Processing

Please wait...

Settings

Settings

Goto Application

1. WO2019158818 - SECURITY MANAGEMENT FOR SERVICE AUTHORIZATION IN COMMUNICATION SYSTEMS WITH SERVICE-BASED ARCHITECTURE

Publication Number WO/2019/158818
Publication Date 22.08.2019
International Application No. PCT/FI2019/050107
International Filing Date 12.02.2019
IPC
G06F 21/33 2013.01
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
30Authentication, i.e. establishing the identity or authorisation of security principals
31User authentication
33using certificates
H04L 9/32 2006.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9Arrangements for secret or secure communication
32including means for verifying the identity or authority of a user of the system
H04L 29/06 2006.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
29Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/-H04L27/136
02Communication control; Communication processing
06characterised by a protocol
H04W 12/06 2009.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
12Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
06Authentication
H04W 12/08 2009.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
12Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
08Access security
CPC
G06F 21/335
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
30Authentication, i.e. establishing the identity or authorisation of security principals
31User authentication
33using certificates
335for accessing specific resources, e.g. using Kerberos tickets
G06F 21/44
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
30Authentication, i.e. establishing the identity or authorisation of security principals
44Program or device authentication
G06F 21/604
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
60Protecting data
604Tools and structures for managing or administering access control systems
H04L 63/0807
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
63Network architectures or network communication protocols for network security
08for supporting authentication of entities communicating through a packet data network
0807using tickets, e.g. Kerberos
H04L 63/0823
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
63Network architectures or network communication protocols for network security
08for supporting authentication of entities communicating through a packet data network
0823using certificates
H04L 63/0884
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
63Network architectures or network communication protocols for network security
08for supporting authentication of entities communicating through a packet data network
0884by delegation of authentication, e.g. a proxy authenticates an entity to be authenticated on behalf of this entity vis-à-vis an authentication entity
Applicants
  • NOKIA TECHNOLOGIES OY [FI]/[FI]
Inventors
  • NAIR, Suresh
  • S BYKAMPADI, Nagendra
Agents
  • NOKIA TECHNOLOGIES OY
  • UUSITALO, Arttu
Priority Data
16/014,41821.06.2018US
20184100588315.02.2018IN
Publication Language English (EN)
Filing Language English (EN)
Designated States
Title
(EN) SECURITY MANAGEMENT FOR SERVICE AUTHORIZATION IN COMMUNICATION SYSTEMS WITH SERVICE-BASED ARCHITECTURE
(FR) GESTION DE SÉCURITÉ POUR AUTORISATION DE SERVICE DANS DES SYSTÈMES DE COMMUNICATION AVEC ARCHITECTURE BASÉE SUR UN SERVICE
Abstract
(EN)
Security management techniques for service authorization for communication systems are provided. In one or more methods, a first element or function in a home network of a communication system registers a second element or function in the home network as a service consumer of one or more services provided by at least a third element or function in the home network, receives a request from the second element or function, and provides an access token to the second element or function responsive to authenticating the second element or function, the access token being used by the second element or function to access the one or more services provided by the third element or function.
(FR)
L'invention concerne des techniques de gestion de sécurité pour une autorisation de service pour des systèmes de communication. Dans un ou plusieurs procédés, un premier élément ou fonction dans un réseau domestique d'un système de communication enregistre un deuxième élément ou fonction dans le réseau domestique en tant que consommateur de service d'un ou de plusieurs services fournis par au moins un troisième élément ou fonction dans le réseau domestique, reçoit une demande du deuxième élément ou fonction, et fournit un jeton d'accès au deuxième élément ou fonction en réponse à l'authentification du deuxième élément ou fonction, le jeton d'accès étant utilisé par le deuxième élément ou fonction pour accéder au ou aux services fournis par le troisième élément ou fonction.
Latest bibliographic data on file with the International Bureau