WO2005034468A1 - Systeme d'acces a un reseau adapte pour la mise en oeuvre d'un procede a signature simplifiee, et serveur pour sa realisation - Google Patents
Systeme d'acces a un reseau adapte pour la mise en oeuvre d'un procede a signature simplifiee, et serveur pour sa realisation Download PDFInfo
- Publication number
- WO2005034468A1 WO2005034468A1 PCT/FR2004/002272 FR2004002272W WO2005034468A1 WO 2005034468 A1 WO2005034468 A1 WO 2005034468A1 FR 2004002272 W FR2004002272 W FR 2004002272W WO 2005034468 A1 WO2005034468 A1 WO 2005034468A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- authentication
- server
- user
- service provider
- module
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 29
- 230000004044 response Effects 0.000 claims description 36
- 230000008569 process Effects 0.000 claims description 15
- 238000012546 transfer Methods 0.000 claims description 13
- 238000012545 processing Methods 0.000 claims description 8
- 241000239290 Araneae Species 0.000 claims description 4
- 230000006978 adaptation Effects 0.000 claims description 3
- 230000002452 interceptive effect Effects 0.000 claims description 3
- 230000003213 activating effect Effects 0.000 claims description 2
- 230000005540 biological transmission Effects 0.000 abstract description 2
- 230000015654 memory Effects 0.000 description 9
- 230000008901 benefit Effects 0.000 description 4
- 230000006870 function Effects 0.000 description 4
- 230000004048 modification Effects 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000008520 organization Effects 0.000 description 3
- 235000014510 cooky Nutrition 0.000 description 2
- 238000004891 communication Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000001914 filtration Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 239000000344 soap Substances 0.000 description 1
- 230000009897 systematic effect Effects 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0281—Proxies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/104—Grouping of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/2866—Architectures; Arrangements
- H04L67/2876—Pairs of inter-processing entities at each side of the network, e.g. split proxies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/30—Definitions, standards or architectural aspects of layered protocol stacks
- H04L69/32—Architecture of open systems interconnection [OSI] 7-layer type protocol stacks, e.g. the interfaces between the data link level and the physical level
- H04L69/322—Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions
- H04L69/329—Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions in the application layer [OSI layer 7]
Definitions
- Network access system suitable for implementing a simplified signature process, and server for carrying it out.
- the invention relates to a network access system suitable for implementing a simplified signature process, and a server for carrying it out. More specifically, the invention relates to a system comprising: - at least one user station equipped with an internet browser, - a proxy server through which pass all the information flows exchanged between the or each user station and said network, - several service providers connected to said network, each service provider being able to send an authentication request to the station of the user who contacts him to identify and / or authenticate this user before providing him with personalized services and / or secure, the response to be provided by the same user to this authentication request may be different depending on the service provider contacted, - at least one authentication server capable of storing at least one authentication information for each user and transmitting in response to an authentication request an authentication response containing information authentication function both of the service provider who issued the authentication request, and of the identity of the user who contacted this service provider, and - a simplified signature module capable of processing automatically instead of the or each user station the authentication requests sent by the service providers contacted, this module being suitable for each
- SSO Single Sign On
- STEM Sign On Single Sign On
- SSO processes aim to simplify the identification and / or authentication of a user on the world spider web better known under the terms of WEB (World Wide Web). In the remainder of this description, the world spider web will be simply designated by the term internet network.
- the invention aims to remedy this drawback by proposing an access system to a packet switched network suitable for implementing an SSO method in which the modifications to be made to the proxy server are minor and the consequences on the charges to be treated are minor.
- the invention therefore relates to a system as described above, characterized in that it comprises an additional server independent of the proxy server, the simplified signature module being implemented in this additional server, and in that the proxy server is equipped with an interface making it possible to connect the additional server and to transmit at least the authentication requests sent by the service providers contacted to said additional server for processing of these requests by the simplified signature module.
