CN1248449C - Layered insertion identification method using third party additional identification - Google Patents

Layered insertion identification method using third party additional identification Download PDF

Info

Publication number
CN1248449C
CN1248449C CNB2004100731427A CN200410073142A CN1248449C CN 1248449 C CN1248449 C CN 1248449C CN B2004100731427 A CNB2004100731427 A CN B2004100731427A CN 200410073142 A CN200410073142 A CN 200410073142A CN 1248449 C CN1248449 C CN 1248449C
Authority
CN
China
Prior art keywords
management entity
access
authentication
message
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB2004100731427A
Other languages
Chinese (zh)
Other versions
CN1588854A (en
Inventor
李金成
章忠威
万晓辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Iwncomm Co Ltd
Original Assignee
China Iwncomm Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Iwncomm Co Ltd filed Critical China Iwncomm Co Ltd
Priority to CNB2004100731427A priority Critical patent/CN1248449C/en
Publication of CN1588854A publication Critical patent/CN1588854A/en
Application granted granted Critical
Publication of CN1248449C publication Critical patent/CN1248449C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The present invention relates to the technical field of flexible IP networks, particularly to a layered access authentication information method using the additional authentication information of a third party, which has the steps: 1) a management entity is accessed to provide initial additional authentication; 2) a communication end point is used for forced authentication; 3) periodic random authentication is carried out after the management entity is accessed to provide the initial additional authentication; authentication in the access management entity uses a one-way increase random number sequence in authentication information. The method can ensure the integrity and the identity authenticity of the registration information processed by the access management entity, a basic domain management entity and an extension domain management entity in the technical field of flexible IP networks, and simultaneously can increase the work efficiency of a system; the requirements of the system under large working load are satisfied.

