CN101729578A - Application service access authentication method and application service access authentication agent - Google Patents

Application service access authentication method and application service access authentication agent Download PDF

Info

Publication number
CN101729578A
CN101729578A CN200810171219A CN200810171219A CN101729578A CN 101729578 A CN101729578 A CN 101729578A CN 200810171219 A CN200810171219 A CN 200810171219A CN 200810171219 A CN200810171219 A CN 200810171219A CN 101729578 A CN101729578 A CN 101729578A
Authority
CN
China
Prior art keywords
applied business
password
access authentication
business
subelement
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN200810171219A
Other languages
Chinese (zh)
Other versions
CN101729578B (en
Inventor
王伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Zhitong World Technology Service Co. Ltd.
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN 200810171219 priority Critical patent/CN101729578B/en
Priority to PCT/CN2009/071728 priority patent/WO2010048805A1/en
Publication of CN101729578A publication Critical patent/CN101729578A/en
Application granted granted Critical
Publication of CN101729578B publication Critical patent/CN101729578B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention discloses an application service access authentication method and an application service access authentication agent. The application service access authentication method comprises the following steps: registering an application service and obtaining the passwords of the registered application service; receiving the access request which is sent by a supplying end of the registered application service and carries the password of the registered application service; and authenticating the access of the application service according to the passwords of the of the registered application service. Due to the adoption of the technical scheme, the access of the application service can be authenticated, the application service access authentication range is enlarged, and the openness of the telecommunication service capacity is improved.

