DE60312133D1 - Zugriffsauthentifizierung - Google Patents

Zugriffsauthentifizierung

Info

Publication number
DE60312133D1
DE60312133D1 DE60312133T DE60312133T DE60312133D1 DE 60312133 D1 DE60312133 D1 DE 60312133D1 DE 60312133 T DE60312133 T DE 60312133T DE 60312133 T DE60312133 T DE 60312133T DE 60312133 D1 DE60312133 D1 DE 60312133D1
Authority
DE
Germany
Prior art keywords
client
service
service provider
access authentication
session
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
DE60312133T
Other languages
English (en)
Inventor
Jens Bjarme
Michael Skoog
Patrik Schalin
Bernard Smeets
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Telefonaktiebolaget LM Ericsson AB
Original Assignee
Telefonaktiebolaget LM Ericsson AB
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Telefonaktiebolaget LM Ericsson AB filed Critical Telefonaktiebolaget LM Ericsson AB
Application granted granted Critical
Publication of DE60312133D1 publication Critical patent/DE60312133D1/de
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • H04L9/0844Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • Computer And Data Communications (AREA)
  • Storage Device Security (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Lock And Its Accessories (AREA)
  • Control Of Eletrric Generators (AREA)
  • Gyroscopes (AREA)
DE60312133T 2003-05-20 2003-05-20 Zugriffsauthentifizierung Expired - Lifetime DE60312133D1 (de)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
EP03253137A EP1480374B1 (de) 2003-05-20 2003-05-20 Zugriffsauthentifizierung

Publications (1)

Publication Number Publication Date
DE60312133D1 true DE60312133D1 (de) 2007-04-12

Family

ID=33041094

Family Applications (1)

Application Number Title Priority Date Filing Date
DE60312133T Expired - Lifetime DE60312133D1 (de) 2003-05-20 2003-05-20 Zugriffsauthentifizierung

Country Status (3)

Country Link
EP (1) EP1480374B1 (de)
AT (1) ATE355673T1 (de)
DE (1) DE60312133D1 (de)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7764795B2 (en) * 2004-10-20 2010-07-27 Oracle International Corporation Key-exchange protocol using a password-derived prime

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5668876A (en) * 1994-06-24 1997-09-16 Telefonaktiebolaget Lm Ericsson User authentication method and apparatus
US6226383B1 (en) * 1996-04-17 2001-05-01 Integrity Sciences, Inc. Cryptographic methods for remote authentication
WO2001097440A2 (en) * 2000-06-12 2001-12-20 Zendit Encryption system that dynamically locates keys

Also Published As

Publication number Publication date
ATE355673T1 (de) 2006-03-15
EP1480374A8 (de) 2005-02-09
EP1480374B1 (de) 2007-02-28
EP1480374A1 (de) 2004-11-24

Similar Documents

Publication Publication Date Title
ATE556522T1 (de) Breitband-zugriffsverfahren mit grosser kapazität und system dafür
KR101374810B1 (ko) 가상 가입자 식별 모듈
ATE538443T1 (de) Dauerhafter autorisierungskontext basierend auf externer authentifizierung
WO2003100544A3 (en) Method for authenticating a user to a service of a service provider
WO2005003907A3 (en) Method and apparatus to authenticate and authorize user access to a system
WO2009068956A3 (en) Authentication method without credential duplication for users belonging to different organizations
GB2464552B (en) Authentication system and method for authenticating a user terminal with an access node providing restricted access to a communication network
DE602004028345D1 (de) Kundenauthentifizierung mittels eines Challenge-Anbieters
BR0102260A (pt) Método aperfeiçoado para uma autenticação de um módulo de identidade de assinatura de usuário
FI981132A (fi) Palvelun luvattoman käytön estäminen
WO2007047440A3 (en) Method and apparatus for re-authentication of a computing device using cached state
GB2449834A (en) Identity and access management framework
ATE358956T1 (de) System für mobile authentifizierung mit reduzierten authentifizierungsverzögerung
BR0305278A (pt) Métodos e sistemas para autenticação de um usuário para sublocais de um local de rede
DE602004005461D1 (de) Mobile Authentifizierung für den Netzwerkzugang
JP2006260538A5 (de)
CA2463286A1 (en) Multi-factor authentication system
WO2006019752A8 (en) Methods for authorizing transmission of content from first to second individual and authentication an individual based on an individual’s social network
WO2007114866A3 (en) Method off-line authentication on a limited-resource device
NO20026003D0 (no) Terminalkommunikasjonssystem
WO2003065169A3 (en) Access system utilizing multiple factor identification and authentication
EP1353470A3 (de) Verfahren zur Aufstellung einer nutzbaren Infrastruktur mit öffentlichen Schlüsseln
ATE260010T1 (de) Sim basierte authentifizierung als zahlungsverfahren in öffentlichen isp zugangsnetzen
WO2002093337A3 (en) Method and apparatus for multiple token access to thin client architecture session
MY141019A (en) Challenge-based authentication without requiring knowledge of secret authentication

Legal Events

Date Code Title Description
8332 No legal effect for de