WO2001006805A1 - Procede et systeme permettant d'authentifier un dispositif de communication mobile - Google Patents

Procede et systeme permettant d'authentifier un dispositif de communication mobile Download PDF

Info

Publication number
WO2001006805A1
WO2001006805A1 PCT/SE2000/001418 SE0001418W WO0106805A1 WO 2001006805 A1 WO2001006805 A1 WO 2001006805A1 SE 0001418 W SE0001418 W SE 0001418W WO 0106805 A1 WO0106805 A1 WO 0106805A1
Authority
WO
WIPO (PCT)
Prior art keywords
computer system
code word
code
char
data
Prior art date
Application number
PCT/SE2000/001418
Other languages
English (en)
Inventor
Anders HÅKANS
Frank Reichert
Original Assignee
Telefonaktiebolaget Lm Ericsson (Publ)
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Telefonaktiebolaget Lm Ericsson (Publ) filed Critical Telefonaktiebolaget Lm Ericsson (Publ)
Priority to JP2001510503A priority Critical patent/JP2003504773A/ja
Priority to EP00948441A priority patent/EP1195071A1/fr
Priority to AU61922/00A priority patent/AU6192200A/en
Publication of WO2001006805A1 publication Critical patent/WO2001006805A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/21Monitoring or handling of messages
    • H04L51/214Monitoring or handling of messages using selective forwarding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/029Firewall traversal, e.g. tunnelling or, creating pinholes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/58Message adaptation for wireless communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices

Definitions

  • the present invention relates to a method and a system for authenticating a mobile communication device.
  • the invention relates to a transmission system, which transmits data between a computer system and a mobile communication device, and to a method for authenticating a mobile communication device to a computer system.
  • SMS short text message
  • step (V) the computer system transmits information (e.g. the code word and a "you've got mail"-message) used in the authentication process, but the device has not access to data in the computer system.
  • information e.g. the code word and a "you've got mail"-message
  • the computer system Preferably the computer system generates a random code word.
  • the computer system uses a predetermined address of the device.
  • the generation of the code message, in step (III) is preferably performed by encryption of the received code word using a unique encryption key of the device. If the code message is verified, step (VI), then the address of the device is authenticated for data transmission.
  • the device transmits the code message using a Hypertext Transfer Protocol (HTTP) or Simple Mail Transport Protocol (SMTP).
  • HTTP Hypertext Transfer Protocol
  • SMTP Simple Mail Transport Protocol
  • the computer system transmits data in step (VI) to the address from where the device sent the code message, e.g. the computer system extracts the sender address of the mobile communication device and transmits the data to this address. This address can differ from the address to which the code word was transmitted.
  • authenticated data transmission can be obtained.
  • automated forwarding of data such as electronic mail (E-mail)
  • E-mail facilitated logging in on a secure network, such as a bank and many more applications where an authenticated transmission is required or desired.
  • FIG. 1 is a schematic view of a system for automatic forwarding of E-mail or other data using the Internet.
  • FIG. 2 is a schematic view of a system for automatic forwarding of E-mail or other data using a packet data network.
  • FIG. 3 is a schematic view of a system for automatic authentication of a device over an Internet connection.
  • Fig. 4 is a flow chart illustrating the steps carried out when authenticating a mobile communication device and initiating a data transmission in the system shown in Fig. 1.
  • Figs. 5a and 5b are flow charts illustrating the steps carried out when authenticating a mobile communication device and initiating a data transmission in the system shown in Fig. 2.
  • Fig. 6 is a flow chart illustrating the steps carried out when authenticating a mobile communication device in the system shown in Fig. 3.
  • Fig. 1 a schematic view of a system for automatic forwarding of E-mail or other data using an Internet connection is shown.
  • the system comprises a computer system 101 , which in turn can comprise a number of different computers and other devices.
  • the computer system 101 in Fig. 1 comprises an electronic mail (E-mail) server 103 connected to a local area network (LAN) 107 of the computer system 101.
  • the server 103 is arranged to handle electronic mails (E-mails) within the computer system 101.
  • the computer system 101 also comprises an authentication server 105, which also is connected to the LAN 107 and to a communication device 108 for transmitting messages outside the computer system 101.
  • the entire computer system 101 is, for example, located inside a firewall 109.
  • the only way for entering data from outside the firewall 109 to the computer system 101 is through the firewall 109.
  • the firewall 109 is arranged to only let trough data traffic arriving in a HTTP or SMTP format.
  • a mobile communication device 1 15 is located outside the firewall.
  • the firewall is connected to the Internet 1 1 1 , which in turn is connected to a number of Internet service providers (ISP) 1 13.
  • the Internet service providers 1 13 provides an interface via which different devices, such as the mobile communication device 1 15, can connect to the Internet.
  • Fig. 4 a flow chart illustrating different steps carried out when authenticating a mobile communication device 1 15 and initiating a data transmission from the computer system 101 to the mobile communication device 1 15 in the system shown in Fig. 1.
  • First some event such as the arrival of an E-mail to the E-mail server 103 of the computer system 101, which E-mail is addressed to a user of the device 1 15, triggers the set up of an authenticated transmission towards the device 115 from the computer system 101, step 401.
  • the computer system 101 is arranged to automatically forward data, in this case E-mails, which is present inside the computer system and which is intended for a client which presently is located outside the computer system 101 and hence also outside the firewall 109.
  • the system 101 then generates a random code word, step 403.
  • the code word is generated by the authentication server 105.
  • the code word generated by the authentication server 105 is then transmitted via the communication device 108, for example by means of a transmitting a short message service (SMS) message, to the device 1 15, step 405.
  • SMS short message service
  • the authentication server uses a predetermined address of the user, in this case an SMS number.
  • the device 1 15 receives the code word from the computer system 101, step 407. In response to this reception the device automatically connects to an Internet service provider (ISP) 1 13, step 409.
  • ISP Internet service provider
  • IP Internet protocol
  • the device also generates a code message based on the received code word, step 414.
  • an E-mail server is set up inside the device, step 413.
  • An E-mail is then transmitted to the authentication server 105 of the computer system, step 415.
  • the E-mail from the device 115 to the authentication server 105 is transmitted via the ISP 1 13, the Internet 1 1 1, through the firewall 109, and via the LAN 107.
  • the E-mail from the device 115 to the authentication server 105 comprises at least the code message.
  • the code message is preferably generated by encrypting the received code word using a unique encryption key.
  • the code message is generated by encrypting the code word together with a part of the encryption key.
  • the E-mail from the device to the authentication server 105 is transmitted using a SMTP or HTTP protocol, since the firewall 109 is designed to only let such data traffic through.
  • the firewall 109 can maintain a high level of security.
  • the SMTP protocol is used, since it only requires one socket to be used for the connection.
  • the authentication server receives the code message from the dev ice, step 417.
  • the code word is then extracted from the received E-mail, which may require decryption if the code word is encrypted, step 419.