Description

Applied business access authentication method and access authentication agent
Technical field
The present invention relates to communication technical field, particularly relate to a kind of applied business access authentication method and access authentication agent.
Background technology
Along with development of telecom technology, Kai Fang Telecom Services Market constantly enters new competitor day by day, in order to seek new business development space, telecom operators are except providing traditional network communication services, begun to provide ICT (Information Communication Technology, ICT (information and communication technology)) service.ICT is that information technology merges mutually with the communication technology and the new notion and the new technical field that form, and development ICT business has become the common recognition of information service provider and telecom operators.The key of ICT service is an open better telecommunication capability how, make the applied business that enriches on telecommunication capability and the Internet can be more convenient, more easily combine, thereby provide more colourful value-added telecom services to the user.
Parlay in 2005 tissue is released Parlay X Web Services standard, Parlay X WebServices be powerful but simply, highly abstract communication network capability standard member.No matter the developer whether possess telecommunications professional knowledge can both fast understanding Parlay X Web Services and utilize it to develop the application that differs from one another.Parlay/OSA (Parlay/Open Service Architecture, Parlay develops business structure) provides following access authentication authentication and SLA (Service Level Agreement, service-level agreement) policy control mechanism:
Applied business developer (or individual) can apply to become SP (Service Provider, service provider) to operator, and operator is that SP distributes SPID (service provider's sign) and password;
The SP applied business is when inserting telecommunication service ability interface functional entity, the character string of " SPID+ password+timestamp " form is encrypted, and the character string after will encrypting is passed to telecommunication service ability interface functional entity, the telecommunication service ability interface functional entity here, can be OSG (Open ServiceGateway, Open Service Gateway);
The SPID that telecommunication service ability interface functional entity transmits by SP inquires the password of SP, and the use cryptographic algorithm identical with SP carried out verification;
Telecommunication service ability interface functional entity can carry out access control to the application request of this SP according to the SLA strategy that sets in advance.For example, limit the access times of applied business in official hour etc. of this SP or this SP.
In realizing process of the present invention, the inventor finds that there are the following problems at least in the above prior art: by existing authentication mode, can only carry out authentication to the access of SP, therefore applied business developer (or individual) must at first apply to become SP and can insert communication network, the opening that this has limited the telecommunication service ability to a great extent is unfavorable for the development of value-added telecom services.In addition, (for example OSG) is directly exposed on the public network with telecommunication service ability interface functional entity, also has bigger potential safety hazard and performance pressure.
Summary of the invention
In view of this, the embodiment of the invention provides a kind of applied business access authentication method and access authentication agent, to realize directly single applied business being carried out access authentication, increases the opening of telecommunication service ability, and technical scheme is as follows:
A kind of applied business access authentication method, to using after business registers and obtain the password of applied business, this method comprises:
The access request that provides end to send of registered applied business is provided, carries the password of described applied business in the described access request,, carry out access authentication using business according to the password of described applied business.
A kind of applied business access authentication agent comprises:
The registration management unit is used for registering and obtain the password of applied business to using business;
The access authentication unit is used to receive the access request that provides end to send of registered applied business, carries the password of described applied business in the described access request, according to the password of described applied business, carries out access authentication to using business.
By using above technical scheme, can realize single applied business is carried out access authentication, the applied business exploitation that common developer carries out, also can directly apply for inserting the applied business access authentication agent and carry out the on probation of telecommunication service ability, enlarge the scope of access authentication, increased the opening of telecommunication service ability.In addition, finish access authentication control, can make telecommunication service ability interface functional entity not open directly into public network, improved fail safe, also alleviated the performance burden of telecommunication service ability interface functional entity by access authentication agent.
Description of drawings
Fig. 1 is for realizing the flow chart of the inventive method specific embodiment;
Fig. 2 is the structural representation of the applied business access authentication agent of the embodiment of the invention
Fig. 3 is the structural representation of the registration management unit of the embodiment of the invention;
Fig. 4 is the structural representation of the access authentication unit of the embodiment of the invention, and Fig. 4 a is respectively two kinds of different access authentication cellular construction schematic diagrames with Fig. 4 b;
Fig. 5 is the another kind of structural representation of the applied business access authentication agent of the embodiment of the invention;
Fig. 6 is the another kind of structural representation of the access authentication unit of the embodiment of the invention.
Embodiment
At first the applied business access authentication method to the embodiment of the invention describes:
To using after business registers and obtain the password of applied business, this method comprises:
The access request that provides end to send of registered applied business is provided, carries the password of described applied business in the described access request,, carry out access authentication using business according to the password of described applied business.
