WO2006010810A2 - Procede et systeme de certification de l’identite d’un utilisateur - Google Patents
Procede et systeme de certification de l’identite d’un utilisateur Download PDFInfo
- Publication number
- WO2006010810A2 WO2006010810A2 PCT/FR2005/001562 FR2005001562W WO2006010810A2 WO 2006010810 A2 WO2006010810 A2 WO 2006010810A2 FR 2005001562 W FR2005001562 W FR 2005001562W WO 2006010810 A2 WO2006010810 A2 WO 2006010810A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- terminal
- server
- identity
- user
- connection
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
Definitions
- the present invention relates to a method and system for certifying the identity of a user.
- the invention applies more particularly to the certification of the identity of a user of a terminal during a request for authentication of said user, after at least one access control to a packet network.
- This packet network may be a public packet network for IP (Internet Protocol) transmission, in particular the Internet network, or a private network for IP transmission packets, such as the intranet network of a company, or well any other network of packets for which the access of the users is controlled by a protocol of the AAA type (Authentication, Authorization and Accounting, ie authentication, authorization and accounting).
- IP Internet Protocol
- AAA Authentication, Authorization and Accounting
- the access control to a packet network is achieved by an identification and authentication procedure, with at least one identifier and a password. After validation of the access control, the user receives an authorization to transmit information on the network to which he has connected.
- a public IP address is first assigned to the user's terminal. Then, when the connection to the intranet is actually active, the terminal uses a private IP address corresponding to the addressing domain of the intranet.
- the terminal of the user uses his own permanent IP address regardless of access to the network.
- Gold 1 processes and existing identification and authentication systems rely on the IP address assigned to the user terminal via the packet network to carry identification while in some configurations (private intranet, Mobile IP, ...) the terminal uses an IP address different from that assigned by the packet network to which the user accesses.
- the technical problem to be solved by the object of the present invention is to propose a method and a system for certifying the identity of at least one user of a terminal, after at least one access control to a terminal.
- Packet network which would allow the user to avoid the multiplication of identification and authentication procedures, after performing access control to a packet network.
- connection indicator by the identity server in the database associated with said correlation element; transmitting the connection indicator by the terminal to a service provider when requesting a connection to said provider of a connection; services,
- connection cookie also known as “cookie”
- cookie a set of information from the identity server and automatically stored in the terminal when a connection to said identity server.
- a system for certifying the identity of at least one user of a terminal, after at least one access control to a packet network is remarkable in that said system comprises:
- an access server able to receive at least one correlation element from said terminal during a connection request to said packet network
- an identity server capable of transmitting a connection indicator to the terminal after receiving a request from said terminal
- a proxy server capable of transmitting said correlation element and at least one identifier of said user, from the access server, to at least one database linked to the identity server, the terminal being able to transmit said control witness; connection during a connection request to a service provider to retrieve said user identifier transmitted during access control to the packet network.
- the technical result obtained aims at reusing the identity certification, already performed by the user during access control to the packet network when accessing a service provider accessible only after a new access control.
- the system and the method according to the invention thus provide a simplification of access to a service provider through the use of the certification of the identity of the user already made during the access control to a network packets, for example the Internet network or a private IP network.
- a network packets for example the Internet network or a private IP network.
- the terminal When requesting the connection to the packet network, the terminal includes at least one correlation element in a request to an access server.
- the access server relays the packet network access control procedure to an authentication server using an Authentication, Authorization and Accounting (AAA) type protocol (authentication, authorization, and accounting).
- AAA Authentication, Authorization and Accounting
- said correlation element will make it possible to retrieve at least the user's identifier, stored in a database connected to the identity server.
- the identity server manages the deposit of a connection indicator on the terminal, when the latter issues a request after the first access control is made.
- the identity server responds to the identity certification requests of the user who wishes to connect to a service provider.
- the said connection indicator serves as a reference key for the database of data connected to the identity server to know the authentication already performed by the user when connecting to the packet network.
- said method and system for certifying the identity of a user in accordance with the invention, allow identification and authentication independently of the IP address assigned to the user's terminal by said packet network, unlike existing systems.