- the simplified signature module includes a sub-module capable of identifying the user from his network address and of adding an identifier of the user to the authentication requests directed to the authentication servers;
- Said at least one authentication information stored for each user comprises information on an authentication level available for this user, in that each authentication request sent by a service provider specifies characteristics on the authentication level required by this service provider to be able to access the services it offers, in that the or each authentication server is able to compare the characteristics on the required level of authentication specified by the information authentication request on the level of authentication available, so as to determine whether the level of authentication required corresponds to the level of authentication available for this user, and in that the or each authentication server is capable of transmitting to the user a active authentication request capable of activating an interactive process on the user's computer identification and / or authentication of the user if the required authentication level does not correspond to the available authentication level;
- the additional server includes a sub-module capable of directing the user's response to active authentication requests to
- the additional server is only able to communicate with service providers via the HTTP flow transfer protocol implemented between it and the proxy server; - the additional server also implements a server and / or an HTTP (Hyper Text Transfer Protocol) client to communicate directly with the or each service provider and / or the or each authentication server only using the HTTP protocol; - It includes an access provider to said network to which the or each user station must be connected to be able to access said network, this access provider being equipped with the proxy server; - said network is the world spider web.
- HTTP Hyper Text Transfer Protocol
- FIG. 1 represents a system, designated by the general reference
- the system 2 comprises numerous user stations having functionalities similar to each other as well as several internet service providers, also having functionalities similar to each other.
- a user station 10 and an access provider 12 have been shown.
- the station 10 is able to navigate on the network 4.
- it is formed, for example, of a conventional computer 14 equipped with a screen and a keyboard as well as an internet browser 16 better known as the English term for "browser".
- System 2 also includes many service provider systems as well as several authentication servers.
- only two service provider systems 20, 22, designated providers, as well as two authentication servers 24, 26 are represented in the figure.
- the service providers 20, 22 are intended to render services to the user of the station 10.
- the provider 20 is a computer server capable of establishing pay slips as a function of the information communicated to it by the user of the station 10.
- the server 20 comprises a module 32 suitable for identifying and authenticating the user of the station 10 so as to personalize and secure the service which it renders to this user.
- the supplier 20 is associated with a memory 30 in which is recorded a list 34 of authentication servers known to the supplier 20 as well as a level 36 of authentication required by this supplier.
- List 34 includes identifiers of the authentication servers containing authentication information specific to identify and authenticate a user with this service provider. Such information is, for example, an authentication level currently available for a given user.
- the authentication level recorded in the memory 30 defines the quality of the authentication required by the supplier 20.
- each authentication level can take any of the integer values between "1" and "5".
- the lower the value of the authentication level the lower the quality of authentication.
- the authentication level 36 is equal to "2".
- the functions performed by the module 32 are described in more detail with reference to FIGS. 3 and 4 and the advantage of the list 34 as well as of the level of authentication will appear on reading the remainder of this description. We will simply mention here the fact that the module 32 is capable of transmitting an HTTP authentication request included in an HTTP response to authenticate the user to the station 10 of this user.
- the supplier 22 allows, for example, the user of the station 10 to remotely manage his bank accounts and also to carry out bank transactions.
- the supplier 22 includes the same elements as those described with regard to the supplier 20 with the exception that the authentication level 36 is replaced by an authentication level 38 equal to "4".
- the authentication servers 24 and 26 are intended to respond to the authentication requests sent by the service providers. To this end, the servers 24 and 26 are each associated with a memory 40, 41 in which is recorded for each user known to this server, authentication information 42, 43. Each authentication information contains the authentication level available for the corresponding user.
- Each authentication server 24, 26 also includes an access control module 44. This module allows the servers 24 and 26 to issue an active authentication request so as to interrogate the user of the station 10 so that he provides a set of information making it possible to identify and authenticate him with a desired authentication level. An information set is, for example, an identifier of the user and his password.
- the access provider 12 is capable of performing the conventional functions of an internet access provider, that is to say in particular of assigning a network address to the station 10 so that the latter can browse the network 4
- the access provider 12 includes an HTTP proxy server (Hyper Text Transfer Protocol) and an access control server 52.
