Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for implementing third-party authentication based on gray list

a third-party authentication and gray list technology, applied in the field of communication systems, can solve the problems of not being able to get a certain service or all services, implement third-party control of services, and not being able to obtain the grant of the system by the lis

Inactive Publication Date: 2017-08-31
ALCATEL LUCENT SAS
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

Enables real-time service control and accurate authentication, preventing malicious requests from being mistakenly granted access and ensuring that services are managed effectively by third parties, enhancing security and control in communication systems.

Problems solved by technology

If a black list is established, then users (or IP address, IP packet, e-mail, virus, etc.) listed in the black list cannot obtain the grant of the system.
For example, in a communication operating system, if a certain user (for example, the user's identifier) is listed in a black list, then it may not be able to get a certain service or all services.
For example, in an instance needing service control by a third party, the white and black lists cannot implement third-party control of the services, and cannot implement real-time control of the services.
However, the way hereinabove still has a problem that when a malicious attacker sends a service request again after a specified time, such as 10 minutes, then the system will put the malicious attacker into the white list, so that the system is still unable to accurately determine whether to provide the service to an unknown service requester.
Moreover, when the requested service of the requester needs authentication from a third party, for example, the service is managed by a third party, the white and black lists cannot implement third-party authentication.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for implementing third-party authentication based on gray list
  • Method and system for implementing third-party authentication based on gray list
  • Method and system for implementing third-party authentication based on gray list

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047]Exemplary embodiments for carrying out the invention are described now by reference to the drawings. However, the invention may be performed in various forms, not limited to the embodiments described herein. These embodiments are provided for extensively and comprehensively disclosing the invention, and for sufficiently conveying the extent of the invention to those skilled in the art. Terms in exemplary modes for carrying out the invention illustrated in the drawings do not define the invention. In the figures, identical units / elements are represented by identical reference signs.

[0048]Detailed exemplary modes for carrying out the invention are disclosed here. However, the specific constructions and function details disclosed here are only for the purpose of the typical description of the exemplary implementation of the invention. However, the present invention can be embodied in a variety of alternative forms and should not be constructed to be limited to implementations as ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to a communication method, comprising: receiving a service request from a requesting party; performing a third-party authentication on the service request according to a gray list and obtaining an authentication result; and processing the service request according to the authentication result. The present invention relates to a communication system, comprising: means for receiving a service request from a requesting party; means for performing a third-party authentication on the service request according to a gray list and obtaining an authentication result; and means for processing the service request according to the authentication result. The present invention implements a third-party control of services based on the gray list, and can effectively manage a variety of services in the communication system.

Description

FIELD THE INVENTION[0001]The present invention relates to a communication system, and more specifically, to a method and system using a gray list for third-party authentication in the communication system.BACKGROUND OF THE INVENTION[0002]Currently, white lists and black lists are widely used technology, which indicates a corresponding service request should be allowed or denied. For white lists and black lists, the behaviors of a system are predefined, whereby the white Lists and black lists can be seen as predefined rules. In reality, the white list and black list rules are applied to a lot of systems or services, such as, operating system, firewall, antivirus software, mail systems, application software, voice call, data communications, data storage, etc. In general, the white list and black list rules are applied to almost all of the applications involving control. If a white list is established, then only users (or IP address, IP packet, mail, etc.) in the white list can obtain ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(United States)
IPC IPC(8): H04L29/06
CPCH04L63/101H04L65/1016H04L63/08H04L63/0869H04W12/06H04W76/10
Inventor MA, XIAOHANGTANG, SHANJING
Owner ALCATEL LUCENT SAS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products