Unlock instant, AI-driven research and patent intelligence for your innovation.

User equipment and method in UE

A user equipment and user technology, applied in electrical components, safety devices, transmission systems, etc., can solve problems such as user security weaknesses, user multiple authentication burdens, etc.

Inactive Publication Date: 2017-08-18
INTERDIGITAL PATENT HLDG INC
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, handling many accounts with separate user-supplied credentials for each could potentially place too much authentication burden on the user in terms of, for example, credential fatigue
Users can create a security vulnerability if they attempt to simplify processing by using easy-to-remember credentials or reusing the same credentials across multiple domains

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User equipment and method in UE
  • User equipment and method in UE
  • User equipment and method in UE

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] Users, such as mobile users, may desire available secure and / or seamless ways for accessing Internet services that minimize or even completely eliminate user interaction in credential provisioning. In an example embodiment, single sign-on (SSO) identity management (IdM) may include means for providing SSO implementation with various features, while enabling user-assisted and network-assisted access to desired services When authenticating, this method can provide users with such a simple and convenient use. User-assisted authentication may involve authentication using input from a user. Such user input may be semi-automatic (eg stored in a browser) or entered by a user. For example, user-assisted authentication may be based on parameters known to the user (eg, username, password) and / or characteristics of the user (eg, dynamic signature, iris scan, fingerprint, or other biometric measurement). Network-assisted authentication may involve user authentication based on an ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Users desire useable security or a seamless means for accessing internet services whereby user interaction in the provisioning of credentials may be kept to a minimum or even eliminated entirely. The Single Sign-On identity management concept enables user- assisted and network- assisted authentication for access to desired services. To enable seamless authentication services to users, a unified framework and a protocol layer interface for managing multiple authentication methods may be used. A user equipment, UE, comprises a user application (202, 204) configured to communicate with a service provider to access a service and a plurality of network- assisted authentication modules (208-216), each network-assisted authentication module corresponding to a different network-assisted authentication protocol. The UE further comprises a single sign-on subsystem (206) configured to authenticate a user of the UE based on user-assisted authentication information at the UE and / or network and to select one of the network-assisted authentication modules based on one more policies.

Description

[0001] This application is a divisional application of a Chinese patent application with a filing date of April 27, 2012, an application number of 201280020818.9, and a title of "SSO framework for multiple SSO technologies". [0002] Cross References to Related Applications [0003] This application claims the benefit of U.S. Provisional Patent Application Serial No. 61 / 480,137, filed April 28, 2011, and U.S. Provisional Patent Application Serial No. 61 / 548,156, filed October 17, 2011, the contents of which are incorporated by reference here. Background technique [0004] Due to the increased use of smartphones to access Internet services, mobile user security requirements have increased. For example, banking services, ticketing services for entertainment events, etc. may require integrity, privacy protection, and user authentication. These requirements may place an authentication burden directly on the user in the form of usernames, personal identification numbers (pins), a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04W12/06
CPCH04L63/0815H04L63/205H04L2463/082H04W12/06H04W12/0431
Inventor Y·C·沙阿A·施米特I·查L·J·古乔内A·莱切尔
Owner INTERDIGITAL PATENT HLDG INC