Below in conjunction with accompanying drawing, embodiment of the present invention are described in detail.
Figure 1 shows that the method flow diagram that the embodiment of the invention provides, specifically may further comprise the steps:
S101, the end that provides of applied business sends the applied business register requirement to the applied business access authentication agent, carries the number of the account that end is provided of applied business and the address of applied business in the described register requirement.
Described number of the account can be the SPID that operator distributes, and also can be phone number or E-mail address etc.The address of described applied business can this applied business of unique identification, specifically can be the pairing URL of applied business (Uniform Resource Locator, or the pairing forms such as " Internet protocol addresses: port numbers (IP:Port) " of applied business URL(uniform resource locator)).
S102, the applied business access authentication agent generates password according to the address of applied business.
The applied business access authentication agent is according to the address of applied business, generates password by the irreversible encryption algorithm, and the corresponding relation of holding number of the account that provides of the password that generated and applied business address information and applied business is provided.The mode of preserving is as shown in table 1, need to prove, the form of table 1 only is that schematically the embodiment of the invention is not limited this.
The applied business address information Password Number of the account
??URL1 ??Pwd1 ??Name1
??URL2 ??Pwd2 ??Name1
??IP:Port1 ??Pwd3 ??Name2
??IP:Port2 ??Pwd4 ??Name3
??...... ??...... ??......
Table 1
S103, the applied business access authentication agent sends the registration response to the end that provides of applied business, the password that is generated is sent to applied business end is provided.
The applied business access authentication agent can pass through modes such as note, Email, provides end with the password notice applied business that is generated.
S104, the end that provides of applied business sends the request of access to the applied business access authentication agent, carries the password of applied business in the described access request.
The applied business that request inserts should be the applied business of having registered, and for guaranteeing safe transmission, the HTTP (Hyper Text Transfer Protocol, HTML (Hypertext Markup Language)) that the request of access can be abideed by safety is sent to the service access authentication agent.
S105, service access authentication agent carry out access authentication according to described access request to using business.
In inserting request, carry the number of the account and the password of applied business, the service access authentication agent is according to described number of the account and password, inquire about pairing address information, for example, by table 1, can inquire number of the account " Name1 " is URL1 with the pairing address information of password " Pwd1 ".Mate the address of the applied business that the address information that inquired and described current request are inserted, if the match is successful, and the access authentication by described applied business then.
Need to prove that because described password is the address according to applied business, non-reversible algorithm generated in use, therefore, inserting request, also can only carry the password of applied business.The service access authentication agent also can be inquired about pairing address information only according to password, the coupling of the stepping row address of going forward side by side, the access authentication of realization applied business.
After authentication was passed through, access authentication agent can be sent to telecommunication service ability interface functional entity with the request that inserts, and for example OSG inserts communication network by OSG with described applied business.
Need to prove that in order to express easily, top embodiment has comprised the registration process (S101-S103) of applied business and the process (S104-S105) of access authentication simultaneously.In actual applications, if the applied business of preparing to insert was successfully registered, just can directly carry out the step of the access authentication of S104-S105.
In a preferred embodiment of the invention, after authentication is passed through, the service access authentication agent can also carry out policy configurations to the applied business by access authentication, for example, the applied business or the single applied business visit access times at the appointed time that limit all accesses can be set, as N time/day, or N time/month.If when the applied business request inserts, access authentication agent has carried out policy configurations to this applied business in advance, then in above-mentioned S105, can be after the match is successful at password, according to pre-configured strategy, described applied business is carried out strategy inspection,, think that then the access authentication of described applied business passes through if strategy inspection is passed through.
As seen, use said method, can realize single applied business is carried out access authentication, the applied business developer does not need to apply to become SP just can insert communication network, even the applied business that common developer carries out exploitation also can directly be applied for inserting the telecommunication service access authentication agent and carry out the on probation of telecommunication service ability, enlarged the scope of access authentication, increased the opening of telecommunication service ability, helped providing abundant more value-added service to the end user.In addition, finish access authentication control, can make telecommunication service ability interface functional entity not open directly into public network, improved fail safe, also alleviated the performance burden of telecommunication service ability interface functional entity by access authentication agent.
The embodiment of the invention also provides a kind of applied business access authentication agent, referring to shown in Figure 2, comprising:
Registration management unit 201 is used for registering and obtain the password of applied business to using business;
Access authentication unit 202 is used to receive the access request that provides end to send of registered applied business, carries the password of described applied business in the described access request, according to the password of described applied business, carries out access authentication to using business.