Description

A kind of layer-specific access authentication method that adopts third party's Additional Verification
Technical field
The invention belongs to the IP network technical field, flexible IP network technical field particularly, specifically a kind of layer-specific access authentication method that adopts third party's Additional Verification.The said flexible IP network technology system of the present invention, be meant by the ground field management entity, the extending domain management entity, the access-in management entity, mobile node constitutes, make mobile node in the local area network (LAN) can be in the Global Internet scope arbitrarily roaming, and guarantee that mobile node can realize interactive access with its local area network (LAN) at any time.
Background technology
In the mobile IP technology, mobile node is roamed at field network, and the strong proof of identity need be provided to home agent and whole system, and mobile agent just can provide agency service to it, and the node of avoiding palming off identity influences the fail safe of whole system; Simultaneously, mobile node needs further to guarantee the information integrity of the registration message of transmission under the prerequisite that guarantees identity safety, avoid being distorted by the people.
Usually, the authentication of mobile IP system can use digital signature and informative abstract technology to solve, and the integrity protection of packet can adopt the informative abstract technology to solve, and the informative abstract technology can use symmetric key or unsymmetrical key mode to carry out.But it is slow that unsymmetrical key carries out the informative abstract arithmetic speed, is difficult to satisfy the mobile IP system application need of large user's amount.
In the message process of mobile IP, the normally authentication layer by layer stage by stage in the transport process of information of traditional auth method, i.e. A---B message authentication, B---C message authentication, this method is subjected to the attack of go-between's mode easily; In order to increase the reliability of authentication, can give A---C increases a directly authentication, but so, the packet of each transmission all needs to increase the calculating of an authentication summary info.
Provided basic authentication message extended format in the relevant RFC document of mobile IP system and several basic authentication is right, in registration message, these authentications are to can selectively using, usually mobile node---the authentication extension of home agent is necessary, other expand to optional, complicated situation will form the combined situation that authenticates in twos down, and this authentication extension has increased a large amount of additional lengths to registration message.
In the mobile IP system of practical application type, number of users is very big, be easy to reach several ten thousand, hundreds of thousands is until the scale of 1,000,000 orders of magnitude, this moment is in order to guarantee the fail safe of system, to the authentication calculations workload of central processor CPU increase and the authentication message conveying capacity that increases to network all will be huge, how effectively guarantee that raising the efficiency under the fail safe prerequisite is the key technology of system.
Summary of the invention:
Problem to be solved by this invention provides a kind of layer-specific access authentication method of the third party's of employing Additional Verification, this method can guarantee the integrality and the identity authenticity of the log-on message of access-in management entity in the flexible IP network technology system, ground field management entity and extending domain management entity handles, simultaneously can improve system works efficient again, satisfy the requirement of system under big load operation.
The technical scheme that addresses the above problem is: the layer-specific access authentication method of a kind of third party's of the employing Additional Verification that is provided is:
1) communication end point carries out forcible authentication;
2) the access-in management entity provides initial Additional Verification;
3) the access-in management entity provides initial Additional Verification only periodically to carry out random authentication later on;
Use the unidirectional random number sequence that increases progressively in the authentication message in the above-mentioned access-in management entity authentication, the security breaches that discontinuous authentication causes in the middle of can avoiding like this prevent from the Replay Attack of authentication message and prevent to authenticate in the rest periods to cheat from third-party identity spoofing and information.
The identifying algorithm that above-mentioned communication end point carries out forcible authentication can adopt shared key mode, utilizes unidirectional increasing function computing information summary, and cipher key shared provides adopting configuration mode:
1) being provided with on the ground field management entity that the ground field management entity---the access-in management entity key is right, and giving each mobile node setting or use the dynamic assignment mode that the ground field management entity is set---it is right that mobile node is shared key;
2) the access-in management entity is set on the access-in management entity---ground field management entity, access-in management entity---the shared key of extending domain management entity is right;
3) the access-in management entity being set on the extending domain management entity---it is right that the extending domain management entity is shared key.
Identifying algorithm of the present invention adopts shared key mode, utilizes one-way function computing information summary, because the symmetrical expression algorithm has higher relatively speed, has guaranteed the real-time of digest calculations and checking.Because the present invention has kept strict ground field management entity---the authentication requesting of mobile node, so the periodic authentication of access-in management entity requires can not have influence on the fail safe of whole system.The main effect that the third party of access-in management entity authenticates is on the basis that guarantees original identity and data integrity, guarantees that system can be owing to the system handles load that Replay Attack, Denial of Service attack etc. causes is excessive.
Description of drawings:
Fig. 1 is that flexible IP network technical certification architecture and authentication are shared key to schematic diagram.
Fig. 2 is the verification process schematic diagram of login request message in transport process.
Fig. 3 is the verification process schematic diagram of registration reply message in transport process.
Embodiment:
Fig. 1 has provided flexible IP network technical certification architecture and the right schematic diagram of key is shared in authentication, and it has described the frame structure of flexible IP network technology system, and the authenticate key between different entities is shared situation in the flexible IP network technology system.Comprise mainly in the authentication system: the ground field management entity that---the access-in management entity key is to, extending domain management entity---access-in management entity key to, ground field management entity---, and the mobile node key is right; Number among the figure: 1---the ground field management entity, 2---the extending domain management entity, 3---the access-in management entity, 4---mobile node, 5---internet/wide area network.
Fig. 2 has provided the verification process of login request message in transport process, has described the interpolation and the proof procedure of register requirement authentication extension between different nodes that mobile node sends.
