WO2013056619A1 - Procédé, idp, sp et système pour la fédération d'identités - Google Patents

Procédé, idp, sp et système pour la fédération d'identités Download PDF

Info

Publication number
WO2013056619A1
WO2013056619A1 PCT/CN2012/082471 CN2012082471W WO2013056619A1 WO 2013056619 A1 WO2013056619 A1 WO 2013056619A1 CN 2012082471 W CN2012082471 W CN 2012082471W WO 2013056619 A1 WO2013056619 A1 WO 2013056619A1
Authority
WO
WIPO (PCT)
Prior art keywords
identity
idp
authentication
module
identifier
Prior art date
Application number
PCT/CN2012/082471
Other languages
English (en)
Chinese (zh)
Inventor
夏正雪
郝振武
张孟旺
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2013056619A1 publication Critical patent/WO2013056619A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles

Definitions

  • the present invention relates to the field of network communications, and in particular, to a method for identity association, an IdP, an SP, and a system.
  • the core of the network layer is the IP protocol at the network layer, which enables mutual access between users through IP addresses.
  • IP protocols such as web browsing, mail sending and receiving, instant messaging, etc., are carried on top of the application layer protocol.
  • users Before using these services, users must access the Internet through the basic network provided by the telecom operators. Different users may have different access methods, such as xDSL, optical fiber, mobile access, and so on.
  • the user terminal will obtain an IP address, and the user then accesses various applications on the Internet through the IP address, which is equivalent to the temporary identity of the user.
  • the embodiments of the present invention provide a method for identity association, an IdP, an SP, and a system, so that an operator can provide a single sign-on service for a user.
  • the SP After receiving the positive assertion and verifying the validity of the SP, the SP checks whether the associated local account is not present, and then initiates a challenge to the UE. After the UE successfully logs in, the SP identifies the identity of the UE in the SP and the identity of the IdP. The identity, and the identity of the UE in the IdP are associated.
  • the identity of the UE generated by the IdP at the IdP is a permanent identity or a temporary identity.
  • the IdP when the identity of the IdP is a temporary identity, the IdP further generates a lifetime for the temporary identity.
  • the identity of the terminal user in the IdP includes:
  • the IdP After the IdP confirms that the UE passes the authentication, it actively generates an identity identifier of the terminal user at the IdP for the UE; or
  • the IdP establishes a security association with the SP, and confirms that after the UE passes the authentication, after receiving the authentication request sent by the SP, the identity of the IdP is generated for the UE.
  • the method further includes:
  • the SP first asks whether the UE is willing to associate with the local account, and after the UE agrees, initiates a challenge to the UE to request login.
  • the method further includes: after the UE performs access authentication with the access service node (ASR) and the authentication center, generating a master session key with the ASR;
  • ASR access service node
  • the terminal performs authentication, the UE is authenticated by the access identifier of the UE and the primary session key.
  • the authentication request sent by the SP includes a random number, and the random number is used to temporarily identify the identity information of the UE in the SP and used to prevent replay attacks.
  • the IdP actively generates an identity of the IdP for the UE, and generates a positive assertion sent to the SP, where the positive assertion includes a random number, and the random number is used to prevent a replay attack.
  • An identity providing server for implementing identity federation is provided by the embodiment of the present invention.
  • the IdP is located in an operator network, and includes an authentication module, an identity identifier generating module, an association module, and an assertion generating module, where:
  • the identity identifier generating module is configured to: after the authentication module confirms that the UE passes the authentication, generate an identity of the IdP for the UE;
  • the association module is configured to associate an identity of the UE with the IdP and an identity of the SP; the assertion generation module is configured to generate a positive assertion and send the SP to the SP.
  • the identifier generated by the identity identifier generating module for the UE in the IdP is a temporary identity, and the lifetime of the temporary identity is generated.
  • the identity identifier generating module is configured to: after the authentication module confirms that the terminal passes the authentication in the following manner, generate an identity identifier of the terminal user in the IdP for the UE:
  • the identity generation module actively generates an identity of the IdP for the UE.
  • the service providing server (SP) for implementing identity association includes an authentication check module and an association module, where:
  • the authentication check module is configured to, after receiving the positive assertion sent by the identity providing server (IdP) and verifying the validity of the authentication, check whether the challenge of requesting login is sent to the UE if there is no associated local account;
  • the system for implementing identity association includes an identity providing server (IdP) and a service providing server (SP) located in an operator network, where:
  • the IdP is set to be used in the service process provided by the UE to access the SP, after the UE is authenticated, the identity of the terminal user in the IdP is generated for the UE, and the identity of the UE in the IdP and the identity of the SP are associated with the IdP. Generate a positive assertion sent to the SP;
  • the SP is configured to, after receiving the positive assertion and verifying the validity of the policy, check if the associated local account is not present, and then initiate a challenge requesting the login to the UE. After the UE successfully logs in, the SP sets the identity of the UE locally in the SP. Identification, IdP identity, and the identity of the UE in the IdP Line association.
  • FIG. 3 is a schematic flowchart of a method for identity association initiated by an SP according to Embodiment 2 of the present invention
  • FIG. 4 is a schematic flowchart of a method for identity association initiated by an IdP according to Embodiment 3 of the present invention
  • FIG. 5 is a schematic diagram of an IdP and an SP according to Embodiment 4 of the present invention; Schematic diagram of the structure.
  • the user since the user may already have a registered account in a major different Internet application system, and the registered account already carries some information useful to the user, in this case, the user usually wants to be able to use the single sign-on technology in combination. In the case of convenience, continue to use the relevant information in the original account.
  • FIG. 1 is a schematic structural diagram of a network element according to an embodiment of the present invention.
  • the network element 101 is a user equipment (UE), and the terminal accessing the network may be one or more of a mobile terminal and a fixed terminal, such as a mobile phone, a fixed telephone, a computer, and an application server;
  • UE user equipment
  • the terminal accessing the network may be one or more of a mobile terminal and a fixed terminal, such as a mobile phone, a fixed telephone, a computer, and an application server;
  • the network element 102 is an access service router (ASR), which is used for providing access services for the user terminal, maintaining the connection between the terminal and the network, assigning a RID (Routing Identifier) to the terminal, and registering with the ILR/PTF. Register and query the RID of the terminal, maintain the AID (Access Identifier)-RID mapping information, and implement routing and forwarding of data packets.
  • ASR access service router
  • the NMS interface provides the pseudonym service of the end user
  • the network element 105 is an Interconnect Service Router (ISR), which is used for querying and maintaining AID-RID mapping information of the network terminal, encapsulating, routing, and forwarding data between the network and the traditional IP network.
  • ISR Interconnect Service Router
  • the interworking function between the network and the traditional IP network including a format conversion module, for the network included in the data packet sent by the traditional IP network Converting the IPv4/IPv6 address of the terminal into a corresponding AID, and converting the AID of the network terminal into an IPv4/IPv6 address format, and then transmitting the terminal to the terminal of the traditional IP network;
  • the network element 106 is a Service Provider (SP), which is an application system for providing services to terminal users on the Internet.
  • SP Service Provider
  • FIG. 2 is a schematic flowchart of a method for identity association according to an embodiment of the present invention. As shown in FIG. 2, the method includes the following steps:
  • the terminal confirms that the terminal is authenticated by the IdP of the operator network, and generates an identity of the terminal user in the IdP for the terminal user, and associates the identity identifier of the terminal user with the IdP.
  • the SP's identity generated a positive assertion sent to the SP;
  • the IdP After the IdP associates the identity of the SP with the identity of the IdP, the IdP can no longer authenticate the next time the user accesses the service provided by the SP.
  • the generated end user's identity in the IdP can be either a permanent identifier or a temporary identifier. If it is a temporary identifier, it can also generate a lifetime for the temporary identity.
  • the IdP can confirm that the terminal is authenticated, and the IdP can actively generate the identity of the terminal user in the IdP. Alternatively, the IdP can establish a security association with the SP during the service process provided by the terminal accessing the SP. After receiving the authentication request sent by the SP, the identity of the terminal user in the IdP is generated and associated. Step 202: After receiving the positive assertion and verifying the validity of the SP, the SP checks whether there is a related local account, and then initiates a challenge to the user to log in. After the user successfully logs in, the SP identifies the end user in the SP local identity. , the IdP identity, and the identity of the end user in the IdP.
