WO2018004114A3 - Proxy authentication system and authentication method for providing proxy service - Google Patents
Proxy authentication system and authentication method for providing proxy service Download PDFInfo
- Publication number
- WO2018004114A3 WO2018004114A3 PCT/KR2017/003364 KR2017003364W WO2018004114A3 WO 2018004114 A3 WO2018004114 A3 WO 2018004114A3 KR 2017003364 W KR2017003364 W KR 2017003364W WO 2018004114 A3 WO2018004114 A3 WO 2018004114A3
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- proxy
- authentication
- subscriber information
- proxy server
- proxy authentication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0281—Proxies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
A proxy authentication technique using a username/password specified in the standard specifications (RFC1928, RFC1929, etc.) of existing proxy server technologies is a method of authenticating by comparing subscriber information with information for authentication sent by a terminal, and therefore has the problems of the burden of the proxy server to manage a vast amount of subscriber information when used in an environment with a vast number of subscribers such as a commercial mobile network, and performance being significantly degraded due to proxy authentication. The present invention is an invention capable of solving the above-mentioned problem, and relates to a new proxy authentication system and an authentication method, in which, by confirming whether the same key value is used, instead of comparing subscriber information, for proxy authentication conducted during every proxy session, the proxy server can quickly conduct the proxy authentication without need to manage subscriber information, even in a commercial mobile network with a vast amount of subscriber information.
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| KR1020160082721A KR101837150B1 (en) | 2016-06-30 | 2016-06-30 | Proxy authentication system and method for providing proxy service |
| KR10-2016-0082721 | 2016-06-30 |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| WO2018004114A2 WO2018004114A2 (en) | 2018-01-04 |
| WO2018004114A3 true WO2018004114A3 (en) | 2018-09-07 |
Family
ID=60786986
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/KR2017/003364 Ceased WO2018004114A2 (en) | 2016-06-30 | 2017-03-28 | Proxy authentication system and authentication method for providing proxy service |
Country Status (2)
| Country | Link |
|---|---|
| KR (1) | KR101837150B1 (en) |
| WO (1) | WO2018004114A2 (en) |
Families Citing this family (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN110120932B (en) * | 2018-02-06 | 2020-10-23 | 华为技术有限公司 | Multipath establishing method and device |
| GB201809887D0 (en) * | 2018-06-15 | 2018-08-01 | Iothic Ltd | Decentralised authentication |
| CN112749182B (en) * | 2019-10-30 | 2023-01-31 | 深圳市傲冠软件股份有限公司 | Method for accessing Oracle database by proxy, audit terminal, device and computer readable storage medium |
| KR102787932B1 (en) * | 2024-12-27 | 2025-03-31 | (주)케이스마텍 | Cloud Digital Key Service-Based Key Usage Statistics System, and Method Thereof |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20080037785A1 (en) * | 2005-09-29 | 2008-02-14 | Alexander Gantman | Constrained Cryptographic Keys |
| KR20100016678A (en) * | 2008-08-05 | 2010-02-16 | 건국대학교 산학협력단 | Method for authenticating mobile node in the proxy mobile ip network |
| WO2013049689A1 (en) * | 2011-09-29 | 2013-04-04 | Amazon Technologies, Inc. | Parameter based key derivation |
| KR20130077171A (en) * | 2011-12-29 | 2013-07-09 | 고려대학교 산학협력단 | Authentication method between server and device |
-
2016
- 2016-06-30 KR KR1020160082721A patent/KR101837150B1/en not_active Expired - Fee Related
-
2017
- 2017-03-28 WO PCT/KR2017/003364 patent/WO2018004114A2/en not_active Ceased
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20080037785A1 (en) * | 2005-09-29 | 2008-02-14 | Alexander Gantman | Constrained Cryptographic Keys |
| KR20100016678A (en) * | 2008-08-05 | 2010-02-16 | 건국대학교 산학협력단 | Method for authenticating mobile node in the proxy mobile ip network |
| WO2013049689A1 (en) * | 2011-09-29 | 2013-04-04 | Amazon Technologies, Inc. | Parameter based key derivation |
| KR20130077171A (en) * | 2011-12-29 | 2013-07-09 | 고려대학교 산학협력단 | Authentication method between server and device |
Non-Patent Citations (1)
| Title |
|---|
| R. FIELDING: "Hypertext Transfer Protocol (HTTP/1.1): Authentication", INTERNET ENGINEERING TASK FORCE (IETF) REQUEST FOR COMMENTS (RFC) 7235, June 2014 (2014-06-01), pages 1 - 19, XP055538872, ISSN: 2070-1721 * |
Also Published As
| Publication number | Publication date |
|---|---|
| KR101837150B1 (en) | 2018-03-09 |
| WO2018004114A2 (en) | 2018-01-04 |
| KR20180003196A (en) | 2018-01-09 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| EP2549785B1 (en) | Method and network side entity for authenticating communication devices | |
| EP4304224A3 (en) | Systems and methods of supporting device triggered re-authentication of slice-specific secondary authentication and authorization | |
| US10820369B2 (en) | Wireless connection establishing methods and wireless connection establishing apparatuses | |
| MY159749A (en) | Systems and methods for securing network communications | |
| US9130919B2 (en) | Hosted IMS instance with authentication framework for network-based applications | |
| US9369873B2 (en) | Network application function authorisation in a generic bootstrapping architecture | |
| CN109962878B (en) | Registration method and device of IMS (IP multimedia subsystem) user | |
| RU2015143914A (en) | METHOD AND DEVICE FOR COMMUNICATION AUTHENTICATION OF SUBSCRIBER AND AUTHENTICATION OF THE DEVICE IN COMMUNICATION SYSTEMS | |
| EP4496363A3 (en) | Methods, apparatus, and computer-readable media for discovery of application server and/or services for v2x communications | |
| US9716793B2 (en) | System and method to detect and correct IP phone mismatch in a contact center | |
| WO2018004114A3 (en) | Proxy authentication system and authentication method for providing proxy service | |
| US10931456B2 (en) | Secure router authentication | |
| US11736948B2 (en) | Electronic subscriber identity module transfer eligibility checking | |
| GB2573262A (en) | Mobile identification method based on SIM card and device-related parameters | |
| US20150350899A1 (en) | AUTHENTICATION METHOD OF VoLTE | |
| CN105516070B (en) | A kind of method and device that Service Ticket substitutes | |
| WO2011157142A3 (en) | Method and apparatus for message transmission | |
| US20220166751A1 (en) | Phone call endpoint security | |
| CN107431731B (en) | Method and device for intercepting communication | |
| CN104066086B (en) | The method and device of voice communication | |
| US11381562B2 (en) | Detection of a user equipment type related to access, services authorization and/or authentication | |
| CN108270717B (en) | VoIP communication method, equipment and communication system | |
| CN104468607A (en) | Multi-server authentication method | |
| CN105282125A (en) | Access control method and device in Web real-time communication | |
| MY195414A (en) | Transaction Signing on Multiple Channels |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 17820391 Country of ref document: EP Kind code of ref document: A2 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 17820391 Country of ref document: EP Kind code of ref document: A2 |