- the existing HTTP protocol is a communication protocol used for the exchange of data between HTTP clients and HTTP servers known as web servers.
- the proxy server is placed in flow cutoff between the station 10 and the network 4, that is to say that all of the information flows exchanged between the browser 16 of the station 10 and the network 4 passes through the proxy server 50. Thus, the proxy server 50 sees all of the HTTP requests and responses sent by the station 10 or to the station 10.
- the access control server 52 is capable of identifying and authenticate the user of station 10 before authorizing this station 10 to connect to network 4 and to navigate on it.
- the user of the station 10 identifies himself to the server 52 by providing a set of information containing an identifier known by the English term of "login" and a password. If the user is correctly identified and authenticated, that is to say that the set of information which he has provided corresponds to a valid subscription with this access provider, the server 52 assigns to this user a network address, that is to say here an IP address (Internet Protocol) for browsing the network 4. Otherwise, the server 52 prohibits any connection to the network 4.
- IP address Internet Protocol
- the server 52 is also capable of recording in a memory 54 with which there is associated a list 56 containing for each IP address assigned to a user, the identifier of the corresponding user. This list is updated automatically by the server 52.
- the access provider 12 includes an iCAP server 60 (Internet
- the existing iCAP protocol is standardized by the IETF organization (Internet Engineering Task Force) for the systematic transformation of content on the Internet.
- the server 60 and the server 50 are able to communicate with each other by implementing the iCAP protocol.
- the server 50 is able to communicate to the server 60 HTTP requests or responses present in the information flows exchanged between the station 10 and the network 4 and the server 60 is also capable of transmitting HTTP requests or responses after having modified them at the server 50.
- the proxy server 50 is equipped with an iCAP 64 interface comprising a connector making it possible to connect it to the server 60.
- the interface 64 is here configured for transmitting to the server 60 only the HTTP requests or responses which must be modified for the implementation of the SSO method.
- the server 60 is equipped with an SSO module 66 capable of supporting all the specific processing required by the implementation of the method
- This module 66 comprises three sub-modules 68, 70 and 72 each corresponding to an iCAP service. These sub-modules will be described in more detail with reference to each of FIGS. 3 and 4.
- the server 60 is associated with the memory 54 which also contains a list 76 of the authentication servers known by each user. This list 76 groups together for each user, the identifiers of the various authentication servers in which authentication information for this user is stored.
- the server 60 also implements an HTTP client. To this end, it is connected to the network 4 via an additional HTTP proxy server 74 which can be independent and distinct from the proxy server 50. All the servers of the system 2 are produced from conventional programmable electronic computers. capable of executing instructions recorded on an information recording medium.
- the memories 30, 40, 41 and 54 include instructions for the execution of the SSO method of FIGS. 2 to 4 when said instructions are executed by these computers.
- the operation of the system 2 will now be described with reference to FIGS. 2 to 4.
- an identifier of the server 24 is recorded in the list 76 of the authentication servers known to the user.
- the lists 34 of the service providers are updated.
- the user of the station 10 connects, during a step 94, to the network 4.
- the user enters, during an operation 96, a set of information making it possible to identify it and to authenticate it with the server 52.
- the server 52 assigns an IP address to it and records the relationship between this network address and the identifier of this user in the list 56. Then, the server 52 informs, during an operation 100, the different authentication servers known to this user that the user has been correctly identified and authenticated. This identification and authentication performed by the server 52 is here associated with an authentication level equal to
- the authentication servers memorize that the level of authentication available is equal to "2".
- the user connects, for example, during a step 104, to the service provider 20.
- the module 32 of the provider 20 then sends in response, during an operation 106, an HTTP authentication request included in an HTTP response to the station
- This request is intercepted by the proxy server 50 then processed by the iCAP server 60 and finally transmitted to the authentication server 24.
- This authentication request comprises the authentication level 36.
