Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and apparatus for trusted federated identity

A trusted and trusted computing technology, applied in security devices, computer security devices, wireless communications, etc., can solve problems such as network load, no secure channel, and limited user control

Inactive Publication Date: 2012-11-14
INTERDIGITAL PATENT HLDG INC
View PDF1 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there are some pitfalls when implementing SSO as a web service
For example, a user may not have a secure channel to a web-based SSO provider
Additionally, the user's control over the SSO provider may be limited
[0005] Furthermore, authentication in SSO has the potential to generate communication over the air interface, which may result in a load on network entities (i.e. OpenID providers (OP or NAF) and on the network itself due to increased traffic
Additionally, the mobile network operator (MNO) may have to bear the cost of this additional service and processing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for trusted federated identity
  • Method and apparatus for trusted federated identity
  • Method and apparatus for trusted federated identity

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0274] This section aims to demonstrate the advantages provided by the OP on SCWS, especially the implementations that provide significant improvements and are further described in this application. For example, the proposed implementations could be implementations that implement the OpenID protocol, one of the advantages of these implementations is that the authentication traffic is local and does not require any traffic other than the air interface network or network services required by existing HTTP message flows. Will burden other air interface network or network services. Discovery and association traffic does not go over the air interface network, and is performed over the fixed-line public Internet between the operator OP and the RP.

[0275] 4.3.1 Standard OpenID

[0276] Figure 20 Shown is the standard OpenID protocol. For this protocol, local traffic does not exist, and the traffic offloaded from the air network is only the discovery process and the process of e...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A trusted computing environment, such as a smartcard, UICC, Java card, global platform, or the like may be used as a local host trust center and a proxy for a single-sign on (SSO) provider. This may be referred to as a local SSO provider (OP). This may be done, for example, to keep authentication traffic local and to prevent over the air communications, which may burden an operator network. To establish the OP proxy in the trusted environment, the trusted environment may bind to the SSO provider in a number of ways. For example, the SSO provider may interoperate with UICC-based UE authentication or GBA. In this way, user equipment may leverage the trusted environment in order to provide increased security and reduce over the air communications and authentication burden on the OP or operator network.

Description

[0001] cross reference [0002] This application claims the benefit of U.S. Provisional Patent Application No. 61 / 396,602, filed May 28, 2010, entitled "Identity Management on a Communications Device," and Priority to U.S. Provisional Patent Application No. 61 / 302,890, filed "Method and Apparatus for Implementing Local and Mobile OpenID Provider," which The contents of are incorporated herein by reference in their entirety. Background technique [0003] Internet users typically have multiple usernames and passwords that can be used for user authentication in order to access multiple web sites. For example, an Internet user may have a username / password combination for accessing a social networking site such as Facebook, and another username / password combination for accessing an email site such as Gmail. While having multiple username / password combinations may be necessary for user authentication, Internet users may find it cumbersome to remember each username / password combina...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F21/00
CPCG06F21/35H04L63/0853H04L63/0815G06F2221/2115G06F21/34H04W12/06H04W12/069H04L9/32
Inventor I·查A·施米特A·莱切尔Y·C·沙阿L·J·古乔内D·F·豪利
Owner INTERDIGITAL PATENT HLDG INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products