  • the session ends, step 423.
  • the computer system 101 can be arranged to continue to try to establish an authenticated connection to the device 1 15 later.
  • the authentication server knows that it is the correct device.
  • the authentication server knows where to transmit the data, in this example an E-mail.
  • the authentication server 105 copies the data from the E-mail server and transmits the E-mail to the device 1 15 using the IP-address of the device, step 425.
  • the data transmitted is preferably encrypted using the unique encryption key of the device 1 15.
  • FIG. 2 another system for automatic forwarding of E-mail or other data, which uses packet data transmission is shown.
  • the system as shown in Fig. 2 is similar to the system shown in Fig. 1.
  • a packet data network 1 12 is used instead of using an ISP 1 13 for transmitting data between the computer system 101 and the device 1 15, a packet data network 1 12 is used.
  • the Internet can be used for transmissions between the computer system 101 and the packet data network 1 12.
  • Fig. 5a a flow chart illustrating the steps carried out when authenticating a mobile communication device in the system shown in Fig. 2 is shown.
  • the flow chart in Fig. 5 is similar to the flow chart in Fig. 4. However, the transmission from the device 1 15 to the computer system 101 is done via the packet data network, 1 12.
  • the code word can be transmitted to a predetermined address of the device using the packet data network.
  • the code word can then be transmitted embedded in a data packet.
  • Fig. 5b a flow chart illustrating yet another way of authenticating a mobile communication device is shown, which is similar to the method described above in conjunction with Fig. 5a.
  • the difference between the flow chart in Fig. 5a and the flow chart in Fig. 5b is that the authentication server extracts the code word (step 419 in Fig. 5a), and compares it to the code word; and that the authentication server extracts the code message (step 418 in Fig. 5b), and compares it to a code message generated by itself using the same code message generating algorithm as the device.
  • the device upon reception of the code word, the device generates a code message using the code word as input data in a code message generating algorithm, step 414.
  • the system uses the same code message generation algorithm as the device, step 420 in order to authenticate the device.
  • the device generates the code message, step 414, during the time interval between the reception of the code word, step 407, and the transmission of the E-mail, step 415.
  • the authentication server generates the code message, step 420 during the time interval between the generation of the code word, step 403, and the comparison of the code messages, step 421.
  • Fig. 3 a view of a system for automatic authentication of a device over an Internet connection is shown.
  • the system used can be similar to the system as shown in Fig. 1 or Fig. 2.
  • the system as shown in Fig. 3 also comprises a financial transaction server 104, which is connected to the LAN 107.
  • Fig. 6 a flow chart illustrating the steps carried out when authenticating the device 1 15 to the computer system 101 in the system shown in Fig. 3 is shown.
  • the user transmits an E-mail from the device 1 15 to the authentication server 105 requesting to be authenticated, step 400.
  • the E-mail which comprises information identifying the user, such as a user ID, is transmitted via the ISP 1 13, the Internet 1 1 1, through the firewall 109, and via the LAN 107 to the authentication server 105.
  • the computer system 101 receives the request, step 402.
  • the authentication server 105 In response to this request the authentication server 105 generates a code word, in particular a random code word, step 403.
  • the system 101 then transmits the code word via the communication device 108, for example by means of transmitting a short message service (SMS) message, to the device 1 15, step 405.
  • SMS short message service
  • the computer system sends the code word to a predetermined address of the device 1 15.
  • the computer system 101 uses the received identification information from the user together with a stored address list to obtain the (predetermined) address.
  • the random code word is transmitted on the Internet to a server or the like, which server in turn transmits an SMS to the device 1 15.
  • the device 1 15 receives the code word from the computer system 101 , step 407, and generates a code message.
  • the device In response to this reception the device automatically transmits a second E-mail, including the code message, to the authentication server 105 of the computer system, step 415.
  • the second E-mail from the device 1 15 to the authentication server 105 is transmitted via the ISP 1 13, the Internet 1 1 1 , through the firewall 109, and via the LAN 107.
  • the device 1 15 does not have to set up a new connection to the Internet when transmitting the E-mail comprising the code message, since an Internet connection already has been set up when transmitting the first E-mail in step 400.
  • the device connect to the Internet a second time when it receives the code word in step 407, if this should turn out to be advantageous.
  • the E-mail from the device 1 15 to the authentication server 105 comprises at least the code message.
  • the generation of the code message is preferably done by using a unique encryption key.
  • the code message is generated by encrypting the code word and a part of the encryption key.
  • the E-mails from the device 1 15 to the authentication server 105 are transmitted using a SMTP or HTTP protocol, since the firewall 109 is designed to only let such data traffic through.
  • the firewall 109 can maintain a high level of security.
  • the SMTP protocol is used, since it only requires one socket to be used for the connection.
  • the authentication server receives the E-mail from the device, step 417.
  • the code word is then extracted from the received E-mail, e.g. by extracting and decrypting the code message, step 419.
  • it is checked if the transmitted code word matches the received code word, step 421.
  • the computer system 101 can be arranged to return a message to the device informing the user of the device that access is denied, so that the user can try to connect again if he/she wishes to do so.
  • the device 1 15 can be any type of mobile communication device, which can receive and transmits data.
  • the device can be a mobile telephone, a computer comprising a wireless modem or a combination thereof, such as a hand held computer comprising an integrated mobile telephone.
  • the device 1 15 In order for the device 1 15 to operate properly it must be loaded with a suitable program, which enables the device to communicate using the method as described above.