- the server 24 verifies, during a step 108, that the authentication level available for this user is at least equal to "2".
- the authentication level available being equal to that required by the supplier 20
- the server 24 transmits, during a step 110, an authentication response containing an authentication certificate to the supplier 20.
- This certificate informs the supplier 20 that the required level of authentication is available.
- the supplier 20 having received the certificate then offers, during a step 112, to this user a personalized and / or secure service without the user needing to identify himself to the supplier 20.
- the supplier 20 suggests printing a pay sheet with his name.
- the user 10 connects at 14 to the service provider 22. This provider 22 then performs the operation 106.
- the authentication server 24 finds that the level authentication required by the provider 22 is greater than that currently available for this user.
- the server access control module 44 then proceeds to an active authentication step 120 during which it interrogates the user, so as to identify and authenticate the latter with an authentication quality corresponding to the level d authentication "4". For example, module 44 asks the user to enter personal information such as his date of birth. If the user of the station 10 has been correctly identified and authenticated with an authentication level "4", the server 24 records the new authentication level available in its memory 40 and proceeds to step 110. Then, the supplier 22 offers, during a step 122, a personalized and / or secure service to this user.
- the browser 16 of the station 10 sends an HTTP request to the module 32 of a service provider, for example the provider 20.
- This request is routed, during an operation 130, to the proxy server 50.
- the interface 64 intercepts this request and transmits it, during an operation 132, to the server 60 and more precisely to the submodule 68.
- the submodule 68 adds a header to the HTTP request indicating that the system 2 supports a method SSO and retransmits, during an operation 134 this HTTP request thus modified to the proxy server 50.
- the proxy server then transmits the modified HTTP request to the service provider during an operation 136.
- the module 32 of the service provider detects the presence of the header added by the sub-module 68 and, in response, sends, during an operation 138, an authentication request to the browser 16.
- the authentication request is, for example, SOAP compliant (Singl e Object Access Protocol) standardized by the W3C (World Wide Web Consortium) organization.
- This authentication request comprises in particular an identifier of the service provider, a copy of the list 34 of known authentication servers, the level of authentication required by this provider and, for example, an instruction known under the English terms "set cookie "intended to record an identifier of the authentication request on computer 10 or, as a variant, directly an identifier of the request.
- the interface 64 of the proxy server 50 intercepts this authentication request and directs it, during an operation 140, to the submodule 70 of the server 60.
- the sub-module 70 compares, during an operation 142, the list 34 received to the list 56 to select the authentication server to be contacted, for example, here the server 24. If there is no server authentication common to the list 34 received and to the list 56, the sub-module 70 sends an incompatibility message to the service provider that issued the authentication request.
- This incompatibility message includes the identifier of the authentication request, so that the module 32 can link this response to the corresponding authentication request.
- the identifier of the authentication request is, for example, that contained in the "set cookie" instruction.
- the sub-module 70 determines, during an operation 144, the identity of the user of the station 10 by comparing the network address of the station 10 to the list 76. This address will have been provided by the proxy server 50 to the submodule 70 during operation 140 via a field in the HTTP header. Once the user has been identified, the sub-module 70 performs an operation 148 for transmitting the authentication request received associated with the identifier of the user obtained during operation 144, to the authentication server selected during of operation 142. The server 24 compares, during an operation 150, the level of authentication available to the user with that required by the service provider. In the case where the required authentication level is higher than that currently registered by the server 24, the latter proceeds as described with reference to FIG. 4.
- the server 24 sends during an operation 152, an authentication response to the server 60.
- the submodule 70 receives the authentication response and transmits it, during an operation 156, to the service provider via the proxy server 74 and using the HTTP protocol .
- This authentication response includes, if necessary, a user identifier.
- the service provider responds to this authentication response by transmitting to the server 60, during an operation 158, for example, a personalized home page.
- This response is transmitted via the proxy server 74 to the server 60 using the HTTP protocol.