Fig. 3 provided the verification process of registration reply message in transport process, described the authentication message that registration reply that the ground field management entity sends transmits and add and proof procedure between different nodes.
Below with reference to Fig. 1, Fig. 2, Fig. 3 content of the present invention is described in further detail:
1) communication end point carries out forcible authentication:
1.1) the own affiliated access-in management entity of configuration on the ground field management entity, adopt shared key mode that the ground field management entity is set---the shared key of access-in management entity, should share cipher key configuration simultaneously to the access-in management entity, share key as both authentications;
1.2) adopt on the ground field management entity method of salary distribution immediately that the subscriber authentication key of each mobile node is set, this key is by the automated randomized generation of computer, user and keeper are maintained secrecy, and key guarantees to share the privacy of key on the credible link of ground field network when producing;
1.3) configuration access-in management entity---the shared key of extending domain management entity authentication on access-in management entity and the extending domain management entity, be used for the access-in management object authentication and whether transmit the next extending domain management entity of register requirement, and confirm the integrality of identity and assurance message through mandate;
1.4) when mobile node was registered, structure also sent message, in order to guarantee the integrality of registration message, and the identity of proof oneself, mobile node utilizes mobile node---and the shared key of ground field management entity is to authenticating.Authentication method is that whole registration message is utilized unidirectional increasing function computing information summary, simultaneously informative abstract is encrypted, as the identity signature of mobile node;
1.5) registration message behind the signature sends on the extending domain management entity, whether the inspection of extending domain management entity has the mobile access-in management entity of mobile node request to share key, if do not have, does not directly do authentication, transmits message and gives the access-in management entity; If the extending domain management entity has been preserved the shared authenticate key of corresponding access-in management entity, the extending domain management entity carries out the calculating of eap-message digest at the content part of registration message (do not comprise mobile node---ground field management entity part), simultaneously eap-message digest is also encrypted, send as the identity signature.
2) the access-in management entity provides initial Additional Verification:
2.1) the access-in management entity obtains also checking whether need to verify the access-in management entity behind the registration message---the expansion of extending domain management entity authentication, requirement according to the expansion of registration message judges whether the needs authentication, if desired, from share key, extract key, the decrypt summary, simultaneously calculate the summary that makes new advances, prove the integrality of data according to the text of registration message (do not comprise mobile node---ground field management entity part);
2.2) then the access-in management entity utilize the access-in management entity---the ground field management entity is shared key and is carried out new authentication, the authentication information that calculates adds the registration message back to, arrives the ground field management entity and carries out mobile access-in management entity---the authentication of ground field management entity;
2.3) after the ground field management entity passes through the authentication that inserts management entity, reexamine the ground field management entity---the authentication information of mobile node, judge whether to be the register requirement that real mobile node sends, checking sends registration reply message by the back;
2.4) reverse each management entity through flexible IP network technology system of registration reply message, authenticate, transmit, arrive mobile node, mobile node is verified the authentication information that the ground field management entity is additional at last, whether the complete sum identity is legal for acknowledge message.
3) after the access-in management entity authenticates ground field management entity and extending domain management entity identities first, according to the cycle of setting, just termly register requirement, response message are authenticated, and needn't all increase at every turn and check authentication message later on.---ground field management entity, access-in management entity---registration message between the extending domain management entity double probate at the access-in management entity, the access-in management entity is only checked whether legal getting final product of its unidirectional message SN that increases progressively, narrow examination waits for that the ground field management entity carries out, to avoid the access-in management entity to carry out a large amount of authentication message computings and to increase the data volume that network transmits.
4) authentication first of access-in management entity and cycle authentication have guaranteed that the registration message that it is handled is that legal extending domain management entity and ground field management entity transmits, and avoid the problem of divulging a secret of being pretended to be identity to cause by other main frames between the three.The a large amount of illegal registration message of avoiding simultaneously not having artis impacts access-in management entity and ground field management entity, guarantees the fail safe of system.
5) after mobile node switches the extension field network or restarts, will carry out authentication again, periodic in addition authentication can reduce the burden that authentication message causes in the time of one-period, and the while can increase the detectability to dangerous registration message again.
The present invention utilizes third-party access-in management entity, the authentication that adds, this authentication is simultaneously carried out with the some cycles frequency, has both guaranteed the fail safe of system, simultaneously having kept good system efficient again, is a kind of good solution of flexible IP network technology system practicability.
Other relevant technical terms involved in the present invention is as follows:
1 ground field management entity: the network equipment that has a port to link to each other with the basic network territory at mobile node place, for the mobile node that roaming takes place provides purview certification and identity agency.
2 extending domain management entities: the network equipment on the extended network territory of mobile node, for mobile node is transmitted authentication message and packet.
3 access-in management entities: having can be at the network equipment of the IP address of internet route, and it authenticates and transmit the trunking of mobile node packet to the mobile node identity between ground field management entity and extending domain management entity.
4 basic network territories: mobile node is roamed the network at preceding place.
5 extended network territories: the network that mobile node roaming back is arrived.
6 IP tunnels: be meant that an IP-based packet is encapsulated in the path of process when transmitting in the net load of another IP packet.
7 tunneling techniques: refer to comprise data encapsulation, the overall process in wrapping in is conciliate in transmission.
8 mobile nodes: can with the position of entering the Internet from a link switchover to another link, and still keep all ongoing communications, and only use the equipment of original fixed ip address.