- said correlation element is an indifferently random or pseudo-random number provided by the terminal to at least one authentication server located in the packet network.
- the terminal transmits a correlation element to the access server, which relays it to an authentication server.
- Said correlation element, with the user's identifier, is then stored in a database connected to the identity server.
- at least one authentication request from the service provider is transmitted to the identity server using a redirection mechanism.
- the user accesses a service, provided by a service provider, that requires identity certification.
- the service provider issues an authentication request.
- This request is transmitted to the identity server using a redirection mechanism, which allows the transmission of the latter to the identity server.
- the connection indicator received during the connection request to said service provider, is thus transmitted by the service provider to the identity server.
- the redirection mechanism towards the identity server avoids the realization of a second access control for the connection to the service provider and allows the use of the certification of the identity of the user, already carried out during the control d : access for connection to the packet network.
- the said connection indicator is used as a key for consulting the said database by the identity server in order to know the identifier of the user.
- the identity server has transmitted a connection cookie to the terminal which, in turn, transmits this cookie upon a connection request to a service provider.
- the identity server On receipt of the known connection indicator, thanks to the redirection mechanism, the identity server consults the database with the connection indicator used as a consultation key. In return, the identity server obtains the user's ID (or User ID).
- said terminal is configured to store at least one correlation element transmitted during a connection request to said packet network, to transmit at least one request including said correlation element to at least one server of identity, to store at least one connection indicator from said identity server and to transmit said connection indicator during a connection request to a service provider.
- the terminal includes an application for storing a correlation element, which is transmitted to an identity server by remission of an http request.
- Said application of the terminal also allows processing related to the response of said identity server and the filing of a connection indicator, stored by the terminal and transmitted during the connection request to a service provider requiring a certification of 'identity.
- FIG. 1 represents the general architecture of a system for certifying the identity of a user, according to the invention, during a connection to a packet network.
- Figure 2 shows the general architecture of said certification system of the identity of a user, when connecting to a service provider.
- a user wishes to access a service provider 30 through a packet network 20 with which he connects via a terminal 10.
- the terminus 10 of the user can be of any kind, for example a personal computer or PC, a mobile terminal or any other terminal equipped to control a connection request to said packet network, and called UE (User Equipment) on the FIG. 1.
- the user is subscribed to a telecommunications operator and, depending on the nature of said terminal 10, is connected to a telecommunications network of said indifferently fixed or mobile operator.
- the packet network 20 may be a public packet network for IP (Internet Protocol) transmission, in particular the Internet network, or a private network of IP transmission packets 1 such as a corporate intranet network. or any other packet network for which user access is controlled by an Authentication, Authorization and Accounting (AAA) protocol, defined by NETF.
- IP Internet Protocol
- AAA Authentication, Authorization and Accounting
- the service provider 30 provides various services 31,
- the terminal 10 transmits a connection request to a packet network access server 11, which relays it to at least one authentication server 21, in particular a Radius server (Remote Authentication Dial-ln User Service), located in the packet network to which the connection has been requested
- the access server 11 may for example be a Network Access Server (NAS) or Broadband Access Server (BAS) type device.
- NAS Network Access Server
- BAS Broadband Access Server
- the terminal 10 and the access server 11 s are therefore carried out indifferently at low bit rate or broadband and use for example a PPP transmission protocol (point-to-point protocol).
- the terminal 10 also transmits at least one identifier of the user (or User ID), as well as at least one correlation element, to the access server 11 and to the user. authentication server 21.
- the correlation element is, in particular, an indifferently random or pseudo-random number, provided by the terminal 10 to an authentication server 21 located in the packet network.
- the correlation element can be supplied to the terminal 10 by the access server 11 during the connection request to the packet network 20, at the opening of the PPP protocol (LCP layer) dialogue, or the terminal 10 may use data provided by the access server 11 to constitute said correlation element.
- PPP protocol LCP layer
- the terminal 10 includes an application for managing at least one PPP (point-to-point protocol) stack.
- PPP point-to-point protocol
- the terminal 10 is configured to store a data received during the packet network connection request and transmitted by the access server 11. Said correlation element is also stored by the terminal 10.
