User identity management for permitting interworking of a bootstrapping architecture and a shared identity service

An identity, user technology, applied in security devices, electrical components, transmission systems, etc., can solve problems such as unsolved access authorization

Active Publication Date: 2012-07-04
NOKIA TECHNOLOGLES OY
View PDF3 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This protocol is based on the redirection feature of curre

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User identity management for permitting interworking of a bootstrapping architecture and a shared identity service
  • User identity management for permitting interworking of a bootstrapping architecture and a shared identity service
  • User identity management for permitting interworking of a bootstrapping architecture and a shared identity service

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] Embodiments of the present invention will now be described more fully hereinafter with reference to the accompanying drawings, in which some, but not all, embodiments of the invention are shown. Indeed, this invention may be embodied in many different forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided so that this disclosure will satisfy applicable legal requirements. Like numerals refer to like elements throughout.

[0020] Also as used herein, the term 'circuitry' refers to (a) a hardware-only circuit implementation (ie, an implementation using analog circuits and / or digital circuits); (b) a circuit and a computer program product (the computer program product). comprising a combination of software and / or firmware instructions stored on one or more computer-readable memories) that operate in conjunction with a computer program product to cause an apparatus to perform one or more of the functions desc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method, apparatus and computer program product are provided to facilitate authentication of a request, such as by a mobile terminal, while also supplying information about the user to a service, website, application or the like A method, apparatus and computer program product may provide for interworking a bootstrapping architecture, such as Generic Bootstrapping Architecture, and a shared identity service, such as OpenID architecture In this regard, a method, apparatus and computer program product may provide for a secure session with a service provider through Generic Bootstrapping Architecture while being able to supply the service provider with the user information and/ or accessing a user account using OpenID architecture.

Description

technical field [0001] Embodiments of the present invention relate generally to wireless technologies, and more particularly to systems, methods, apparatus, and computer program products for facilitating interactions within a mobile authentication architecture. Background technique [0002] The security of mobile terminals, such as portable communication devices (PCDs) (eg, cellular telephones), portable digital assistants (PDAs), laptop computers, or any suitable device capable of communicating with a wireless network, is increasingly important to mobile terminal users. important. Security algorithms are often used to implement security between the mobile terminal and another network entity. These security algorithms often rely on secrets shared between the mobile terminal and other network entities that allow the mobile terminal to be authenticated. This shared secret is usually implemented as a cryptographic key or a username / password combination. [0003] Generic Boot...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04W12/04H04W12/06
CPCH04L63/0421H04W12/04H04L63/0815H04W12/06H04W12/0431
Inventor S·霍尔特曼斯H·肖芬
Owner NOKIA TECHNOLOGLES OY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products