Claims (3)

1, a kind of layer-specific access authentication method that adopts third party's Additional Verification is characterized in that:
1) communication end point carries out forcible authentication;
It is to adopt shared key mode that communication end point carries out forcible authentication, utilizes unidirectional increasing function computing information summary, and cipher key shared provides adopting configuration mode:
1.1) be provided with on the ground field management entity that the ground field management entity---the access-in management entity key is right, and give each mobile node setting or use the dynamic assignment mode that the ground field management entity is set---it is right that mobile node is shared key;
1.2) access-in management entity---ground field management entity, access-in management entity---is set on the access-in management entity, and the shared key of extending domain management entity is right;
1.3) the access-in management entity is set on the extending domain management entity---it is right that the extending domain management entity is shared key;
2) the access-in management entity provides initial Additional Verification;
2.1) the access-in management entity obtains checking whether need to verify the access-in management entity behind the registration message---the expansion of extending domain management entity authentication, requirement according to the expansion of registration message judges whether the needs authentication, if desired, from share key, extract key, the decrypt summary, text according to registration message calculates the summary that makes new advances simultaneously, proves the integrality of data;
2.2) then the access-in management entity utilize the access-in management entity---the ground field management entity is shared key and is carried out new authentication, the authentication information that calculates adds the registration message back to, arrives the ground field management entity and carries out mobile access-in management entity---the authentication of ground field management entity;
2.3) after the ground field management entity passes through the authentication that inserts management entity, reexamine the ground field management entity---the authentication information of mobile node, judge whether to be the register requirement that real mobile node sends, checking sends registration reply message by the back;
2.4) reverse each management entity through flexible IP network technology system of registration reply message, authenticate, transmit, arrive mobile node, mobile node is verified the authentication information that the ground field management entity is additional at last, whether the complete sum identity is legal for acknowledge message;
3) the access-in management entity provides initial Additional Verification only periodically to carry out random authentication later on;
Utilize the unidirectional random number sequence that increases progressively in the authentication message in the above-mentioned access-in management entity authentication.
2, authentication method as claimed in claim 1 is characterized in that said communication end point carries out forcible authentication and is:
1) the own affiliated access-in management entity of configuration on the ground field management entity, adopt shared key mode that the ground field management entity is set---the shared key of access-in management entity, should share cipher key configuration simultaneously to the access-in management entity, share key as both authentications;
2) on the ground field management entity, adopt the method for salary distribution immediately that the subscriber authentication key of each mobile node is set, this key is by the automated randomized generation of computer, user and keeper are maintained secrecy, and key guarantees to share the privacy of key on the credible link of ground field network when producing;
3) configuration access-in management entity---the shared key of extending domain management entity authentication on access-in management entity and extending domain management entity, be used for the access-in management object authentication and whether transmit the next extending domain management entity of register requirement, and confirm the integrality of identity and assurance message through mandate;
When 4) mobile node is registered, structure also sends message, in order to guarantee the integrality of registration message, and the identity of proof oneself, mobile node utilizes mobile node---and the shared key of ground field management entity is to authenticating, authentication method is that whole registration message is utilized unidirectional increasing function computing information summary, simultaneously informative abstract is encrypted, as the identity signature of mobile node;
5) registration message behind the signature sends on the extending domain management entity, and whether the inspection of extending domain management entity has the mobile access-in management entity of mobile node request to share key, if do not have, does not directly do authentication, transmits message and gives the access-in management entity; If the extending domain management entity has been preserved the shared authenticate key of corresponding access-in management entity, the extending domain management entity carries out the calculating of eap-message digest at the content part of registration message, simultaneously eap-message digest is also encrypted, and sends as the identity signature.
3, authentication method as claimed in claim 1 or 2, it is characterized in that said access-in management entity provides initial Additional Verification only periodically to carry out random authentication later on and is meant: after the access-in management entity authenticates ground field management entity and extending domain management entity identities first, later on according to the cycle of setting, just termly register requirement, response message are authenticated, and needn't all increase at every turn and check authentication message;---ground field management entity, access-in management entity---registration message between the extending domain management entity double probate, access-in management entity only checks whether its unidirectional message SN that increases progressively is legal at the access-in management entity.
CNB2004100731427A 2004-09-30 2004-09-30 Layered insertion identification method using third party additional identification Expired - Fee Related CN1248449C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2004100731427A CN1248449C (en) 2004-09-30 2004-09-30 Layered insertion identification method using third party additional identification

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2004100731427A CN1248449C (en) 2004-09-30 2004-09-30 Layered insertion identification method using third party additional identification

Publications (2)

Publication Number Publication Date
CN1588854A CN1588854A (en) 2005-03-02
CN1248449C true CN1248449C (en) 2006-03-29

Family

ID=34604723

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2004100731427A Expired - Fee Related CN1248449C (en) 2004-09-30 2004-09-30 Layered insertion identification method using third party additional identification