- the access server 11 transmits the connection request to a proxy server 12, for example of the Radius type, through which the information exchanged between each user terminal and the authentication server 21 flows. Said proxy server 12 then transmits the connection request to the authentication server 21, in particular a Radius server.
- a connection request at least one packet network access control is provided, which is performed by an identification and authentication procedure, for example with at least one identifier (known as "login"). ") And a password.
- the authentication server 21 transmits a packet network connection authorization for the terminal 10.
- the connection request is stored in a database data (BdD) connected to the authentication server 21.
- the protocol Radius specific for authentications, is defined by NETF and standardized by the organization ETSI (European Telecommunications Institute Standards, ie European Telecommunications Standardization Institute).
- the proxy server 12 transmits the identifier of the user (or User ID) and the correlation element, from the access server 11, to a database 13 connected to to an identity server 14.
- Said base data 13 memorizes "IElement correlation with the user identifier transmitted by the terminal 10 when the connection request to the packet network.
- the proxy server 12 acknowledges the connection request from the terminal 10 to the network 20 of packets.
- the terminal 10 then transmits a request, including the correlation element, to the identity server 14 via the access server 11 and a router equipment 22 located in the network 20 of packets.
- the request may be a request implementing a hyper text transfer protocol (http) type transfer protocol, usually used to transmit information, in particular to include said correlation element.
- http hyper text transfer protocol
- the identity server 14 After receiving the request, the identity server 14 transmits a connection indicator to the terminal 10, intended to be automatically stored by said terminal 10.
- the terminal 10 is configured for sending at least one request, for example a request implementing an http flow transfer protocol, to the identity server 14, as well as for processing linked to the server's response. 14 the receipt and storage of a cookie.
- the identity server 14 contacts the database 13, in which the user identifier (or User ID) and the associated correlation element are already stored. With the received and known correlation element, the identity server 14 updates the database 13 by adding the connection indicator, transmitted to the terminal 10, associated with the correlation element.
- connection indicator is stored in the database 13, associated with the correlation element.
- the database 13 may or may not be physically included in the identity server.
- the terminal 10 Upon the request to connect to the service provider, the terminal 10 also transmits at least the connection cookie to the service provider.
- the connection indicator will make it possible to retrieve the identifier of the user, stored during the packet network access control in said database 13 connected to the identity server 14. The transmission is performed via the access server 11 and the router equipment 22.
- the service provider 30 issues an authentication request.
- the request is transmitted to the identity server 14 using a redirection mechanism, which allows the transmission thereof to the identity server 14.
- the received connection indicator is transmitted by the service provider to the identity server.
- the redirection mechanism can, for example, be similar to those implemented from the recommendations defined by the consortium of companies called Liberty Alliance, whose purpose is the development of transactions on the Internet.
- the redirection mechanism towards the identity server 14 avoids the realization of a second access control for the connection to the service 31,
- the identity server 14 will recognize the connection indicator allowing to find the identifier of the user stored in the database 13. On receipt of the known connection indicator, the identity server 14 consults the database 13 with the connection indicator used as the consultation key. In return, the identity server 14 obtains the user identifier (or User ID). The connection cookie is used as a key for consulting the database 13 by the identity server 14 to know the identifier of the user.
- the identity server 14 transmits said user identifier to the service provider 30 avoiding new authentication of the user, after the authentication already performed during access control to the packet network.
- the service provider 30 therefore recognizes the user and obtains a certification of his identity by the identity server 14.
- the identity server 14 certifies the identity of the user to the service provider 30 by using the certification of the identity of the user performed during access control to said packet network.
- the identity server 14 may also specify the type of authentication used by said user, so as to indicate (if necessary) the reliability of the certification transmitted by the identity server 14 to the service provider 30.
- the service provider 30 then transmits the connection authorization to the terminal 10.
- the user identifier or User ID
- a random or pseudo random correlation element as described above.
- the service provider 30 receives the certification of the identity of the user by the identity server 14.
- this identity certification is performed from the user ID (or User ID).
- This can also be done from an equivalent identity, contained in said database 13.
- the user has previously transmitted the information corresponding to said equivalent identity.