  • the functions required for enabling the device to operate according to the method can of course also be implemented in hardware. Software or hardware support for the authentication method is also provided in the computer system.
  • the system as described in conjunction with Figs. 3 and 6 can also be used in other types of transactions than financial transactions.
  • Appendix 1 - 12 a computer program listing illustrating a software implementation of different procedure steps is shown.
  • Appendices 1 - 6 a program listing in C++ language of some procedure steps in the computer system is shown, for example "lumpio" in appendix 5-6 deals with encoding and decoding.
  • Appendices 7 - 12 a listing of some procedure steps in the client or device is shown, for example: “pushnot” in appendices 7-8 initiates a connection upon receipt of an SMS using the function "DoConnect”; “client” in appendices 11-12 use the functions “lumpIO_fputs” and “lumpIO fgets” for decryption and encryption, and the function "send_f ⁇ le” to send a mail.
  • This SMTP server expects to get either: [[ Step (a) is NOT needed - messages will get from the EVO server into the right place behind my back a) "real" email from the Internet which must be sent on to a PAT client (on EPOC) - in which case it should queue the email to be sent AND queue an SMS to be sent to the user which will contain the token used to authenticate them
  • # include ⁇ sys/stat.h> /* For getopt() */ extern char *optarg; extern int optind; #endif
  • MAX_DB_FIELDLEN 100 char user[ MAX DB FIELDLEN ], password[ MAX_DB_FIELDLEN ], evokey[ MAX DB FIELDLEN ], randnum[ MAX DB FIELDLEN ], dbtime[ MAX_DB_FIELDLEN ];
  • MAX_ VERSION 100 char client_version[ MAX VERSION ]; bool authenticated false; void main( int argc, char **argv ); void parse_args( int argc, char **argv ); void become_daemon(); #ifdef UNIX void process_under_inetd(); char *get_my_login();
  • /* client has no email to send to me! */ nprintf( n, "QUIT ⁇ r ⁇ n” ); break; ⁇ ⁇ nprintf( n, "200 So long and thanks for all the fish. ⁇ r ⁇ n” ); nclose( n ); logit( INFO, "end of process smtp” ); ⁇ bool process_state( int state, NET n, char *buf, char *addr )
  • ⁇ dot strchr( addr, '.' ); if( ! dot ) ⁇ nprintf( n, "550 bad token/address: no ⁇ r ⁇ n” ); return false;
  • Hash md5 ( SSH HASH MD5 ); md5.Add( RandomToken, 16 ); memcpy( db_hash_rnd_str, md5.Digest(), 16 );
  • REPLY_OK( ret ) ) ⁇ logit( WARNING, "bad reply to MAIL FROM of %d", ret ); return false; ⁇ logit( INFO, "Send RCPT TO: ⁇ %s>", client version ); nprintf( n, "RCPT TO: ⁇ %s> ⁇ r ⁇ n", client version ); ret read_smtp_reply( n, tmp, sizeof( tmp ) ); if( !
  • int des_ede_encrypt (unsigned char *input, unsigned char *output, des_key_schedule ksl , des key schedule ks2, des_key_schedule ks3, int encrypt)
  • FILE *f lio->f; if( feof( f )
  • ferror( f ) ) return NULL; int in fread( &tmp_in[ 0 ], sizeof( char ), LUMP_DATA_LEN, f ); if( in ⁇ 0 ) return NULL; logit( INFO, "fread %d bytes «%*.*s»", in, in, in, &tmp_in[ 0 ] );
  • FILE *f lio->f; if( feof( f )
  • CFloatCloseAppUi CFloatAppUi* anAppUi
  • public // from CCoeControI void Draw(const TRect& aRect) const
  • void HandlePointerEventL Const TPointerEvent& aPointerEvent
  • EFloatWindowHeight EFloatHeight+2*EFloatMargin+EFloatTitleHeight
  • ENewWindowHeight ENewHeight+2*ENewMargin+ENewTitIeHeight
  • CEikCommandButton NewButton(const TDesC8& text); inline CNewWindow* GetWindowQ ⁇ return iNewWindow; ⁇ ; private: void Draw(const TRect& aRect) const; private:
  • Tint ThreadFunction TAny* anArg
  • StartThread CFloatAppUi* ParentAppUi,RThread *thread
  • Tint CFloatAppUi :TextWidth(char *Text)
  • TPtrC8* Buffer new TPtrC8((TUint8 *)Text);
  • TInt width iEikonEnv->Static()->NormalFont()->TextWidthInPixels(*Buffer); delete Buffer; return(width);
  • Tint width TextWidth(Text);
  • TBufC8 ⁇ 512> Buffer((const unsigned char *)Text); iCoIumnView->GetListArray()->AppendL(Buffer); iColumnView->RedrawL();
  • TBufC8 ⁇ 512> Buffer((const unsigned char *)Text); iColumnView->GetListArray()->AppendL(Buffer); iColumnView->SetCurrentItem(9000); iColumnView->RedrawL();
  • SPACER 4 // gap between jies ⁇ #define TILES_ WIDTH (EFloatWidth-(MAIL_W+BYTES_W+2*SPACER))
  • buttons and window #def ⁇ ne BUTTON_BOTTOM_MARGIN 0 // margin between buttons and window
  • PatClient Pat CWSocket* Socket
  • SMSUtils new ESMSUtil(&this->PhoneStat);
  • SMSUtils->OpenPort() // open the infra-red and configure it
  • iCoIumnView new(ELeave) CGuiViewColumnListBoxControI(this); iColumnView->ConstructL(ClientRect());
  • iNewControl new(ELeave) CNewControl(this); iNewControl->ConstructL(); iNewControl->ActivateL();
  • SmsTimer CPeriodic::NewL(-10); SmsTimer->Start(POLL_PHONE_RATE,POLL_PHONE_RATE,cb);
  • TBufC ⁇ 2> c_drive(_L("C:4)); mbfn.Set(BitmapFile,&c_drive,NULL); iBitmap new (ELeave) CFbsBitmapO; iBitmap->Load(mbfn.FullName(),EMbmBmapsBat ; shareIfLoaded);
  • ⁇ iActive aActive
  • TRect BoxRect (TPoint(LeftX+2,(rect.iBr.iY-Font->HeightInPixels()- 8)),TSize(ETextBoxWidth,Font->HeightInPixels()+6)); gc.SetBrushColor(KRgb White); // set pen colour gc.SetBrushStyle(CGraphicsContext::ESolidBrush); gc.DrawRect(BoxRect); gc.DrawText(iText,TPoint(LeftX+5,rect.iBr.iY-Font->DescentInPixels()-5)); // then draw it
  • iTestButton NewButton(_L("Test"));
  • iNewWindow new (ELeave) CNewWindow(); iNewWindow->ConstructL(); iNewWindow->SetContainerWindowL(*this); iNewWindow->SetRectL(iNewRect); iNewWindow->SetActive(ETrue); #endif
  • case 0 return iMover
  • case 1 return iTestButton
  • Tint aind Index(aControl);
  • SMSUtiIs ParentAppUi->SMSUtils
  • SMSUtils->ClosePort() // release the IR port
  • Socket->Close(); delete Socket; Socket NULL;
  • ParentAppUi->SmsTimer CPeriodic: :NewL(- 10); ParentAppUi->SmsTimer->Start(POLL_PHONE_RATE,POLL_PHONE_RATE,cb);
  • Tint Leave FALSE
  • Tint res thread->Create(_L("SmsThread"), // create new server thread ThreadFunction, // thread's main function KDefaultStackSize, KDefaultHeapSize, KDefaultHeapSize, &TempStat // passed as TAny* argument to thread function
  • EVO installed security key is 001 1223344556677 memcpy(EvoKey,” ⁇ x00 ⁇ xl l ⁇ x22 ⁇ x33 ⁇ x44 ⁇ x55 ⁇ x66 ⁇ x77",8); Hash md5(SSH_HASH_MD5); md5.Add(EvoKey, sizeof(EvoKey)); md5.Add(RandomToken, 16 );
  • Hash md5 (SSH_HASH_MD5); md5.Add(Random Token, 16); CopyMemory(TokenBuffer, md5.Digest(), 16 );
  • InitKey (&ctx_enc,key,iv,&des_check_key); Encrypt(&ctx_enc,CipherText,TokenBuffer, 16);
  • PatClient (CFloatAppUi* ParentAppUi,unsigned char *RT,unsigned char *k,unsigned char *i); void GenFCount(RFs& FS);
  • PatClient :PatClient(CFloatAppUi* AppUi,unsigned char *RT,unsigned char *k,unsigned char *i)
  • TInt Colon buf.Match(_L("*: ⁇ *>*")); if (Colon ⁇ 0) return(FALSE);
  • Tint End buf.LocateReverse('>'); addr.Copy(buf.Mid(Colon,End-Colon- 1 )); return(TRUE);