Referring to shown in Figure 3, described registration management unit 201 specifically can comprise:
Password generates subelement 301, is used to receive the application for registration that provides end to send of applied business, carries the number of the account that end is provided of applied business and the address of applied business in the described application for registration, according to the address generation password of described applied business;
Password Management subelement 302 is used to preserve described password and generates the password of subelement 301 generations and the corresponding relation that the end number of the account is provided of applied business address information and applied business;
Password sends subelement 303, is used for the password that described password generation subelement 302 generates is sent to the end that provides of applied business.
Shown in Fig. 4 a, described access authentication unit 202 specifically can comprise:
The first cipher inquiry subelement 401 is used to receive the access request that provides end to send of registered applied business, according to the password and the described corresponding relation that insert the applied business that carries in the request, inquires about pairing address information;
First password coupling subelement 402, the address information that is used for the described first cipher inquiry subelement 401 is inquired is mated with the address of described applied business, if the match is successful, then passes through the access authentication of described applied business.
In the access request that described password generation subelement 301 is received, also comprise the number of the account that end is provided of described applied business, the composition of then described access authentication unit can also specifically comprise shown in Fig. 4 b:
The second cipher inquiry subelement 403, be used to receive the access request that provides end to send of registered applied business, according to the number of the account that end is provided that inserts the applied business that carries in the request, the password and the described corresponding relation of applied business, inquire about pairing address information;
Second password coupling subelement 404, the address information that is used for the described second cipher inquiry subelement 403 is inquired is mated with the address of described applied business, if the match is successful, then passes through the access authentication of described applied business.
The embodiment of the invention also provides another kind of applied business access authentication agent, referring to shown in Figure 5, compares with applied business access authentication agent shown in Figure 2, and difference is that this access authentication agent further comprises:
Policy configurations unit 503 is used for the applied business by described access authentication unit 502 authentications is carried out policy configurations;
Wherein, registration management unit 501 is identical with above-mentioned registration management unit 201;
Referring to shown in Figure 6, access authentication unit 502 specifically can comprise:
Cipher inquiry subelement 601 is used to receive the access request that provides end to send of registered applied business, according to the password and the described corresponding relation that insert the applied business that carries in the request, inquires about pairing address information;
Password coupling subelement 602 is used for the address information that described cipher inquiry subelement is inquired and the address of described applied business and mates;
Strategy is checked subelement 603, if the match is successful for described password coupling subelement, then, described applied business is carried out strategy inspection according to the pre-configured strategy in described policy configurations unit 503, if strategy inspection is passed through, then pass through the access authentication of described applied business.
For device embodiment, because it is substantially corresponding to method embodiment, so describe fairly simplely, relevant part gets final product referring to the part explanation of method embodiment.Above-mentioned applied business access authentication agent can provide the functions such as registration management, access authentication and tactical management of applied business.Can realize single applied business is carried out access authentication, thereby enlarge the scope of access authentication, increase the opening of telecommunication service ability.When this authentication agent can be disposed as a module separately, can make telecommunication service ability interface functional entity not open directly into public network, improved fail safe, also alleviated the performance burden of telecommunication service ability interface functional entity.
Need to prove, the authentication agent that the embodiment of the invention provided both can be disposed as a module separately, also can be used as the extended function module of telecommunication service ability interface functional entity, registration management unit wherein, access authentication unit or policy configurations unit can be as the parts of telecommunication service ability interface functional entity function.Wherein said unit as the separating component explanation can or can not be physically to separate also, the parts that show as the unit can be or can not be physical locations also, promptly can be positioned at a place, perhaps also can be distributed on a plurality of network element.Can select wherein some or all of module to realize the purpose of present embodiment scheme according to the actual needs.Those of ordinary skills promptly can understand and implement under the situation of not paying performing creative labour.
One of ordinary skill in the art will appreciate that: all or part of step that realizes said method embodiment can be finished by the relevant hardware of program command, aforesaid program can be stored in the computer read/write memory medium, this program is carried out the step that comprises said method embodiment when carrying out; And aforesaid storage medium comprises: various media that can be program code stored such as ROM, RAM, magnetic disc or CD.
The above only is the specific embodiment of the present invention; should be pointed out that for those skilled in the art, under the prerequisite that does not break away from the principle of the invention; can also make some improvements and modifications, these improvements and modifications also should be considered as protection scope of the present invention.