- the sub-module 70 redirects, during an operation 160, this response to the proxy server 50 using the iCAP protocol which in turn redirects it, during an operation 162, to the browser 16 using the HTTP protocol.
- FIG. 4 represents the circulation of information between the various devices of the system 2 in the particular case where the level of authentication required by the contacted service provider is higher than that currently stored in the memory 40 of the server 24.
- the devices and the operations already described opposite Figures 1 and 3 bear the same references and the new operations are shown in bold lines.
- the server 24 has established that the required authentication level is higher than that currently available to the user. Consequently, it proceeds to an operation 180 during which the module 44 transmits an active authentication request to the server 60 contained in an HTTP response and using the HTTP protocol.
- the active authentication request is intended to activate on the browser 16 an interactive authentication process.
- this request here includes a form to be completed by the user.
- the sub-module 70 retransmits during an operation 182, this active authentication request to the proxy server 50 using the iCAP protocol, then the proxy server 50 retransmits it, during an operation 184, to the browser 16 in using the HTTP protocol.
- the browser 16 displays the form which allows the user to identify and authenticate with a higher authentication level, for example, equal to "4" in the case of the service provider 22.
- the browser 16 sends, during an operation 186, the response in an HTTP request.
- This response is intercepted by the interface 64 of the server 50 and transmitted, during an operation 188, to the sub-module 72 using the protocol iCAP.
- the sub-module 72 then retransmits, during an operation 190, the response of the user using the HTTP protocol to the server 24.
- the server 24 stores, during an operation 192, the new authentication level available in the memory 40 and then proceeds to operation 152.
- the following operations are identical to those described with reference to FIG. 2 except that the operations 152, 156, 158 and 160 involve the submodule 72 in place of the submodule 70.
- Most of the existing proxy servers include already an iCAP interface.
- the iCAP server 60 communicates directly using the HTTP protocol with the service provider (s) during operations 156 and 158.
- the iCAP server communicates with service providers only through the iCAP protocol. For example, in this variant, the HTTP requests sent to the service provider during operation 156 are first transmitted by the server 60 to the proxy server 50 using the iCAP protocol and then the proxy server 50 transmits these requests to the service provider using the HTTP protocol.
- the HTTP response sent by the service provider during operation 158 follows the reverse path of the request sent during operation 156.
- the server 60 never communicates directly with the service providers so that those -these are not aware of the existence of the server 60.
- the use of the server 60 is then completely transparent for these service providers.
- This variant has the advantage that from the point of view of the service provider, all the exchanges of information take place between him and the user without being aware of the existence of the server 60.
- This variant also has the advantage that the HTTP requests issued and received during operations 156 and 158 are directly exchanged with the proxy server 50 and no longer via the sub-module 70 which accelerates the processing of these operations.
- the sub-modules 68 to 72 have been described in the particular case where they are all implemented in the same iCAP server 60.
- these sub-modules are each implemented in an iCAP server independent of the others.
- the interface 64 is configured to intercept only HTTP requests which must be processed by the iCAP server.
- the interface 64 is configured to redirect all the HTTP information flows to the iCAP server and the iCAP server implements a filtering module capable of sending to the processing module 66 only the HTTP requests which must be processed by this module .
- the interception of HTTP requests is not carried out by the proxy server 50 but by the iCAP server.
- the system 2 has been shown in the particular case where the authentication servers are connected to the internet service provider via the network 4.
- At least one of these authentication servers is housed at the internet access provider and connected to it via a local network independent of network 4.
- This advantageous mode of implementation will allow it to benefit from all the identifications / authentications carried out by the access provider and which cannot be shared with external authentication providers for security reasons;
- the iCAP server is connected to the proxy server 50 via a long distance network and no longer via a link or a local network.
- the system 2 has been described in the particular case where the first authentication of each user is carried out by the internet service provider 12. As a variant, this first authentication is no longer performed by the internet service provider 12 but, by for example, by the first service provider contacted by the user.
