Ubisafe - Google Patents
The Mobile Phone as Authentication TokenUbisafe
View PDF- Document ID
- 9377224045573725146
- Author
- Ubisafe A
External Links
Snippet
A lot of value-added services on the Internet today require authentication, ie the proper verification of the user's identity, before the user gets access to the service itself. The most common authentication scheme which is employed is the use of username and password …
- 238000012795 verification 0 abstract description 6
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/083—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/06—Authentication
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3750342B1 (en) | Mobile identity for single sign-on (sso) in enterprise networks | |
US7707412B2 (en) | Linked authentication protocols | |
US8589675B2 (en) | WLAN authentication method by a subscriber identifier sent by a WLAN terminal | |
US8122250B2 (en) | Authentication in data communication | |
EP2025088B1 (en) | Provision of secure communiucations connection using third party authentication | |
EP1719316B1 (en) | Means and method for single sign-on access to a service network through an access network | |
CN100433616C (en) | Method for authenticating a user in a terminal, an authentication system, a terminal, and an authorization device | |
US20070178885A1 (en) | Two-phase SIM authentication | |
KR101068424B1 (en) | Inter-working function for a communication system | |
WO2010094331A1 (en) | Authentication to an identity provider | |
Jorstad et al. | Strong authentication with mobile phone as security token | |
CN101272379A (en) | An Improved Method Based on IEEE802.1x Security Authentication Protocol | |
Lunde et al. | Using SIM for strong end-to-end Application Authentication | |
Ubisafe | The Mobile Phone as Authentication Token | |
Marques et al. | Integration of the Captive Portal paradigm with the 802.1 X architecture | |
Asokan et al. | Man-in-the-middle in tunnelled authentication | |
Ubisafe et al. | Strong Authentication for Internet Applications with the GSM SIM | |
Hallsteinsen | A study of user authentication using mobile phone | |
Bjornstad et al. | Securing virtual private networks with SIM authentication | |
Billington et al. | Mutual authentication of B3G devices within personal distributed environments | |
Pagliusi | Internet Authentication for Remote Access | |
Tan | Providing Secured Public Wireless-LAN Internet Access |