WO2003030464A1 - Procede d'authentification de securite pour client de pc - Google Patents

Procede d'authentification de securite pour client de pc Download PDF

Info

Publication number
WO2003030464A1
WO2003030464A1 PCT/CN2002/000408 CN0200408W WO03030464A1 WO 2003030464 A1 WO2003030464 A1 WO 2003030464A1 CN 0200408 W CN0200408 W CN 0200408W WO 03030464 A1 WO03030464 A1 WO 03030464A1
Authority
WO
WIPO (PCT)
Prior art keywords
authentication
user
client
server
call
Prior art date
Application number
PCT/CN2002/000408
Other languages
English (en)
French (fr)
Inventor
Haitao Lin
Quan Gan
Shuiyang Chen
Xiaolan Wang
Original Assignee
Huawei Technologies Co., Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co., Ltd. filed Critical Huawei Technologies Co., Ltd.
Priority to US10/491,093 priority Critical patent/US7418727B2/en
Publication of WO2003030464A1 publication Critical patent/WO2003030464A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/081Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying self-generating credentials, e.g. instead of receiving credentials from an authority or from another peer, the credentials are generated at the entity itself

Definitions

  • the present invention relates to the field of IP communication technology, and in particular, to a security authentication method for a PC client. Background of the invention
  • PC security authentications in the prior art are all one-time authentication, that is, the PC client only needs to initiate a login request to the server (Server) when logging in, and once the server (Server) pairs the ID number and password indicating the identity of the user
  • the PC can be legally used, that is, when the PC is in use, the server no longer checks the PC client for legality.
  • FIG. 1 it is a typical PC client authentication and use flow diagram of the ICW (Internet Call Waiting) service.
  • ICW Internet Call Waiting
  • an IPN number is used to represent an account number or other various service numbers for identification.
  • the ID number of the user It can be seen from the figure that if a legitimate user has logged in through a PC, a relatively sophisticated illegal PC user can now log in and authenticate through the PC and directly use this number to initiate a call, thereby occupying the costs and resources of a legitimate user.
  • the present invention provides a PC client security authentication method with double authentication.
  • a PC client security authentication method includes the following steps:
  • the PC client initiates a login request to the server through the user ID number and password; the server performs the first authentication based on the user ID number and password. If the authentication succeeds, a user ID is generated. Field for re-authentication, and return to the PC client with the authentication pass message;
  • the user ID number is transmitted to the media gateway controller together with the re-authentication field obtained during login.
  • the media gateway controller transmits the user ID number and the re-authentication field to the server together.
  • the user ID number and the re-authentication field perform the second authentication. If the authentication fails, the call is rejected, otherwise the call is accepted and the called party is returned.
  • the re-authentication field may be a random number generated by the server, or an encryption key generated by the server, and so on.
  • the user ID number may be a number used to identify a user, such as an account number and various service numbers.
  • the invention associates the call with the login, which better solves the problem of the security use of legally logged-in PC users, and greatly increases the security of user resource use.
  • FIG. 1 is a flow chart of the ICW service PC client authentication in the prior art.
  • FIG. 2 is a flow chart of the ONLY service PC client authentication using the method of the present invention.
  • the invention associates the call with the login, and performs the first authentication when the user logs in. After the authentication is passed, a field for subsequent re-authentication is generated and returned to the PC client. In the subsequent calling process, in addition to the caller and caller information, the PC client must upload the security authentication field obtained during login. The user server can perform re-authentication based on the caller information and the security authentication field. .
  • the method of the invention can be applied to any IP communication service.
  • the following uses the personal number service (ONLY) as an example to further explain the content and application of the present invention with reference to the accompanying drawings.
  • ONLY One Number Link You business is developed with the development of the Internet. kind of innovative business. With ONLY service, the user only needs to apply for a personal business number. In the future, no matter where the user goes, others can use the personal business number to contact him through various means such as telephone and PC.
  • FIG. 2 shows a PC client authentication flow chart of the ONLY service to which the method of the present invention is applied. Its security certification process is as follows:
  • a user using the ONLY service initiates a login request to the ONLY user server (User Server) 203 through his personal service number (ONLY Number) and password;
  • User Server 203 performs authentication based on the ONLY Number and password. If the number does not match the password, or the number is invalid, the user is refused to log in. Otherwise, the authentication is passed and a random number is generated and returned to PC Client 201. After passing the authentication, the PC client 201 can initiate a call at any time; in addition to transmitting the calling and called numbers, the random number obtained during login must be transmitted to the ONLY Server 202;
  • the ONLY Server 202 After receiving the call from the PC client 201, the ONLY Server 202 transmits the calling and called numbers and the random number to the User Server 203 together, and initiates a call request;
  • User Server 203 will perform secondary authentication according to the calling party's ONLY Number and random number. If the authentication fails, the call will be rejected; if the authentication is successful, the call will be accepted and the called information will be returned;
  • the ID number that identifies the user is the personal service number (ONLY Number) of the ONLY service user.
  • the ID number may also be another user identification number such as a user account.
  • the field generated by the server for re-authentication is a random number, or it can be An encrypted key, etc.
  • the invention associates the user login with the user call.
  • a field for authentication is generated.
  • the security authentication field must be carried when calling, and the security authentication must be carried out again. Only the double security authentication is passed. Only then can the call be accepted, and the call is started. Any modification, equivalent replacement, or improvement made within the above-mentioned spirit and principle of the present invention shall fall within the scope of the claims of the present invention.