- the identification and authentication of the user have been described in the particular case where this is done from a terminal 10 equipped with a screen and a keypad which allows entering a set of identification and authentication information.
- the first identification and authentication of the user is carried out automatically, for example, by identifying the terminal used by this user. More specifically, when the terminal 10 is replaced by a mobile telephone, the identification and authentication of the user is done automatically by acquiring the telephone number of the terminal. In this case, the authentication is said to be transparent.
- the system 2 has also been described in the particular case where the authentication servers memorize only the authentication level available for each user, which reinforces the security of the system since it is not desirable for all of the words of password and other secret user information are saved in one place.
- these authentication servers also memorize as authentication information the set or sets of identification and authentication information that each user is likely to use to identify and authenticate themselves. with each service provider.
- the authentication response includes the set of identification and authentication information to be transmitted to the service provider so that the latter identifies and authenticates the user.
- This set of identification and authentication information is transmitted to the service provider in a similar manner to what has been described for the authentication certificate.
- the system 2 has been described in the particular case where the authentication request sent by each service provider includes an authentication level. Alternatively, the authentication request sent by one of the service providers does not include an authentication level.
- the contacted authentication server provides, in response, an authentication certificate simply indicating that the user has been authenticated.
- the user will have access to the services of the service provider from the moment when he has been authenticated at least once and this regardless of the level of this authentication.
- the system 2 has been described in the particular case where the network 4 is the internet network. However, as a variant, this network 4 is any information transmission network such as a local area network, any packet switched network or a circuit switched network.
- the system 2 has been described in the particular case where the authentication servers are able to issue active authentication requests when these do not have a satisfactory authentication for the user. As a variant, the authentication servers are not able to issue these active authentication requests.
- system 2 has been described in the particular case where the HTTP stream transfer protocol is the iCAP protocol.
- the iCAP protocol can be replaced by any other HTTP flow transfer protocol such as for example the OCP protocol (OPES Call Out Protocol) with OPES (Open Pluggable Edge Services).
- OCP protocol OPES Call Out Protocol
- OPES Open Pluggable Edge Services
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer And Data Communications (AREA)
- Information Transfer Between Computers (AREA)
Abstract
Description
Claims
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/572,949 US7823188B2 (en) | 2003-09-23 | 2004-09-07 | Network access system which is adapted for the use of a simplified signature method, and server used to implement same |
EP04787325A EP1668868A1 (fr) | 2003-09-23 | 2004-09-07 | Systeme d acces a un reseau adapte pour la mise en oeuvre d'un procede a signature simplifiee, et serveur pour sa realisation |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR0311153 | 2003-09-23 | ||
FR0311153A FR2860111A1 (fr) | 2003-09-23 | 2003-09-23 | Systeme d'acces a un reseau adapte pour la mise en oeuvre d'un procede a signature simplifiee, et serveur pour sa realisation |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2005034468A1 true WO2005034468A1 (fr) | 2005-04-14 |
Family