  • the SP After receiving the positive assertion and verifying its legality, the SP checks if there is an associated local account, and directly provides services for the user. Before checking whether there is no associated local account, the SP may first ask the user whether to associate with the local account before initiating the challenge of requesting the login. If the user agrees, the association is performed. If the user does not agree, the normal login process is performed. .
  • the association between the identity of the user at the operator and the identity of the identity at the SP is achieved.
  • the operator can provide the single sign-on service for the user, and the user can inherit the original account information.
  • the IdP does not perform the mutual authentication process with the UE.
  • the UE is redirected to the SP.
  • the SP provides services for the UE according to the associated account information, and the UE is no longer required to perform the UE. log in. Users reduce the number of logins or no longer need to enter a username and password to log in, which improves security.
  • the association due to the association, the continuity of the user's service is ensured, and the user experience is improved.
  • FIG. 3 is a schematic diagram of the process of implementing Embodiment 2 initiated by the SP. As shown in FIG. 3, the following steps are included:
  • Step 301 The user terminal UE and the access service node ASR, and the authentication center perform access authentication. After the authentication is passed, the identity location separation network allocates an access identifier AID to the user.
  • Step 302 The UE and the ASR derive a primary session key MSK according to the user access authentication, and are used for subsequent terminal authentication.
  • Step 304 The SP acquires a corresponding IdP address, and generates an authentication request message. Note that the manner of obtaining the IdP address can be implemented by a UE selection or an IdP discovery mechanism or the like.
  • Step 305 The SP establishes a security association (SA) between itself and the IdP, and the two parties generate a shared key for subsequent positive assertion message signature and verification;
  • SA security association
  • Step 306 The SP redirects the authentication request message to the IdP, where the redirection message includes an authentication request assertion, and the assertion includes an SP identity identifier, an IdP identity identifier, and a random number nonce;
  • the session key (e.g., confidentiality key CK/integrity key IK) is negotiated between the UE and the network through access authentication, communication between the UE and the IdP is protected.
  • the lifetime field value is null.
  • Step 311 The SP initiates a challenge requesting login to the user terminal.
  • Step 314 The SP returns a service access response to the user terminal. Thereafter, during the lifetime of the life, the terminal that logs in through the IdP does not need to re-enter the username/password, or token, etc. in the SP, and can directly use the original account. Operation, etc.
  • Step 402 The UE and the ASR derive a primary session key MSK according to the user access authentication.
  • Step 404 The UE selects an SP to be accessed on an interface provided by the IdP.
  • Step 405 A security association is established between the IdP and the SP, and the two parties generate a shared key for subsequently performing a positive disconnection message signature.
  • Step 406 The IdP recognizes the terminal UE by using the terminal identifier AID and the master session key MSK. Certificate
  • the session key (e.g., confidentiality key CK/integrity key IK) is negotiated between the UE and the network through access authentication, communication between the UE and the IdP is protected.
  • Step 408 The IdP redirects the SAML positive assertion to the SP, and the IdP identity identifier, the temporary identity of the terminal user on the IdP, the UEidp, the lifetime, the SP identity, and the random number nonce;
  • the random number in this embodiment is generated by IdP. Since the identity of the UE or the user is carried in the assertion, the random number in this embodiment is only used to let the SP determine whether the message is used by the attacker for the replay attack by whether the received random number is repeated.
  • Step 410 The SP initiates a challenge requesting login to the user terminal.
  • Step 411 The user terminal initiates a user login response to the SP, and the response may be a login mode such as a username/password or a token;
  • Step 412 After the user successfully logs in, the SP identifies the IdP identity and the end user on the SP. The identity and the temporary identity of the end user on the IdP are associated (as shown in the following table);
  • Step 413 The SP returns a service access response to the user terminal. Thereafter, during the lifetime of the life, the terminal that logs in through the IdP does not need to re-enter the username/password, or token, etc. in the SP, and can directly use the original account. Operation, etc.
  • the system for implementing identity aggregation includes an identity providing server (IdP) and a service providing server (SP) located in a carrier network, where:
