WO2010104283A3 - Method for user terminal authentication and authentication server and user terminal thereof - Google Patents

Method for user terminal authentication and authentication server and user terminal thereof Download PDF

Info

Publication number
WO2010104283A3
WO2010104283A3 PCT/KR2010/001356 KR2010001356W WO2010104283A3 WO 2010104283 A3 WO2010104283 A3 WO 2010104283A3 KR 2010001356 W KR2010001356 W KR 2010001356W WO 2010104283 A3 WO2010104283 A3 WO 2010104283A3
Authority
WO
WIPO (PCT)
Prior art keywords
user terminal
authentication
information
network rejection
network
Prior art date
Application number
PCT/KR2010/001356
Other languages
French (fr)
Other versions
WO2010104283A2 (en
Inventor
Duc-Key Lee
Jung-Hee Bang
Original Assignee
Kt Corperation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from KR1020090058150A external-priority patent/KR20100102026A/en
Application filed by Kt Corperation filed Critical Kt Corperation
Priority to CA2755142A priority Critical patent/CA2755142C/en
Priority to US13/255,837 priority patent/US20120005727A1/en
Priority to RU2011140850/08A priority patent/RU2491733C2/en
Publication of WO2010104283A2 publication Critical patent/WO2010104283A2/en
Publication of WO2010104283A3 publication Critical patent/WO2010104283A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • H04L9/0844Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/162Implementing security features at a particular protocol layer at the data link layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • H04L9/3273Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response for mutual authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

Provided are a method for user terminal authentication and authentication server and user terminal thereof. The method includes receiving authentication request information for accessing a network from the user terminal, processing a EAP authentication procedure according to the authentication request information, transmitting a message related to the EAP authentication procedure to the user terminal, wherein the message includes network rejection information when network rejection is triggered, and the network rejection information includes network rejection reason information and control information for the user terminal to cope with the network rejection.
PCT/KR2010/001356 2009-03-10 2010-03-04 Method for user terminal authentication and authentication server and user terminal thereof WO2010104283A2 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
CA2755142A CA2755142C (en) 2009-03-10 2010-03-04 Method for user terminal authentication and authentication server and user terminal thereof
US13/255,837 US20120005727A1 (en) 2009-03-10 2010-03-04 Method for user terminal authentication and authentication server and user terminal thereof
RU2011140850/08A RU2491733C2 (en) 2009-03-10 2010-03-04 Method for user terminal authentication and authentication server and user terminal therefor

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
KR10-2009-0020096 2009-03-10
KR20090020096 2009-03-10
KR10-2009-0058150 2009-06-29
KR1020090058150A KR20100102026A (en) 2009-03-10 2009-06-29 Method for user terminal authentication and authentication server and user terminal thereof

Publications (2)

Publication Number Publication Date
WO2010104283A2 WO2010104283A2 (en) 2010-09-16
WO2010104283A3 true WO2010104283A3 (en) 2010-12-16

Family

ID=42728915

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/KR2010/001356 WO2010104283A2 (en) 2009-03-10 2010-03-04 Method for user terminal authentication and authentication server and user terminal thereof

Country Status (1)

Country Link
WO (1) WO2010104283A2 (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060130140A1 (en) * 2004-12-14 2006-06-15 International Business Machines Corporation System and method for protecting a server against denial of service attacks
KR20060097572A (en) * 2005-03-09 2006-09-14 한국전자통신연구원 Authentication method and key generating method in wireless portable internet system
KR100730561B1 (en) * 2006-04-25 2007-06-20 포스데이타 주식회사 Method for controlling network entry of portable internet terminals, system enabling the method, and the portable internet terminals

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060130140A1 (en) * 2004-12-14 2006-06-15 International Business Machines Corporation System and method for protecting a server against denial of service attacks
KR20060097572A (en) * 2005-03-09 2006-09-14 한국전자통신연구원 Authentication method and key generating method in wireless portable internet system
KR100730561B1 (en) * 2006-04-25 2007-06-20 포스데이타 주식회사 Method for controlling network entry of portable internet terminals, system enabling the method, and the portable internet terminals

Also Published As

Publication number Publication date
WO2010104283A2 (en) 2010-09-16

Similar Documents

Publication Publication Date Title
WO2011014037A3 (en) System for managing unregistered terminals with shared authentication information and method thereof
WO2011123671A3 (en) Mutual mobile authentication using a key management center
WO2013003493A3 (en) System and method for protocol fingerprinting and reputation correlation
EP4391609A3 (en) Automated device provisioning and activation
WO2012044064A3 (en) Server and service providing method thereof
WO2010135189A3 (en) Network system with a plurality of networked devices with various connection protocols
WO2010122315A3 (en) Methods and apparatus to discover authentication information in a wireless networking environment
WO2011043903A3 (en) Network access control
WO2011081311A3 (en) Method and system for supporting security in a mobile communication system
WO2014153461A3 (en) Multifunction wireless device
WO2010093481A3 (en) Friend finding system
WO2009127930A3 (en) Mobility related control signalling authentication in mobile communications system
WO2006084025A3 (en) Method and system for inter-subnet pre-authentication
WO2013120026A3 (en) Enabling secure access to a discovered location server for a mobile device
WO2011032131A3 (en) Intelligent network access controller and method
WO2012149262A3 (en) Interactive control of alarm systems by telephone interface using an intermediate gateway
WO2012064067A3 (en) Method for changing connections between heterogeneous networks, and policy-providing device and terminal device for supporting same
WO2008148191A3 (en) Remote service access system and method
WO2012141556A3 (en) Machine-to-machine node erase procedure
WO2008127430A3 (en) Secure access to restricted resource
WO2013009059A3 (en) Method for setting terminal in mobile communication system
WO2012134218A3 (en) Method for user equipment setting security with network in wireless communication system and apparatus for same
WO2010140876A8 (en) Method, system and secure server for multi-factor transaction authentication
EP2477430A3 (en) Mobile terminal, server, and method for providing content information using MAC address
WO2010118262A3 (en) Mobile content delivery on a mobile network

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 10750974

Country of ref document: EP

Kind code of ref document: A2

WWE Wipo information: entry into national phase

Ref document number: 2755142

Country of ref document: CA

Ref document number: 13255837

Country of ref document: US

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 2011140850

Country of ref document: RU

Kind code of ref document: A

122 Ep: pct application non-entry in european phase

Ref document number: 10750974

Country of ref document: EP

Kind code of ref document: A2