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Transfer Between Computers (AREA)
  • Computer And Data Communications (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Cette invention concerne un procédé et un système permettant d'authentifier un dispositif de communication mobile (115). Un mot de code est généré dans un système informatique (101) puis envoyé au dispositif (115). Lorsqu'il reçoit le mot de code, le dispositif génère automatiquement un message code à l'aide du mot de code, et transmet le message code au système informatique. Les données sont ensuite transmises du système informatique vers le dispositif si le message code est authentifié par ledit système informatique. Dans un mode de réalisation préféré, le dispositif utilise un protocole de transfert hypertexte (Hypertext Transfer Protocol, HTTP) ou un protocole de transport de courrier simple (Simple Mail Transport Protocol, SMTP) afin de transmettre le message code. Cela est avantageux du fait qu'un garde-barrière est conçu pour laisser passer le trafic utilisant ces protocoles, la sécurité fournie par le garde-barrière n'étant pas ainsi réduite. Ce procédé et ce système permettent d'obtenir différents types de transmissions de données authentifiées. On peut par exemple citer la transmission automatisée de données, telle que le courrier électronique (e-mail), une connexion facilitée sur un réseau sécurisé, tel qu'un réseau bancaire, ainsi que de nombreuses autres applications où l'authentification de l'utilisateur est requise ou souhaitée.
PCT/SE2000/001418 1999-07-16 2000-07-04 Procede et systeme permettant d'authentifier un dispositif de communication mobile WO2001006805A1 (fr)