- the user also indicates his preference as to the use by the identity server 14 of either the identifier of the user (or User Id) 1 or the equivalent identity.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Computer And Data Communications (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
Claims
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/630,938 US20080052771A1 (en) | 2004-06-29 | 2005-06-21 | Method and System for Certifying a User Identity |
EP05778769A EP1762037A2 (fr) | 2004-06-29 | 2005-06-21 | Procede et systeme de certification de l'identite d'un utilisateur |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR0451363A FR2872363A1 (fr) | 2004-06-29 | 2004-06-29 | Procede et systeme de certification de l'identite d'un utilisateur |
FR0451363 | 2004-06-29 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2006010810A2 true WO2006010810A2 (fr) | 2006-02-02 |
WO2006010810A3 WO2006010810A3 (fr) | 2006-11-02 |
Family
ID=34945700
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/FR2005/001562 WO2006010810A2 (fr) | 2004-06-29 | 2005-06-21 | Procede et systeme de certification de l’identite d’un utilisateur |
Country Status (4)
Country | Link |
---|---|
US (1) | US20080052771A1 (fr) |
EP (1) | EP1762037A2 (fr) |
FR (1) | FR2872363A1 (fr) |
WO (1) | WO2006010810A2 (fr) |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8910255B2 (en) * | 2008-05-27 | 2014-12-09 | Microsoft Corporation | Authentication for distributed secure content management system |
US7600253B1 (en) * | 2008-08-21 | 2009-10-06 | International Business Machines Corporation | Entity correlation service |
US8327434B2 (en) * | 2009-08-14 | 2012-12-04 | Novell, Inc. | System and method for implementing a proxy authentication server to provide authentication for resources not located behind the proxy authentication server |
WO2014128732A1 (fr) * | 2013-02-25 | 2014-08-28 | P Ashok Anand | Procédé de génération d'identité de corrélation pour environnement en nuage |
US10084863B2 (en) | 2013-02-25 | 2018-09-25 | P. Ashok Anand | Electronic switching system for generating correlation identity |
JP6287401B2 (ja) * | 2014-03-18 | 2018-03-07 | 富士ゼロックス株式会社 | 中継装置、システム及びプログラム |
CN108282475B (zh) * | 2018-01-18 | 2020-09-08 | 世纪龙信息网络有限责任公司 | 用户标识信息读取方法和系统、计算机存储介质及设备 |
FR3103072A1 (fr) | 2019-11-08 | 2021-05-14 | Orange | procédé de configuration d’accès à un service Internet |
-
2004
- 2004-06-29 FR FR0451363A patent/FR2872363A1/fr active Pending
-
2005
- 2005-06-21 US US11/630,938 patent/US20080052771A1/en not_active Abandoned
- 2005-06-21 EP EP05778769A patent/EP1762037A2/fr not_active Withdrawn
- 2005-06-21 WO PCT/FR2005/001562 patent/WO2006010810A2/fr active Application Filing
Non-Patent Citations (4)
Title |
---|
CHU S, GOOD D: "Product Selection for Web-based Single Sign-On Solutions" INFORMATION SECURITY BULLETIN, CHI PUBLISHING LTD., mars 2000 (2000-03), pages 29-38, XP002252024 * |
MENEZES, OORSCHOT, VANSTONE: "Handbook of Applied Cryptography, PASSAGE" HANDBOOK OF APPLIED CRYPTOGRAPHY, CRC PRESS SERIES ON DISCRETE MATHEMATICS AND ITS APPLICATIONS, 1997, pages 397-399, XP002296840 BOCA RATON, FL, US ISBN: 0-8493-8523-7 * |
SAMAR V: "Single sign-on using cookies for Web applications" ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, 1999. (WET ICE '99). PROCEEDINGS. IEEE 8TH INTERNATIONAL WORKSHOPS ON STANFORD, CA, USA 16-18 JUNE 1999, LOS ALAMITOS, CA, USA,IEEE COMPUT. SOC, US, 16 juin 1999 (1999-06-16), pages 158-163, XP010358606 ISBN: 0-7695-0365-9 * |
YOST G C: "Using Remote Authentication Dial-in User Service (RADIUS) with Novell Directory Services (NDS): Part I - Exploring the Technology" TECHNICAL ENTERPRISES, INC. JUNE 1999, TECHNICAL SUPPORT, [Online] juin 1999 (1999-06), pages 1-3, XP002296841 Extrait de l'Internet: URL:http://www.naspa.com/PDF/99/T9906006.p df> [extrait le 2004-09-16] * |