  • the SP is configured to: after receiving the positive assertion and verifying the validity of the policy, if the local account is not associated, the user is required to initiate a login request. After the user successfully logs in, the SP identifies the terminal user in the local state of the SP. The identity, the identity of the IdP, and the identity of the end user in the IdP are associated.
  • the identity generation module is configured to: after the authentication module confirms that the terminal passes the authentication, generate an identity of the terminal user in the IdP for the terminal user;
  • the first association module is configured to associate the identity identifier of the terminal user with the ID of the SP and the identity of the SP;
  • the assertion generation module is set to generate a positive assertion and send to the SP.
  • the identity identifier generated by the identity identifier generating module for the terminal user is a permanent identity identifier of the terminal user in the IdP; or the identity identifier of the terminal user generated by the terminal user in the IdP is a temporary identity identifier, and Generate the lifetime of the temporary identity.
  • the identity identifier generating module is configured to: after the authentication module confirms that the terminal passes the authentication in the following manner, generate an identity identifier of the terminal user in the IdP for the terminal user: after the authentication module confirms that the terminal passes the authentication, actively The terminal user generates the identity of the terminal user in the IdP; or, after the IdP establishes a security association with the SP, and confirms that the terminal passes the authentication, after receiving the authentication request sent by the SP, the terminal user is generated for the terminal user at the IdP. Identity.
  • the authentication module is configured to authenticate the terminal in the following manner: authenticating the terminal by using an access identifier of the terminal and a primary session key, where the primary session key is a terminal and an access service node (ASR) And generated by the certification center after access authentication.
  • ASR access service node
  • the positive assertion generated by the assertion generation module includes a random number for preventing replay attacks.
  • the SP includes an authentication check module and a second association module, where:
  • the authentication check module is configured to: after receiving the positive assertion sent by the IdP and verifying that the legality is passed, checking that if there is no associated local account, the user is required to initiate a login request; the second association module is set to After the user logs in successfully, the identity of the end user in the SP, the identity of the IdP, and the identity of the terminal user in the IdP are associated.
  • the authentication check module is further configured to ask the user whether to associate with the local account before initiating the challenge of requesting the login to the user, and after the user agrees, initiate a challenge requesting the login to the user.
  • the authentication check module is further configured to send an authentication request to the IdP after the IdP establishes a security association with the SP, where the authentication request includes a random number, and the random number is used to temporarily identify the identity information of the user in the SP. For protection against replay attacks.
  • the embodiment of the present invention combines the identity association technology, so that the operator can provide the single sign-on service for the user, and the user can inherit the original account information. On the one hand, it improves security, on the other hand, it ensures the continuity of user services and improves the user experience.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Dans ses modes de réalisation, la présente invention se rapporte à un procédé, à un IdP, à un SP et à un système adaptés pour fédérer des identités. La présente invention a pour objectif de permettre à un fournisseur de services de proposer des services d'authentification par signature unique à des utilisateurs. Le procédé selon l'invention comprend les étapes suivantes : quand un UE accède à un service fourni par le SP, l'IdP qui se trouve dans le réseau du fournisseur de services détermine que l'identification de l'UE est terminée, il génère alors un ID d'UE dans l'IdP pour l'UE, il associe l'ID d'UE dans l'IdP à l'ID du SP, il génère un accusé de réception et il envoie l'accusé de réception au SP ; le SP reçoit donc l'accusé de réception, il valide la légalité de l'accusé de réception, il vérifie qu'il n'existe aucun compte local associé et il initie un défi consistant à solliciter une authentification par signature à l'UE. Une fois que l'UE a terminé l'authentification par signature, le SP associe l'ID d'UE local dans le SP et l'ID de l'IdP à l'ID d'UE dans l'IdP.
PCT/CN2012/082471 2011-10-19 2012-09-29 Procédé, idp, sp et système pour la fédération d'identités WO2013056619A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201110318815.0A CN103067337B (zh) 2011-10-19 2011-10-19 一种身份联合的方法、IdP、SP及系统
CN201110318815.0 2011-10-19