Country Status (1)

Country Link
CN (1) CN1248449C (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101326328B1 (en) * 2006-04-25 2013-11-11 인터디지탈 테크날러지 코포레이션 High-throughput channel operation in a mesh wireless local area network
CN101296086B (en) * 2008-06-18 2010-12-08 成都市华为赛门铁克科技有限公司 Method, system and device for access authentication
CN106789032B (en) * 2017-01-16 2019-12-10 西安电子科技大学 Single password three-party authentication method for secret sharing between server and mobile equipment

Also Published As

Publication number Publication date
CN1588854A (en) 2005-03-02

Similar Documents

Publication Publication Date Title
Hameed et al. Security issues in IoT: A survey
Yang et al. Provable data possession of resource-constrained mobile devices in cloud computing
CN1191703C (en) Safe inserting method of wide-band wireless IP system mobile terminal
CN1124759C (en) Safe access method of mobile terminal to radio local area network
CN112039870B (en) Privacy protection-oriented vehicle-mounted network authentication method and system based on block chain
CN109981639B (en) Block chain based distributed trusted network connection method
WO2020140413A1 (en) Data management method and system for smart city evaluation indicators
CN100561919C (en) A kind of broadband access user authentication method
CN108429730A (en) Feedback-less safety certification and access control method
CN100344208C (en) Identification method for preventing replay attack
CN104683306A (en) Safe and controllable internet real-name certification mechanism
CN115189913B (en) Data message transmission method and device
CN111447283A (en) Method for realizing information security of power distribution station room system
CN115038084A (en) Decentralized trusted access method for cellular base station
CN1728637A (en) Method for identifying physical uniqueness of networked terminal, and access authentication system for terminals
CN1248449C (en) Layered insertion identification method using third party additional identification
CN111586017A (en) Method and device for authenticating communication user
CN1225941C (en) Roaming access method of mobile node in radio IP system
CN114584975B (en) SDN-based anti-quantum satellite network access authentication method
CN112995139B (en) Trusted network, trusted network construction method and trusted network construction system
CN101370012A (en) Equity computation faith mechanism construction method based on proxy
CN101217532A (en) An anti-network attack data transmission method and system
Tao The identity authentication of Wi-Fi system based on network security
CN100340080C (en) Method for realizing movable node and basic field managing entity key consultation
Ma et al. An efficient authentication protocol for WLAN mesh networks in trusted environment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C56 Change in the name or address of the patentee

Owner name: XI'AN IWNCOMM CO., LTD.

Free format text: FORMER NAME: XIDIAN JIETONG WIRELESS NETWORK COMMUNICATION CO LTD, XI'AN

CP01 Change in the name or title of a patent holder

Address after: 710075 4F.C building, No. 12, No. two, hi tech Road, Shaanxi, Xi'an

Patentee after: CHINA IWNCOMM Co.,Ltd.

Address before: 710075 4F.C building, No. 12, No. two, hi tech Road, Shaanxi, Xi'an

Patentee before: CHINA IWNCOMM Co.,Ltd.

EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20050302

Assignee: BEIJING ZHIXIANG TECHNOLOGY Co.,Ltd.

Assignor: CHINA IWNCOMM Co.,Ltd.

Contract record no.: 2016610000049

Denomination of invention: Layered insertion identification method using third party additional identification

Granted publication date: 20060329

License type: Common License

Record date: 20161117

LICC Enforcement, change and cancellation of record of contracts on the licence for exploitation of a patent or utility model
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20050302

Assignee: BEIJING FENGHUO LIANTUO TECHNOLOGY Co.,Ltd.

Assignor: CHINA IWNCOMM Co.,Ltd.

Contract record no.: 2017610000001

Denomination of invention: Layered insertion identification method using third party additional identification

Granted publication date: 20060329

License type: Common License

Record date: 20170106

LICC Enforcement, change and cancellation of record of contracts on the licence for exploitation of a patent or utility model
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20050302

Assignee: SHANGHAI YU FLY MILKY WAY SCIENCE AND TECHNOLOGY CO.,LTD.

Assignor: CHINA IWNCOMM Co.,Ltd.

Contract record no.: 2017610000005

Denomination of invention: Layered insertion identification method using third party additional identification

Granted publication date: 20060329

License type: Common License

Record date: 20170317

EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20050302

Assignee: Beijing next Technology Co.,Ltd.