Description

一种 PC客户端的安全认证方法
技术领域
本发明涉及 IP通信技术领域, 特别是涉及一种 PC客户端的安全认 证方法。 发明背景
现有技术中的各种 PC安全认证, 均为一次性认证, 即 PC客户端只 需要在登录时, 向服务器( Server )发起登录请求, 一旦服务器( Server ) 对表示用户身份的 ID号码和密码认证通过, 该 PC就可以合法使用,也 即 PC在使用时, 服务器( Server ) 不再对 PC客户端进行合法性检查。
现有技术的这种一次认证方式将可能导致非法 PC用户盗用合法账 号。 参见图 1所示, 是一个比较典型的 ICW ( Internet Call Waiting )业 务的 PC客户端认证和使用流图, 其中为统一起见, 用 IPN号码来表示 帐号或者其它的各种业务号码等用以识别用户身份的 ID号码。 由图中 可以看出, 若一个合法的用户已经通过 PC登录, 此时一个比较高明的 非法 PC用户, 可以跨过 PC登录认证, 直接利用此号码发起呼叫,从而 占用了合法用户的费用和资源。 发明内容
为了解决 PC客户端的安全使用性问题, 本发明提供了一种双重认 证的 PC客户端安全认证方法。
一种 PC客户端的安全认证方法, 该方法包括以下步骤:
PC客户端通过用户 ID号码和密码, 向服务器发起登录请求; 服务 器才 据用户 ID号码和密码进行第一次认证, 若认证通过, 生成一个用 于再次认证的字段, 并随认证通过消息返回给 PC客户端;
当 PC客户端发起呼叫时,将用户 ID号码和登录时获得的再次认证 的字段一起传送给媒体网关控制器; 媒体网关控制器将该用户 ID号码、 再次认证的字段一起传送给服务器, 服务器根据该用户 ID号码和再次 认证的字段进行第二次认证, 若认证没有通过, 则拒绝呼叫, 否则接受 呼叫返回被叫信息。
所述的再次认证的字段可以是服务器产生的一个随机数, 也可以是 服务器产生的一个加密密钥等等。
所述的用户 ID 号码可以是帐号以及各种业务号码等用来标识用户 身份的号码。
本发明将呼叫和登录关联起来, 较好地解决了合法已登录 PC用户 的安全性使用的问题, 大大地增加了用户资源使用的安全性。 附图简要说明
图 1为现有技术的 ICW业务 PC客户端认证流图。
图 2为采用本发明方法的 ONLY业务 PC客户端认证流图。 实施本发明的方式
本发明将呼叫和登录关联起来, 在用户登录时进行首次认证, 认证 通过后生成一用于后续再次认证的字段, 返回给 PC客户端。 在以后的 呼叫过程中, PC客户端除了要传送主被叫信息外, 还必须将在登录时 获得的安全认证字段上传, 使用户服务器可以根据主叫的信息和该安全 认证字段进行再次的认证。
本发明方法可以应用于任何 IP通信业务。以下结合附图以个人号码 业务(ONLY ) 为例, 进一步说明本发明内容及应用。 ONLY ( One Number Link You )业务是随着互联网的发展, 为满足 用户越来越迫切地希望随时随地相互交流和获取信息的需要, 在融合了 传统电信技术和 IP技术的基础上, 开发的一种创新性业务。使用 ONLY 业务, 用户只需要申请一个个人业务号码, 今后无论该用户走到哪里, 他人均可以通过电话、 PC等各种手段使用该个人业务号码联系到他。
图 2示出了应用本发明方法的 ONLY业务的 PC客户端认证流图。 其安全认证的过程如下:
1、使用 ONLY业务的用户, 通过其个人业务号码(ONLY Number ) 和密码, 向 ONLY用户服务器 (User Server ) 203发起登录请求;