Claims (13)

1. an applied business access authentication method is characterized in that, to using after business registers and obtain the password of applied business, this method comprises:
The access request that provides end to send of registered applied business is provided, carries the password of described applied business in the described access request,, carry out access authentication using business according to the password of described applied business.
2. method according to claim 1 is characterized in that, and is described to registration of using business and the password that obtains applied business, comprising:
The application for registration that provides end to send of described applied business is provided, carries the number of the account that end is provided of described applied business and the address of applied business in the described application for registration, generate described password according to the address of described applied business; The corresponding relation of holding number of the account that provides of the password generated and applied business address information and described applied business is provided, and the password that is generated is sent to the end that provides of described applied business.
3. method according to claim 2 is characterized in that, described password according to applied business carries out access authentication to using business, and specific implementation is:
According to password that carries in the described access request and described corresponding relation, inquire about pairing address information, the address information that inquired and the address of described applied business are mated, if the match is successful, the access authentication by described applied business then.
4. method according to claim 3 is characterized in that, also carries the number of the account that end is provided of described applied business in the described access request, and described method also comprises:
According to described number of the account the end that provides of described applied business is carried out authentication.
5. method according to claim 2 is characterized in that, this method further comprises, the applied business by access authentication is carried out policy configurations.
6. method according to claim 5 is characterized in that, described applied business by access authentication is carried out policy configurations, comprising: at the appointed time, allow the access times of described applied business to be configured.
7. according to claim 5 or 6 described methods, it is characterized in that described password according to applied business carries out access authentication to using business, specific implementation is:
According to described password and described corresponding relation, inquire about pairing address information, the address information that inquired and the address of described applied business are mated; If the match is successful, then according to pre-configured strategy, described applied business is carried out strategy inspection, if strategy inspection is passed through, then pass through the access authentication of described applied business.
8. an applied business access authentication agent is characterized in that, comprising:
The registration management unit is used for registering and obtain the password of applied business to using business;
The access authentication unit is used to receive the access request that provides end to send of registered applied business, carries the password of described applied business in the described access request, according to the password of described applied business, carries out access authentication to using business.
9. access authentication agent according to claim 8 is characterized in that, described registration management unit comprises:
Password generates subelement, is used to receive the application for registration that provides end to send of described applied business, carries the number of the account that end is provided of described applied business and the address of applied business in the described application for registration, generates described password according to the address of described applied business;
The Password Management subelement is used to preserve described password and generates the password of subelement generation and the corresponding relation that the end number of the account is provided of applied business address information and described applied business;
Password sends subelement, is used for the password that described password generation subelement generates is sent to the end that provides of described applied business.
10. access authentication agent according to claim 9 is characterized in that, described access authentication unit comprises:
The first cipher inquiry subelement is used to receive the access request that provides end to send of registered applied business, according to the password and the described corresponding relation that insert the applied business that carries in the request, inquires about pairing address information;
First password coupling subelement, the address information that is used for the described first cipher inquiry subelement is inquired is mated with the address of described applied business, if the match is successful, then passes through the access authentication of described applied business.
11. access authentication agent according to claim 9 is characterized in that, described password generates in the access request that subelement received, the number of the account that end is provided of also carrying described applied business, and then described access authentication unit comprises:
The second cipher inquiry subelement, be used to receive the access request that provides end to send of registered applied business, according to the number of the account that end is provided that inserts the applied business that carries in the request, the password and the described corresponding relation of applied business, inquire about pairing address information;
Second password coupling subelement, the address information that is used for the described second cipher inquiry subelement is inquired is mated with the address of described applied business, if the match is successful, then passes through the access authentication of described applied business.
12. access authentication agent according to claim 9 is characterized in that, this access authentication agent further comprises:
The policy configurations unit is used for the applied business by described access authentication unit authentication is carried out policy configurations.
13. access authentication agent according to claim 12 is characterized in that, described access authentication unit comprises:
The cipher inquiry subelement is used to receive the access request that provides end to send of registered applied business, according to the password and the described corresponding relation that insert the applied business that carries in the request, inquires about pairing address information;
Password coupling subelement is used for the address information that described cipher inquiry subelement is inquired and the address of described applied business and mates;
Strategy inspection subelement if the match is successful for described password coupling subelement, then according to the pre-configured strategy in described policy configurations unit, carries out strategy inspection to described applied business, if strategy inspection is passed through, then passes through the access authentication of described applied business.
CN 200810171219 2008-10-27 2008-10-27 Application service access authentication method and application service access authentication agent Expired - Fee Related CN101729578B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN 200810171219 CN101729578B (en) 2008-10-27 2008-10-27 Application service access authentication method and application service access authentication agent
PCT/CN2009/071728 WO2010048805A1 (en) 2008-10-27 2009-05-11 An application service accessing authenticity method and an application service accessing authenticity agent server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 200810171219 CN101729578B (en) 2008-10-27 2008-10-27 Application service access authentication method and application service access authentication agent

Publications (2)

Publication Number Publication Date
CN101729578A true CN101729578A (en) 2010-06-09
CN101729578B CN101729578B (en) 2013-01-23