ID=34224427
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/FR2004/002272 WO2005034468A1 (fr) | 2003-09-23 | 2004-09-07 | Systeme d'acces a un reseau adapte pour la mise en oeuvre d'un procede a signature simplifiee, et serveur pour sa realisation |
Country Status (4)
Country | Link |
---|---|
US (1) | US7823188B2 (fr) |
EP (1) | EP1668868A1 (fr) |
FR (1) | FR2860111A1 (fr) |
WO (1) | WO2005034468A1 (fr) |
Families Citing this family (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2893208A1 (fr) * | 2005-11-09 | 2007-05-11 | France Telecom | Procede et dispositif de fourniture d'un alias de federation d'identite reseau a un fournisseur de service |
DE102007007345A1 (de) * | 2007-02-14 | 2008-08-21 | Siemens Enterprise Communications Gmbh & Co. Kg | Verfahren und Anordnung zum Bereitstellen eines drahtlosen Mesh-Netzwerks |
US20090064291A1 (en) * | 2007-08-28 | 2009-03-05 | Mark Frederick Wahl | System and method for relaying authentication at network attachment |
US8353052B2 (en) * | 2007-09-03 | 2013-01-08 | Sony Mobile Communications Ab | Providing services to a guest device in a personal network |
US8856908B2 (en) * | 2009-02-12 | 2014-10-07 | Comcast Cable Communications, Llc | Management and delivery of profile data |
US20100228987A1 (en) * | 2009-03-06 | 2010-09-09 | Sony Corporation | System and method for securing information using remote access control and data encryption |
US8327434B2 (en) * | 2009-08-14 | 2012-12-04 | Novell, Inc. | System and method for implementing a proxy authentication server to provide authentication for resources not located behind the proxy authentication server |
US10079864B2 (en) * | 2012-01-06 | 2018-09-18 | Microsoft Technology Licensing, Llc | Communicating media data |
US9369282B2 (en) * | 2014-01-29 | 2016-06-14 | Red Hat, Inc. | Mobile device user authentication for accessing protected network resources |
GB2524010A (en) * | 2014-03-10 | 2015-09-16 | Ibm | User authentication |
CN114065186A (zh) * | 2021-11-17 | 2022-02-18 | 四川启睿克科技有限公司 | 基于es6实现单点登录和子系统登录自动切换的方法 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2001080067A1 (fr) * | 2000-04-14 | 2001-10-25 | Yodlee.Com, Inc. | Procede et appareil pour assurer l'acces des services d'enregistrement automatique a des sites internet pour des abonnes a des portails internet |
US6317838B1 (en) * | 1998-04-29 | 2001-11-13 | Bull S.A. | Method and architecture to provide a secured remote access to private resources |
US20020007460A1 (en) * | 2000-07-14 | 2002-01-17 | Nec Corporation | Single sign-on system and single sign-on method for a web site and recording medium |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5923756A (en) * | 1997-02-12 | 1999-07-13 | Gte Laboratories Incorporated | Method for providing secure remote command execution over an insecure computer network |
US6584505B1 (en) * | 1999-07-08 | 2003-06-24 | Microsoft Corporation | Authenticating access to a network server without communicating login information through the network server |
EP1104133A1 (fr) * | 1999-11-29 | 2001-05-30 | BRITISH TELECOMMUNICATIONS public limited company | Configuration d'accès à un réseau |
JP4626784B2 (ja) * | 2000-05-19 | 2011-02-09 | ソニー株式会社 | 通信装置および通信方法、並びに記録媒体 |
KR100461734B1 (ko) * | 2000-07-24 | 2004-12-13 | 유미특허법인 | 인터넷을 통한 컨텐츠 제공 시스템 및 그 방법 |
JP2003016295A (ja) * | 2001-06-28 | 2003-01-17 | Nec Corp | オンラインショッピング方法及びそのシステム並びにプログラム |
US20030115142A1 (en) * | 2001-12-12 | 2003-06-19 | Intel Corporation | Identity authentication portfolio system |
US7234158B1 (en) * | 2002-04-01 | 2007-06-19 | Microsoft Corporation | Separate client state object and user interface domains |
JP4309629B2 (ja) * | 2002-09-13 | 2009-08-05 | 株式会社日立製作所 | ネットワークシステム |
US7240192B1 (en) * | 2003-03-12 | 2007-07-03 | Microsoft Corporation | Combining a browser cache and cookies to improve the security of token-based authentication protocols |
-
2003
- 2003-09-23 FR FR0311153A patent/FR2860111A1/fr active Pending
-
2004
- 2004-09-07 EP EP04787325A patent/EP1668868A1/fr not_active Withdrawn
- 2004-09-07 WO PCT/FR2004/002272 patent/WO2005034468A1/fr active Application Filing