Publications (1)

Publication Number Publication Date
WO2013056619A1 true WO2013056619A1 (fr) 2013-04-25

Family

ID=48109803

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2012/082471 WO2013056619A1 (fr) 2011-10-19 2012-09-29 Procédé, idp, sp et système pour la fédération d'identités

Country Status (2)

Country Link
CN (1) CN103067337B (fr)
WO (1) WO2013056619A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9736165B2 (en) 2015-05-29 2017-08-15 At&T Intellectual Property I, L.P. Centralized authentication for granting access to online services

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103595618B (zh) * 2013-11-08 2016-12-14 北京奇立软件技术有限公司 一种用于保持即时通信会话连续性的方法、服务器及系统
US9525664B2 (en) * 2014-02-28 2016-12-20 Symantec Corporation Systems and methods for providing secure access to local network devices
US9648034B2 (en) * 2015-09-05 2017-05-09 Nudata Security Inc. Systems and methods for detecting and scoring anomalies
CN108781361B (zh) 2016-03-15 2020-09-08 华为技术有限公司 用于处理数据包的方法及设备
CN106209785A (zh) * 2016-06-28 2016-12-07 浪潮电子信息产业股份有限公司 一种多账户绑定方法、装置及系统
CN107770770A (zh) * 2016-08-16 2018-03-06 电信科学技术研究院 一种接入认证方法、ue和接入设备
CN107872455A (zh) * 2017-11-09 2018-04-03 武汉虹旭信息技术有限责任公司 一种跨域单点登录系统及其方法
CN109388937B (zh) * 2018-11-05 2022-07-12 用友网络科技股份有限公司 一种多因子身份认证的单点登录方法及登录系统

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1866822A (zh) * 2005-05-16 2006-11-22 联想(北京)有限公司 一种统一认证的实现方法
CN101719238A (zh) * 2009-11-30 2010-06-02 中国建设银行股份有限公司 一种统一身份管理、认证和授权的方法及系统
CN101729540A (zh) * 2009-12-02 2010-06-09 江西省电力信息通讯有限公司 基于应用层身份信息同步单点登录方法
CN102111410A (zh) * 2011-01-13 2011-06-29 中国科学院软件研究所 一种基于代理的单点登录方法及系统

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040002878A1 (en) * 2002-06-28 2004-01-01 International Business Machines Corporation Method and system for user-determined authentication in a federated environment
CN1805336A (zh) * 2005-01-12 2006-07-19 北京航空航天大学 面向asp模式的单一登录方法及系统
CN101388773B (zh) * 2007-09-12 2011-12-07 中国移动通信集团公司 身份管理平台、业务服务器、统一登录系统及方法
CN101399813B (zh) * 2007-09-24 2011-08-17 中国移动通信集团公司 身份联合方法
CN101998407B (zh) * 2009-08-31 2014-07-02 中国移动通信集团公司 基于wlan接入认证的业务访问方法
CN102045166B (zh) * 2009-10-13 2014-07-02 中国移动通信集团福建有限公司 单点登录的方法及系统