2、 User Server203根据 ONLY Number和密码进行认证, 若号码和 密码不符, 或者号码不合法, 拒绝登录, 否则认证通过, 并且产生一个 随机数返回给 PC客户端 201。 认证通过以后, PC客户端 201可以随时 发起呼叫; 叫, 除了传送主被叫号码外, 必须把登录时获得的随机数一起传送给 ONLY Server202;
4、 ONLY Server202收到 PC客户端 201的呼叫后, 把主被叫号码, 以及随机数一起传给 User Server203, 发起呼叫请求;
5、 User Server203将根据主叫 ONLY Number和随机数进行二次认 证, 若认证不通过, 拒绝呼叫; 若认证通过, 接受呼叫, 返回被叫信息;
6、 ONLY Server202接受呼叫,给 PC客户端 201发送开始呼叫的消 息, 然后开始建立呼叫。
在此, 识别用户身份的 ID号码即为 ONLY业务用户的个人业务号 码( ONLY Number )。 该 ID号码也可以是用户帐号等其它用以识别用户 身份号码。 服务器生成的用于再次认证的字段是一个随机数, 也可以是 一个加密的密钥等。
从上面的认证过程可以看出, 这种双重认证的方式, 解决了合法的
PC已登录用户的资源使用安全性问题,可以杜绝合法的 PC已登录用户 的资源被非法占用。 大大的增加了用户资源使用的安全性。
本发明是将用户登录和用户呼叫关联起来, 在用户登录进行首次安 全认证时产生一个用于认证的字段, 呼叫时必须携带该安全认证字段, 进行再次的安全认证, 只有双重的安全认证均通过, 呼叫才能被接受, 从而开始建立呼叫。凡在本发明上述精神和原则之内,所作的任何修改、 等同替换、 改进等, 均应包含在本发明的权利要求范围之内。

Claims

权利要求书
1、 一种 PC客户端的安全认证方法, 其特征在于该方法包括以下步 骤:
PC客户端通过用户 ID号码和密码, 向服务器发起登录请求; 服务 器根据用户 ID号码和密码进行第一次认证, 若认证通过, 生成一个用 于再次认证的字段, 并随认证通过消息返回给 PC客户端;
当 PC客户端发起呼叫时,将用户 ID号码和登录时获得的再次认证 的字段一起传送给媒体网关控制器; 媒体网关控制器将该用户 ID号码、 再次认证的字段一起传送给服务器, 服务器根据该用户 ID号码和再次 认证的字段进行第二次认证, 若认证没有通过, 则拒绝呼叫, 否则接受 呼叫返回被叫信息。
2、根据权利要求 1所述的 PC客户端的安全认证方法,其特征在于: 所述的再次认证的字段是服务器产生的一个随机数。
3、根据权利要求 1所述的 PC客户端的安全认证方法,其特征在于: 所述的再次认证的字段是服务器产生的一个加密密钥。
4、根据权利要求 1所述的 PC客户端的安全认证方法,其特征在于: 所述的用户 ID号码是用户的帐号。
5、根据权利要求 1所述的 PC客户端的安全认证方法,其特征在于: 所述的用户 ID号码是用户的业务号码。
PCT/CN2002/000408 2001-09-29 2002-06-07 Procede d'authentification de securite pour client de pc WO2003030464A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US10/491,093 US7418727B2 (en) 2001-09-29 2002-06-07 Method for PC client security authentication