Family

ID=42128211

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 200810171219 Expired - Fee Related CN101729578B (en) 2008-10-27 2008-10-27 Application service access authentication method and application service access authentication agent

Country Status (2)

Country Link
CN (1) CN101729578B (en)
WO (1) WO2010048805A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017166976A1 (en) * 2016-03-30 2017-10-05 华为技术有限公司 Method, device, and system for distributing and verifying application service

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102004024648A1 (en) * 2004-05-18 2005-12-22 Siemens Ag Method for authenticating a communication unit
CN100379315C (en) * 2005-06-21 2008-04-02 华为技术有限公司 Method for carrying out authentication on user terminal
CN1929370A (en) * 2005-09-05 2007-03-14 华为技术有限公司 Method and system for confirming identification using key when user accessing identification proxy
EP2115641A4 (en) * 2007-01-23 2012-08-01 Ascenna Mobile Inc Automated authentication process for application clients

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017166976A1 (en) * 2016-03-30 2017-10-05 华为技术有限公司 Method, device, and system for distributing and verifying application service

Also Published As

Publication number Publication date
CN101729578B (en) 2013-01-23
WO2010048805A1 (en) 2010-05-06

Similar Documents

Publication Publication Date Title
Pashalidis et al. A taxonomy of single sign-on systems
CN102143134B (en) Method, device and system for distributed identity authentication
US8590034B2 (en) Method, system and apparatus for providing stateful information redaction
CN103685282B (en) A kind of identity identifying method based on single-sign-on
US8019881B2 (en) Secure cookies
US7293098B2 (en) System and apparatus for storage and transfer of secure data on web
CN101331731B (en) Method, apparatus and program products for custom authentication of a principal in a federation by an identity provider
US6732277B1 (en) Method and apparatus for dynamically accessing security credentials and related information
US8893242B2 (en) System and method for pool-based identity generation and use for service access
GB2555496A (en) Establishing crytographic identity for an electronic device
US20070192843A1 (en) Disconnected credential validation using pre-fetched service tickets
CN101567893A (en) Method and system for uploading files in WEB application
CN107493291A (en) A kind of identity identifying method and device based on safety element SE
CN112468481A (en) Single-page and multi-page web application identity integrated authentication method based on CAS
JP4897503B2 (en) Account linking system, account linking method, linkage server device
CN105022966A (en) Database data encryption and decryption method and system
US9875371B2 (en) System and method related to DRM
CN108011717A (en) A kind of method, apparatus and system for asking user data
KR100948873B1 (en) Security and management device for database security and control method thereof
Alsaleh et al. Enhancing consumer privacy in the liberty alliance identity federation and web services frameworks
CN102714653B (en) For the system and method for accessing private digital content
CN101729578B (en) Application service access authentication method and application service access authentication agent
KR20100040413A (en) Method for authenticating single sign on id supporting openid
CN114090963A (en) Method and system for calling trust between micro-services
Reimair et al. CrySIL: Bringing Crypto to the Modern User

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20170818

Address after: 201, room 1, building A, No. 518053, front Bay Road, Qianhai, Shenzhen Shenzhen cooperation zone, Guangdong, China

Patentee after: Shenzhen Zhitong World Technology Service Co. Ltd.

Address before: 518129 Bantian HUAWEI headquarters office building, Longgang District, Guangdong, Shenzhen

Patentee before: Huawei Technologies Co., Ltd.

EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20100609

Assignee: Shannan City ran Technology Co., Ltd.

Assignor: Shenzhen Zhitong World Technology Service Co. Ltd.

Contract record no.: 2017440020096

Denomination of invention: Application service access authentication method and application service access authentication agent

Granted publication date: 20130123

License type: Common License

Record date: 20171208

Application publication date: 20100609

Assignee: Shenzhen Vimicro Tech Co. Ltd.

Assignor: Shenzhen Zhitong World Technology Service Co. Ltd.

Contract record no.: 2017440020097

Denomination of invention: Application service access authentication method and application service access authentication agent

Granted publication date: 20130123

License type: Common License

Record date: 20171211

CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20130123

Termination date: 20191027