AU2002321332A1 - User authentication between resources in a data network - Google Patents
User authentication between resources in a data networkInfo
- Publication number
- AU2002321332A1 AU2002321332A1 AU2002321332A AU2002321332A AU2002321332A1 AU 2002321332 A1 AU2002321332 A1 AU 2002321332A1 AU 2002321332 A AU2002321332 A AU 2002321332A AU 2002321332 A AU2002321332 A AU 2002321332A AU 2002321332 A1 AU2002321332 A1 AU 2002321332A1
- Authority
- AU
- Australia
- Prior art keywords
- resources
- data network
- user authentication
- authentication
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/04—Protocols specially adapted for terminals or networks with limited capabilities; specially adapted for terminal portability
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/30—Definitions, standards or architectural aspects of layered protocol stacks
- H04L69/32—Architecture of open systems interconnection [OSI] 7-layer type protocol stacks, e.g. the interfaces between the data link level and the physical level
- H04L69/322—Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions
- H04L69/329—Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions in the application layer [OSI layer 7]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/121—Timestamp
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FI20020369A FI20020369A0 (en) | 2002-02-26 | 2002-02-26 | Uses authentication between resources in a computer network |
FI20020369 | 2002-02-26 | ||
PCT/FI2002/000572 WO2003073240A1 (en) | 2002-02-26 | 2002-06-27 | User authentication between resources in a data network |
Publications (1)
Publication Number | Publication Date |
---|---|
AU2002321332A1 true AU2002321332A1 (en) | 2003-09-09 |
Family
ID=8563333
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AU2002321332A Abandoned AU2002321332A1 (en) | 2002-02-26 | 2002-06-27 | User authentication between resources in a data network |
Country Status (3)
Country | Link |
---|---|
AU (1) | AU2002321332A1 (en) |
FI (1) | FI20020369A0 (en) |
WO (1) | WO2003073240A1 (en) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CA2451313C (en) * | 2003-11-28 | 2011-10-18 | Nicolas Nedkov | Systems and methods for controlling access to a public data network from a visited access provider |
US8245270B2 (en) | 2005-09-01 | 2012-08-14 | Microsoft Corporation | Resource based dynamic security authorization |
US8290819B2 (en) | 2006-06-29 | 2012-10-16 | Microsoft Corporation | Electronic commerce transactions over a peer-to-peer communications channel |
WO2008034252A2 (en) * | 2006-09-20 | 2008-03-27 | Mobivox Corp. | Method and system for triggering internet applications using messages |
US10019570B2 (en) | 2007-06-14 | 2018-07-10 | Microsoft Technology Licensing, Llc | Protection and communication abstractions for web browsers |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5812776A (en) * | 1995-06-07 | 1998-09-22 | Open Market, Inc. | Method of providing internet pages by mapping telephone number provided by client to URL and returning the same in a redirect command by server |
US6189096B1 (en) * | 1998-05-06 | 2001-02-13 | Kyberpass Corporation | User authentification using a virtual private key |
-
2002
- 2002-02-26 FI FI20020369A patent/FI20020369A0/en unknown
- 2002-06-27 AU AU2002321332A patent/AU2002321332A1/en not_active Abandoned
- 2002-06-27 WO PCT/FI2002/000572 patent/WO2003073240A1/en not_active Application Discontinuation
Also Published As
Publication number | Publication date |
---|---|
FI20020369A0 (en) | 2002-02-26 |
WO2003073240A1 (en) | 2003-09-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AU2003250418A1 (en) | A data network, user terminal and method for providing recommendations | |
AU2003295569A1 (en) | Facilitating communications between computer users across a network | |
AU2003250645A1 (en) | Differentiated accounting in a packet data network | |
AU2003261151A1 (en) | Interface selection in a wireless communication network | |
AU2002210969A1 (en) | User authentication method in network | |
AU2003243345A1 (en) | Communicating medical information in a communication network | |
AU2003297828A1 (en) | Resource management on a personal area network | |
TWI315625B (en) | Authentication in a communication system | |
AU2003262913A1 (en) | Communication management using a token action log | |
AU2003210576A1 (en) | A user authentication system and methods thereof cross reference to related applications. | |
AU2002356491A1 (en) | A secure domain in a network | |
GB2386978B (en) | Data communications network | |
AU2003287295A1 (en) | Resource allocation in a wireless communication system | |
AU2002337411A1 (en) | Routing data packets in a compressed-header domain | |
AU2002326084A1 (en) | Identification of unused resources in a packet data network | |
AU4595501A (en) | Data entry user interface | |
AU2003282615A1 (en) | A data management interface and related methods | |
AU2003221668A1 (en) | Pre-authenticated communication within a secure computer network | |
AU2003288913A1 (en) | Context information management in a communication device | |
AUPQ733600A0 (en) | A method of indicating the origin of a mobile user in a data network | |
AU2003243483A1 (en) | Token bucket parameters computation for guaranteed services in a data network | |
AU2002252883A1 (en) | Software deployment in a data communications network | |
AU2003211829A1 (en) | Data transmission method in the wireless access network | |
GB0201898D0 (en) | Authorising provision of data in a communications network | |
AU2003278926A1 (en) | Constrained user interface in a communications network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
MK6 | Application lapsed section 142(2)(f)/reg. 8.3(3) - pct applic. not entering national phase |