Priority Applications (3)

Application Number Priority Date Filing Date Title
JP2001510503A JP2003504773A (ja) 1999-07-16 2000-07-04 移動体通信装置を認証する方法とシステム
EP00948441A EP1195071A1 (fr) 1999-07-16 2000-07-04 Procede et systeme permettant d'authentifier un dispositif de communication mobile
AU61922/00A AU6192200A (en) 1999-07-16 2000-07-04 A method and a system for authenticating a mobile communication device

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
SE9902746-8 1999-07-16
SE9902746A SE514769C2 (sv) 1999-07-16 1999-07-16 Sätt och system för autentisering av en mobilkommunikationsanordning

Publications (1)

Publication Number Publication Date
WO2001006805A1 true WO2001006805A1 (fr) 2001-01-25

Family

ID=20416536

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/SE2000/001418 WO2001006805A1 (fr) 1999-07-16 2000-07-04 Procede et systeme permettant d'authentifier un dispositif de communication mobile

Country Status (6)

Country Link
EP (1) EP1195071A1 (fr)
JP (1) JP2003504773A (fr)
CN (1) CN1153501C (fr)
AU (1) AU6192200A (fr)
SE (1) SE514769C2 (fr)
WO (1) WO2001006805A1 (fr)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2842055A1 (fr) * 2002-07-05 2004-01-09 Nortel Networks Ltd Procede pour controler l'acces a un systeme cellulaire de radiocommunication a travers un reseau local sans fil, et organe de controle pour la mise en oeuvre du procede
US8943560B2 (en) 2008-05-28 2015-01-27 Microsoft Corporation Techniques to provision and manage a digital telephone to authenticate with a network

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070093259A1 (en) * 2005-10-26 2007-04-26 Hyatt Edward C Methods, systems, and computer program products for secured access to list server information via SMS messaging
CN108920629B (zh) * 2018-06-29 2021-10-26 郑州云海信息技术有限公司 一种文件系统的acl权限设置方法、装置、设备及介质

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1997008906A1 (fr) * 1995-08-30 1997-03-06 Sendit Ab Systeme et dispositif hote pour transmettre du courrier electronique
EP0817518A2 (fr) * 1996-07-03 1998-01-07 AT&T Corp. Méthode de l'accès contrÔlé à un réseau sécurisé
US5796825A (en) * 1996-01-16 1998-08-18 Symantec Corporation System for automatic decryption of file data on a per-use basis and automatic re-encryption within context of multi-threaded operating system under which applications run in real-time
GB2324682A (en) * 1997-01-31 1998-10-28 Nec Corp Connection of a mobile wireless terminal to a host computer
WO1999006900A2 (fr) * 1997-07-30 1999-02-11 Visto Corporation Systeme et procede d'acces global et sur a des informations unifiees, dans un reseau informatique