Also Published As
Publication number | Publication date |
---|---|
US20080052771A1 (en) | 2008-02-28 |
EP1762037A2 (fr) | 2007-03-14 |
FR2872363A1 (fr) | 2005-12-30 |
WO2006010810A3 (fr) | 2006-11-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3008872B1 (fr) | Procédé d'authentification d'un terminal par une passerelle d'un réseau interne protégé par une entité de sécurisation des accès | |
EP1909462B1 (fr) | Procédé de mise à disposition cloisonnée d'un service électronique | |
FR2877521A1 (fr) | Dispositif, procede, programme et support de distribution d'informations, d'initialisation, dispositif, procede, programme et support de transfert d'initialisation d'authentification et programme de reception ... | |
EP1762037A2 (fr) | Procede et systeme de certification de l'identite d'un utilisateur | |
EP1549011A1 (fr) | Procédé et système de communication entre un terminal et au moins un équipment communicant | |
WO2006021661A2 (fr) | Procede d'authentification securisee pour la mise en œuvre de services sur un reseau de transmission de donnees | |
EP1393527A1 (fr) | Procede d'authentification entre un objet de telecommunication portable et une borne d'acces public | |
WO2012131275A2 (fr) | Mécanisme de redirection entrante sur un proxy inverse | |
EP1891771A1 (fr) | Procede de traduction d'un protocole d'authentification | |
EP3588903A1 (fr) | Procédé, dispositif et serveur de distribution sécurisée d'une configuration à un terminal | |
EP3568966B1 (fr) | Procédés et dispositifs de délégation de diffusion de contenus chiffrés | |
FR2834163A1 (fr) | Procede de controle d'acces a un contenu et systeme pour le controle d'acces a un contenu | |
EP1668868A1 (fr) | Systeme d acces a un reseau adapte pour la mise en oeuvre d'un procede a signature simplifiee, et serveur pour sa realisation | |
WO2014154902A1 (fr) | Procédé de délivrance d'une assertion de localisation | |
EP1983722A2 (fr) | Procédé et système de sécurisation d'accès internet de téléphone mobile, téléphone mobile et terminal correspondants | |
WO2005020538A2 (fr) | Procede et systeme de double authentification d'un utilisateur lors de l'acces a un service | |
EP3820112A1 (fr) | Procédé de configuration d accès à un service internet | |
EP2911365B1 (fr) | Procédé et système de sécurisation de transactions offertes par une pluralité de services entre un appareil mobile d'un utilisateur et un point d'acceptation | |
EP3679499B1 (fr) | Enrôlement perfectionné d'un équipement dans un réseau sécurisé | |
FR2827458A1 (fr) | Procede d'acces a un service specifique propose par un operateur virtuel et carte a puce d'un dispositif correspondant | |
EP4362391A1 (fr) | Procédé de gestion d'accès d'un utilisateur à au moins une application, programme d'ordinateur et système associés | |
EP3360293A1 (fr) | Moyens de gestion d'accès à des données | |
WO2006027518A1 (fr) | Systeme et procede d'acces a un service utilisant un mecanisme d'interaction | |
WO2007054657A2 (fr) | Procede et dispositif de fourniture d'un identifiant de federation reseau a un fournisseur de service | |
WO2007012786A2 (fr) | Procede de mise en oeuvre d'une sequence d'authentifications |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A2 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KM KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NG NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2005778769 Country of ref document: EP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWW | Wipo information: withdrawn in national office |
Country of ref document: DE |
|
WWP | Wipo information: published in national office |
Ref document number: 2005778769 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 11630938 Country of ref document: US |
|
WWP | Wipo information: published in national office |
Ref document number: 11630938 Country of ref document: US |