB201200991 A GB 201200991A GB 201200991 D0 GB201200991 D0 GB 201200991D0
Authority
GB
United Kingdom
Prior art keywords
user
proxy
authentication
information
cookie
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GBGB1200991.6A
Other versions
GB2498566A (en
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
DOLPHIN SPEED NETWORKS Ltd
Original Assignee
DOLPHIN SPEED NETWORKS Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by DOLPHIN SPEED NETWORKS Ltd filed Critical DOLPHIN SPEED NETWORKS Ltd
Priority to GB1200991.6A priority Critical patent/GB2498566A/en
Publication of GB201200991D0 publication Critical patent/GB201200991D0/en
Publication of GB2498566A publication Critical patent/GB2498566A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/146Markers for unambiguous identification of a particular session, e.g. session cookie or URL-encoding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0281Proxies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0884Network architectures or network communication protocols for network security for authentication of entities by delegation of authentication, e.g. a proxy authenticates an entity to be authenticated on behalf of this entity vis-à-vis an authentication entity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/564Enhancement of application control based on intercepted application data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/168Implementing security features at a particular protocol layer above the transport layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

In an Internet Service Provider 2 via which a user at a terminal (102) outside its Local Area Network 1 may access remote resources 3 via an access node proxy server (200), users are identified by a terminal IP address embedded in their requests 1, which are analysed 2 to determine whether they contain preconfigured path information ( first information ) and a cookie ( second information ). If the user requires authentication 3, a response is returned 4, and the user requests authentication from entity (210) using a location header 5, which authenticates the user 6 and saves the cookie for future reauthentication, returning an authentication code 7 to present to the proxy 8. The proxy again checks 9 for first and second information and indicates the resource 10. The users browser sets a cookie 11 received from the proxy and sends a fresh request 12, whereupon the proxy check authentication 13, obtains the resource 14 and returns it to the user 15. The authentication entity may alternatively reside in the first LAN (110).
GB1200991.6A 2012-01-20 2012-01-20 Authenticating a user at a proxy using cookies Withdrawn GB2498566A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB1200991.6A GB2498566A (en) 2012-01-20 2012-01-20 Authenticating a user at a proxy using cookies

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB1200991.6A GB2498566A (en) 2012-01-20 2012-01-20 Authenticating a user at a proxy using cookies

Publications (2)

Publication Number Publication Date
GB201200991D0 true GB201200991D0 (en) 2012-03-07
GB2498566A GB2498566A (en) 2013-07-24

Family

ID=45840755

Family Applications (1)

Application Number Title Priority Date Filing Date
GB1200991.6A Withdrawn GB2498566A (en) 2012-01-20 2012-01-20 Authenticating a user at a proxy using cookies

Country Status (1)

Country Link
GB (1) GB2498566A (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2524812B (en) 2014-04-03 2016-07-20 Barclays Bank Plc User Authentication
CN105005596B (en) * 2015-07-02 2018-10-30 深圳市信锐网科技术有限公司 page display method and device
CN105425601A (en) * 2015-11-11 2016-03-23 青岛海尔空调器有限总公司 Household electrical appliance control method, client side and server

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU4824499A (en) * 1998-06-17 2000-01-05 Sun Microsystems, Inc. Method and apparatus for authenticated secure access to computer networks
US7954144B1 (en) * 2000-01-18 2011-05-31 Novell, Inc. Brokering state information and identity among user agents, origin servers, and proxies
US8887233B2 (en) * 2005-04-08 2014-11-11 Netapp, Inc. Cookie-based acceleration of an authentication protocol
EP2241081B1 (en) * 2008-01-26 2018-05-02 Citrix Systems, Inc. Systems and methods for fine grain policy driven cookie proxying

Also Published As

Publication number Publication date
GB2498566A (en) 2013-07-24

Similar Documents

Publication Publication Date Title
JP5739023B2 (en) System and method using a web proxy server to access a device having an assigned network address
CN104158808B (en) Portal authentication method and its device based on APP applications
JP6526248B2 (en) Server and program
CN104144163B (en) Auth method, apparatus and system
US9501777B1 (en) Systems and methods for MAC address tracking for a mobile device
US10111060B2 (en) Client app service on mobile network
CN102739684B (en) Portal authentication method based on virtual IP address, and server thereof
GB0520836D0 (en) Remote access to resources
WO2017177691A1 (en) Portal authentication method and system
CN104580553B (en) Method and device for identifying network address translation equipment
CN105141621A (en) Network access monitoring method and device
WO2014000303A1 (en) Method for receiving message, and deep packet inspection device and system
US20150019721A1 (en) Method and system for correlation of internet application domain identities and network device identifiers
TW201631510A (en) Methods, apparatus, and systems for identity authentication
US10116535B1 (en) Monitoring internet usage on home networks of panelist users using a measurement device
WO2015077586A1 (en) Methods and methods apparatus for statistical mobile device identification
GB201200991D0 (en) Method of authenticating a user
WO2008062353A3 (en) Method for authenticating nomadic user domains and nodes therefor
CN110892697B (en) Acceleration system for assisting API call processing
JP2010231396A (en) Communication system, communication device and authentication device
KR20120044381A (en) Method and system for subscriber to log in internet content provider(icp) website in identity/location separation network and login device thereof
CN103716804A (en) Wireless data communication network user network behavior analyzing method, device and system
EP3300335B1 (en) Device and method for data packet processing
WO2014187423A1 (en) Method and device for processing identification information
CN104468589A (en) Method and system for achieving lightweight-level conversation

Legal Events

Date Code Title Description
WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)