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CNB011416505A CN1177445C (zh) 2001-09-29 2001-09-29 一种pc客户端的安全认证方法
CN01141650.5 2001-09-29

Publications (1)

Publication Number Publication Date
WO2003030464A1 true WO2003030464A1 (fr) 2003-04-10

Family

ID=4676305

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2002/000408 WO2003030464A1 (fr) 2001-09-29 2002-06-07 Procede d'authentification de securite pour client de pc

Country Status (3)

Country Link
US (1) US7418727B2 (zh)
CN (1) CN1177445C (zh)
WO (1) WO2003030464A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102075567A (zh) * 2010-12-24 2011-05-25 北京星网锐捷网络技术有限公司 认证方法、客户端、服务器、直通服务器及认证系统
CN103516677A (zh) * 2012-06-26 2014-01-15 广州晨扬通信技术有限公司 一种数据网与电话网协同认证鉴权的方法

Families Citing this family (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6070604A (en) * 1998-08-07 2000-06-06 Carter; Mark C. Erectable shelter with collapsible central roof support
CN100365591C (zh) * 2003-06-08 2008-01-30 华为技术有限公司 基于客户端的网络地址分配方法
CN100450109C (zh) * 2003-07-14 2009-01-07 华为技术有限公司 一种基于媒体网关控制协议的安全认证方法
CN100461780C (zh) * 2003-07-17 2009-02-11 华为技术有限公司 一种基于媒体网关控制协议的安全认证方法
CN100403742C (zh) * 2003-07-25 2008-07-16 华为技术有限公司 一种媒体网关与媒体网关控制器之间安全认证的方法
CN1286306C (zh) * 2003-08-05 2006-11-22 中兴通讯股份有限公司 媒体网关鉴权的方法
US7610616B2 (en) 2003-10-17 2009-10-27 Fujitsu Limited Pervasive security mechanism by combinations of network and physical interfaces
CN1314224C (zh) * 2003-12-17 2007-05-02 华为技术有限公司 通过扩展mgcp对ip语音接入设备的认证方法
US7599934B2 (en) * 2005-09-27 2009-10-06 Microsoft Corporation Server side filtering and sorting with field level security
CN101030855B (zh) * 2006-03-02 2011-01-12 腾讯科技(深圳)有限公司 一种验证帐户注册信息的方法及服务器
US8155275B1 (en) 2006-04-03 2012-04-10 Verint Americas, Inc. Systems and methods for managing alarms from recorders
US8356171B2 (en) * 2006-04-26 2013-01-15 Cisco Technology, Inc. System and method for implementing fast reauthentication
CN101159624B (zh) * 2007-10-31 2011-04-20 中兴通讯股份有限公司 一种账户使用监控方法
CN101222454B (zh) * 2008-01-31 2011-09-21 中兴通讯股份有限公司 一种拒绝非法业务流的方法
CN101247618B (zh) * 2008-03-19 2011-04-06 中兴通讯股份有限公司 一种终端合法性检测方法及系统
CN101262497B (zh) * 2008-04-21 2012-04-25 深圳市迅雷网络技术有限公司 一种内容推送方法、系统及装置
CN101582876A (zh) * 2008-05-12 2009-11-18 华为技术有限公司 用户生成内容的注册方法、装置和系统
CN101547098B (zh) * 2009-04-30 2010-11-10 太原理工大学 公共网络数据传输安全认证方法及系统
CN102065063A (zh) * 2009-11-13 2011-05-18 富士通株式会社 Web认证装置、系统和方法
CN102202040B (zh) * 2010-03-26 2014-06-04 联想(北京)有限公司 一种对客户端进行认证方法及装置
US8549314B2 (en) 2010-04-29 2013-10-01 King Saud University Password generation methods and systems
DE102010033231B4 (de) 2010-08-03 2013-08-22 Siemens Aktiengesellschaft Verfahren und Vorrichtung zur manipulationssicheren Bereitstellung eines Schlüssel-Zertifikates
DE102010033232A1 (de) * 2010-08-03 2012-02-09 Siemens Aktiengesellschaft Verfahren und Vorrichtung zum Bereitstellen eines Einmalpasswortes
CN102404326B (zh) * 2011-11-23 2014-04-23 北京星网锐捷网络技术有限公司 一种验证报文安全性的方法、系统以及装置
CN103200150B (zh) * 2012-01-04 2016-08-17 深圳市腾讯计算机系统有限公司 身份认证方法和系统
CN106255108A (zh) * 2016-08-31 2016-12-21 华自科技股份有限公司 射频通信方法及射频通信装置
CN106657068A (zh) * 2016-12-23 2017-05-10 腾讯科技(深圳)有限公司 登录授权方法和装置、登录方法和装置
US10771453B2 (en) * 2017-01-04 2020-09-08 Cisco Technology, Inc. User-to-user information (UUI) carrying security token in pre-call authentication
CN109587143B (zh) * 2018-12-10 2019-09-27 北京芯盾时代科技有限公司 基于主路的二次认证方法和系统