Assignor: CHINA IWNCOMM Co.,Ltd.

Contract record no.: 2017610000014

Denomination of invention: Layered insertion identification method using third party additional identification

Granted publication date: 20060329

License type: Common License

Record date: 20170601

EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20050302

Assignee: HYTERA COMMUNICATIONS Corp.,Ltd.

Assignor: CHINA IWNCOMM Co.,Ltd.

Contract record no.: 2017610000015

Denomination of invention: Layered insertion identification method using third party additional identification

Granted publication date: 20060329

License type: Common License

Record date: 20170602

EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20050302

Assignee: Beijing Hua Xinaotian network technology Co.,Ltd.

Assignor: CHINA IWNCOMM Co.,Ltd.

Contract record no.: 2017610000028

Denomination of invention: Layered insertion identification method using third party additional identification

Granted publication date: 20060329

License type: Common License

Record date: 20171122

EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20050302

Assignee: ALPINE ELECTRONICS, Inc.

Assignor: CHINA IWNCOMM Co.,Ltd.

Contract record no.: 2017990000497

Denomination of invention: Layered insertion identification method using third party additional identification

Granted publication date: 20060329

License type: Common License

Record date: 20171222

EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20050302

Assignee: SHENZHEN RAKWIRELESS TECHNOLOGY CO.,LTD.

Assignor: CHINA IWNCOMM Co.,Ltd.

Contract record no.: 2018610000006

Denomination of invention: Layered insertion identification method using third party additional identification

Granted publication date: 20060329

License type: Common License

Record date: 20180226

EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20050302

Assignee: BLACKSHARK TECHNOLOGIES (NANCHANG) Co.,Ltd.

Assignor: CHINA IWNCOMM Co.,Ltd.

Contract record no.: 2018610000012

Denomination of invention: Layered insertion identification method using third party additional identification

Granted publication date: 20060329

License type: Common License

Record date: 20180404

EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20050302

Assignee: Sony Mobile Communications AB

Assignor: CHINA IWNCOMM Co.,Ltd.

Contract record no.: 2018990000306

Denomination of invention: Layered insertion identification method using third party additional identification

Granted publication date: 20060329

License type: Common License

Record date: 20181123

EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20050302

Assignee: SHENZHEN UCLOUDLINK NEW TECHNOLOGY Co.,Ltd.

Assignor: CHINA IWNCOMM Co.,Ltd.

Contract record no.: X2019610000002

Denomination of invention: Layered insertion identification method using third party additional identification

Granted publication date: 20060329

License type: Common License

Record date: 20191010

EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20050302

Assignee: HANGZHOU STRONG EDUCATION TECHNOLOGY Co.,Ltd.

Assignor: China IWNCOMM Co.,Ltd.

Contract record no.: X2021610000001

Denomination of invention: A layered access authentication method using third party additional authentication

Granted publication date: 20060329

License type: Common License

Record date: 20210125

EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20050302

Assignee: EKC communication technology (Shenzhen) Co.,Ltd.

Assignor: China IWNCOMM Co.,Ltd.

Contract record no.: X2021610000008

Denomination of invention: A layered access authentication method using third party additional authentication

Granted publication date: 20060329

License type: Common License

Record date: 20210705

EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20050302

Assignee: Guangzhou nengchuang Information Technology Co.,Ltd.

Assignor: CHINA IWNCOMM Co.,Ltd.

Contract record no.: X2021610000011

Denomination of invention: A layered access authentication method using third-party additional authentication

Granted publication date: 20060329

License type: Common License

Record date: 20211104

Application publication date: 20050302

Assignee: Xinruiya Technology (Beijing) Co.,Ltd.

Assignor: CHINA IWNCOMM Co.,Ltd.

Contract record no.: X2021610000012

Denomination of invention: A layered access authentication method using third-party additional authentication

Granted publication date: 20060329

License type: Common License

Record date: 20211104

EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20050302

Assignee: SHENZHEN ZHIKAI TECHNOLOGY Co.,Ltd.

Assignor: CHINA IWNCOMM Co.,Ltd.

Contract record no.: X2022610000005

Denomination of invention: A layered access authentication method using third party additional authentication

Granted publication date: 20060329

License type: Common License

Record date: 20220531

EE01 Entry into force of recordation of patent licensing contract
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20060329

CF01 Termination of patent right due to non-payment of annual fee