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1997008906A1 (fr) * 1995-08-30 1997-03-06 Sendit Ab Systeme et dispositif hote pour transmettre du courrier electronique
US5796825A (en) * 1996-01-16 1998-08-18 Symantec Corporation System for automatic decryption of file data on a per-use basis and automatic re-encryption within context of multi-threaded operating system under which applications run in real-time
EP0817518A2 (fr) * 1996-07-03 1998-01-07 AT&T Corp. Méthode de l'accès contrÔlé à un réseau sécurisé
GB2324682A (en) * 1997-01-31 1998-10-28 Nec Corp Connection of a mobile wireless terminal to a host computer
WO1999006900A2 (fr) * 1997-07-30 1999-02-11 Visto Corporation Systeme et procede d'acces global et sur a des informations unifiees, dans un reseau informatique

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2842055A1 (fr) * 2002-07-05 2004-01-09 Nortel Networks Ltd Procede pour controler l'acces a un systeme cellulaire de radiocommunication a travers un reseau local sans fil, et organe de controle pour la mise en oeuvre du procede
WO2004006532A1 (fr) * 2002-07-05 2004-01-15 Nortel Network Limited Procede et organe pour controler l'acces a un systeme cellulaire de radiocommunication a travers un reseaju local sans fil
US8943560B2 (en) 2008-05-28 2015-01-27 Microsoft Corporation Techniques to provision and manage a digital telephone to authenticate with a network

Also Published As

Publication number Publication date
EP1195071A1 (fr) 2002-04-10
AU6192200A (en) 2001-02-05
CN1375173A (zh) 2002-10-16
SE9902746L (sv) 2001-01-17
CN1153501C (zh) 2004-06-09
JP2003504773A (ja) 2003-02-04
SE514769C2 (sv) 2001-04-23
SE9902746D0 (sv) 1999-07-16

Similar Documents

Publication Publication Date Title
US8583914B2 (en) Reducing processing load in proxies for secure communications
US6442686B1 (en) System and methodology for messaging server-based management and enforcement of crypto policies
CA2467988C (fr) Systeme et methode d'etablissement de connexion reseau securitaire, d'un client a un hote de reseau
US9917828B2 (en) Secure message delivery using a trust broker
US7814208B2 (en) System and method for projecting content beyond firewalls
US7870384B2 (en) Offload processing for secure data transfer
US7441119B2 (en) Offload processing for secure data transfer
US9172682B2 (en) Local authentication in proxy SSL tunnels using a client-side proxy agent
JP4315696B2 (ja) ホスト端末エミュレーションプログラム、中継用プログラムおよびホスト端末エミュレーション方法
US7653815B2 (en) System and method for processing encoded messages for exchange with a mobile data communication device
CA2394451C (fr) Systeme, methode et produit informatique pour l'envoi et la reception de donnees cryptees s/mime
CN113067828B (zh) 报文处理方法、装置、服务器、计算机设备及存储介质
US20030065941A1 (en) Message handling with format translation and key management
US20040133775A1 (en) System and method for secure electronic communication in a partially keyless environment
US20060123092A1 (en) Architecture for general purpose trusted personal access system and methods therefor
CN113508563A (zh) 基于区块链的安全电子邮件系统
CA2511335A1 (fr) Systeme et procede pour des communications electroniques transparentes et securisees
EA009997B1 (ru) Способ шифрования и передачи данных между отправителем и получателем с использованием сети
US20030105957A1 (en) Kernel-based security implementation
CN103428077B (zh) 一种安全收发邮件的方法和系统
JP4434680B2 (ja) 電子メール処理装置用プログラム
CN101656608A (zh) 一种在即时通信工具中单点登录Web端的方法及系统
US20050198165A1 (en) Systems and methods for electronic information distribution
JP2002049571A (ja) 通信制御装置及び通信制御方法
WO2001006805A1 (fr) Procede et systeme permettant d'authentifier un dispositif de communication mobile

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
WWE Wipo information: entry into national phase

Ref document number: 2000948441

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 008130310

Country of ref document: CN

WWP Wipo information: published in national office

Ref document number: 2000948441

Country of ref document: EP

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

WWW Wipo information: withdrawn in national office

Ref document number: 2000948441

Country of ref document: EP