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1999059375A2 (en) * 1998-05-08 1999-11-18 Telefonaktiebolaget Lm Ericsson (Publ) Service provider access method and apparatus
WO2001029757A1 (en) * 1999-10-20 2001-04-26 Yodlee.Com, Inc. Method and apparatus for providing secure authentication of portable devices through internet host servers
US6243816B1 (en) * 1998-04-30 2001-06-05 International Business Machines Corporation Single sign-on (SSO) mechanism personal key manager

Family Cites Families (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH0984124A (ja) * 1995-09-19 1997-03-28 Fujitsu Ltd パーソナル通信端末の不正使用防止方法
US5864665A (en) * 1996-08-20 1999-01-26 International Business Machines Corporation Auditing login activity in a distributed computing environment
US6065120A (en) * 1997-12-09 2000-05-16 Phone.Com, Inc. Method and system for self-provisioning a rendezvous to ensure secure access to information in a database from multiple devices
US6182142B1 (en) * 1998-07-10 2001-01-30 Encommerce, Inc. Distributed access management of information resources
US6338140B1 (en) * 1998-07-27 2002-01-08 Iridium Llc Method and system for validating subscriber identities in a communications network
US6985583B1 (en) * 1999-05-04 2006-01-10 Rsa Security Inc. System and method for authentication seed distribution
US6226752B1 (en) * 1999-05-11 2001-05-01 Sun Microsystems, Inc. Method and apparatus for authenticating users
US7024692B1 (en) * 2000-01-21 2006-04-04 Unisys Corporation Non pre-authenticated kerberos logon via asynchronous message mechanism
US20010045451A1 (en) * 2000-02-28 2001-11-29 Tan Warren Yung-Hang Method and system for token-based authentication
CN1142653C (zh) * 2000-04-28 2004-03-17 杨宏伟 动态口令认证系统及方法
US7376740B1 (en) * 2000-06-13 2008-05-20 Microsoft Corporation Phone application state management mechanism
US6976164B1 (en) * 2000-07-19 2005-12-13 International Business Machines Corporation Technique for handling subsequent user identification and password requests with identity change within a certificate-based host session
US20020031225A1 (en) * 2000-09-08 2002-03-14 Hines Larry Lee User selection and authentication process over secure and nonsecure channels
US7185197B2 (en) * 2000-12-08 2007-02-27 Itt Manufacturing Enterprises, Inc. Method and apparatus to facilitate secure network communications with a voice responsive network interface device
US20020071565A1 (en) * 2000-12-11 2002-06-13 Kurn David Michael Software process pre-authorization scheme for applications on a computer system
US7181762B2 (en) * 2001-01-17 2007-02-20 Arcot Systems, Inc. Apparatus for pre-authentication of users using one-time passwords
US6912653B2 (en) * 2001-01-23 2005-06-28 Erika Monika Gohl Authenticating communications
US7010600B1 (en) * 2001-06-29 2006-03-07 Cisco Technology, Inc. Method and apparatus for managing network resources for externally authenticated users
US7158776B1 (en) * 2001-09-18 2007-01-02 Cisco Technology, Inc. Techniques for voice-based user authentication for mobile access to network services