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1866822A (zh) * 2005-05-16 2006-11-22 联想(北京)有限公司 一种统一认证的实现方法
CN101719238A (zh) * 2009-11-30 2010-06-02 中国建设银行股份有限公司 一种统一身份管理、认证和授权的方法及系统
CN101729540A (zh) * 2009-12-02 2010-06-09 江西省电力信息通讯有限公司 基于应用层身份信息同步单点登录方法
CN102111410A (zh) * 2011-01-13 2011-06-29 中国科学院软件研究所 一种基于代理的单点登录方法及系统

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9736165B2 (en) 2015-05-29 2017-08-15 At&T Intellectual Property I, L.P. Centralized authentication for granting access to online services
US10673858B2 (en) 2015-05-29 2020-06-02 At&T Intellectual Property I, L.P. Centralized authentication for granting access to online services
US11425137B2 (en) 2015-05-29 2022-08-23 At&T Intellectual Property I, L.P. Centralized authentication for granting access to online services

Also Published As

Publication number Publication date
CN103067337B (zh) 2017-02-15
CN103067337A (zh) 2013-04-24

Similar Documents

Publication Publication Date Title
CN101127600B (zh) 一种用户接入认证的方法
WO2013056619A1 (fr) Procédé, idp, sp et système pour la fédération d'identités
JP4782139B2 (ja) モバイルユーザーをトランスペアレントに認証してウェブサービスにアクセスする方法及びシステム
JP4801147B2 (ja) 証明を配送するための方法、システム、ネットワーク・ノード及びコンピュータ・プログラム
JP5651313B2 (ja) 連続する再認証を必要としないsipシグナリング
JP4394682B2 (ja) 非信頼アクセスネットワークを介してシングルサインオン認証を行なう装置及び方法
EP3120591B1 (fr) Dispositif sur la base d'un identifiant d'utilisateur, système de gestion d'identité et d'activité
US9515824B2 (en) Provisioning devices for secure wireless local area networks
US20080222714A1 (en) System and method for authentication upon network attachment
US20090158390A1 (en) Method, system and apparatus for authentication
WO2019017836A1 (fr) Procédé et dispositif de traitement de session
US20090064291A1 (en) System and method for relaying authentication at network attachment
KR20050064119A (ko) 인터넷접속을 위한 확장인증프로토콜 인증시 단말에서의서버인증서 유효성 검증 방법
US20110035592A1 (en) Authentication method selection using a home enhanced node b profile
WO2013040957A1 (fr) Procédé et système d'authentification unique, et procédé et système de traitement d'informations
WO2014117525A1 (fr) Procédé et service de gestion de l'authentification d'un terminal utilisateur statique
WO2008034319A1 (fr) Procédé, système et dispositif d'authentification destinés à un dispositif de réseau
WO2009097778A1 (fr) Procédé, dispositif et système d'appel de l'interface de sécurité
WO2015089996A1 (fr) Procédé d'authentification de sécurité et serveur d'authentification d'autorisation
WO2014176997A1 (fr) Procédé et système de transmission et de réception de données, procédé et dispositif de traitement de message
WO2010000157A1 (fr) Procédé de configuration, équipement et système de dispositif d'accès
WO2013023475A1 (fr) Procédé destiné au partage de données d'utilisateur dans un réseau et serveur fournissant une identité
WO2011131002A1 (fr) Procédé et système pour la gestion d'identités
WO2008006309A1 (fr) Procédé appareil de détermination du type de service d'une demande de clé
US9485654B2 (en) Method and apparatus for supporting single sign-on in a mobile communication system

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 12841702

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 12841702

Country of ref document: EP

Kind code of ref document: A1