- 2004-09-07 US US10/572,949 patent/US7823188B2/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6317838B1 (en) * | 1998-04-29 | 2001-11-13 | Bull S.A. | Method and architecture to provide a secured remote access to private resources |
WO2001080067A1 (fr) * | 2000-04-14 | 2001-10-25 | Yodlee.Com, Inc. | Procede et appareil pour assurer l'acces des services d'enregistrement automatique a des sites internet pour des abonnes a des portails internet |
US20020007460A1 (en) * | 2000-07-14 | 2002-01-17 | Nec Corporation | Single sign-on system and single sign-on method for a web site and recording medium |
Non-Patent Citations (1)
Title |
---|
"Liberty Architecture Overview, Version 1.1", LIBERTY PROJECT, 15 January 2003 (2003-01-15), XP002246163, Retrieved from the Internet <URL:http://projectliberty.org/specs/archive/v1_1/liberty-architecture-ove rview-v1.1> [retrieved on 20030702] * |
Also Published As
Publication number | Publication date |
---|---|
US7823188B2 (en) | 2010-10-26 |
US20070056021A1 (en) | 2007-03-08 |
FR2860111A1 (fr) | 2005-03-25 |
EP1668868A1 (fr) | 2006-06-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9438633B1 (en) | System, method and computer program product for providing unified authentication services for online applications | |
EP3008872B1 (fr) | Procédé d'authentification d'un terminal par une passerelle d'un réseau interne protégé par une entité de sécurisation des accès | |
CN112468481B (zh) | 一种基于CAS的单页和多页web应用身份集成认证方法 | |
EP1909462B1 (fr) | Procédé de mise à disposition cloisonnée d'un service électronique | |
EP1891771A1 (fr) | Procede de traduction d'un protocole d'authentification | |
EP1668868A1 (fr) | Systeme d acces a un reseau adapte pour la mise en oeuvre d'un procede a signature simplifiee, et serveur pour sa realisation | |
WO2006010810A2 (fr) | Procede et systeme de certification de l’identite d’un utilisateur | |
EP1227640B1 (fr) | Procédé et système de communication d'un certificat entre un module de sécurisation et un serveur | |
EP1649665A2 (fr) | PROCEDE ET SYSTEME DE DOUBLE AUTHENTIFICATION SECURISEE D UN UTILISATEUR LORS DE L ACCES A UN SERVICE PAR L&rsquo;INTERM EDIAIRE D UN RESEAU DE TRANSMISSION DE DONNEES. | |
FR2844943A1 (fr) | Procede de production d'un premier identifiant isolant un utilisateur se connectant a un reseau telematique | |
CA2403383C (fr) | Systeme, procede et produit de programme informatique pour fournir des services d'authentification unifies pour applications en ligne | |
EP4128700A1 (fr) | Procede et dispositif d'authentification d'un utilisateur aupres d'une application | |
EP4362391A1 (fr) | Procédé de gestion d'accès d'un utilisateur à au moins une application, programme d'ordinateur et système associés | |
FR3017729A1 (fr) | Procede d'authentification a distance | |
FR2862170A1 (fr) | Procede de transfert de donnees confidentielles en coeur de reseaux | |
FR3076638A1 (fr) | Procede de gestion d'un acces a une page web d'authentification | |
WO2002096061A2 (fr) | Dispositif de communication electronique securise | |
FR2825214A1 (fr) | Dispositif de communication electronique securise, notamment d'acces electronique securise | |
WO2007012786A2 (fr) | Procede de mise en oeuvre d'une sequence d'authentifications | |
WO2002089447A2 (fr) | Systeme et procede de communication entre stations traitant des dossiers communs | |
WO2017060624A1 (fr) | Moyens de gestion d'accès à des données | |
FR2741219A1 (fr) | Procede de realisation de transfert securise de donnees sur un reseau a serveurs multiples | |
FR2937816A1 (fr) | Procede et fonctionnement d'identification convergente d'utilisateur de reseau de communication |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2004787325 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2007056021 Country of ref document: US Ref document number: 10572949 Country of ref document: US |
|
WWP | Wipo information: published in national office |
Ref document number: 2004787325 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 10572949 Country of ref document: US |