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6243816B1 (en) * 1998-04-30 2001-06-05 International Business Machines Corporation Single sign-on (SSO) mechanism personal key manager
WO1999059375A2 (en) * 1998-05-08 1999-11-18 Telefonaktiebolaget Lm Ericsson (Publ) Service provider access method and apparatus
WO2001029757A1 (en) * 1999-10-20 2001-04-26 Yodlee.Com, Inc. Method and apparatus for providing secure authentication of portable devices through internet host servers

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102075567A (zh) * 2010-12-24 2011-05-25 北京星网锐捷网络技术有限公司 认证方法、客户端、服务器、直通服务器及认证系统
CN103516677A (zh) * 2012-06-26 2014-01-15 广州晨扬通信技术有限公司 一种数据网与电话网协同认证鉴权的方法

Also Published As

Publication number Publication date
CN1177445C (zh) 2004-11-24
US20040255158A1 (en) 2004-12-16
US7418727B2 (en) 2008-08-26
CN1411224A (zh) 2003-04-16

Similar Documents

Publication Publication Date Title
WO2003030464A1 (fr) Procede d'authentification de securite pour client de pc
Hardt The OAuth 2.0 authorization framework
Hardt Rfc 6749: The oauth 2.0 authorization framework
US8245030B2 (en) Method for authenticating online transactions using a browser
US7565554B2 (en) Method and system for a service process to provide a service to a client
US8307413B2 (en) Personal token and a method for controlled authentication
US10547602B2 (en) Communications methods and apparatus related to web initiated sessions
JP5651313B2 (ja) 連続する再認証を必要としないsipシグナリング
US20120284778A1 (en) Controlling access to a protected network
US6892308B1 (en) Internet protocol telephony security architecture
JP2019046060A (ja) 権限委譲システム、制御方法、およびプログラム
WO2016078419A1 (zh) 一种开放授权方法、装置及开放平台
CN112261022A (zh) 一种基于api网关的安全认证方法
US8635454B2 (en) Authentication systems and methods using a packet telephony device
JP4698751B2 (ja) アクセス制御システム、認証サーバシステムおよびアクセス制御プログラム
US20080282331A1 (en) User Provisioning With Multi-Factor Authentication
US9686270B2 (en) Authentication systems and methods using a packet telephony device
WO2011063658A1 (zh) 统一安全认证的方法和系统
CN116233832A (zh) 验证信息发送方法及装置
JP2004509567A (ja) インターネットプロトコル電話技術セキュリティアーキテクチャ
JP2005222100A (ja) クライアントサーバシステム、サーバ装置及び通信制御方法
JP2003224562A (ja) 個人認証システム及びプログラム
WO2010070456A2 (en) Method and apparatus for authenticating online transactions using a browser
Lear et al. A Simple Authentication and Security Layer (SASL) and Generic Security Service Application Program Interface (GSS-API) Mechanism for OpenID
Parecki The Little Book of OAuth 2.0 RFCs

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BY BZ CA CH CO CR CU CZ DE DK DZ EC EE ES FI GB GD GE GH GM HR ID IL IN IS JP KE KG KP KR KZ LC LK LS LT LU LV MA MD MG MK MN MW MZ NO NZ OM PH PL PT RO RU SD SE SI SK SL TJ TM TN TR TT TZ UA UG UZ VN YU ZA ZM

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ UG ZM ZW AM AZ BY KG KZ RU TJ TM AT BE CH CY DE DK FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 10491093

Country of ref document: US

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP

WWW Wipo information: withdrawn in national office

Country of ref document: JP