Abstract:
A user may be authenticated by an identity provider (IdP) and an authentication agent (AA), producing a result. Proof of the authentication, such as a ticket for example, may be provided to the SP. The UE may be authenticated with another IdP and another authentication agent, producing an associated result. Proof of the authentication, such as another ticket for example, may be provided to the SP. One or more of the authentication agents may reside on an authentication entity besides the UE. A multi-factor authentication proxy (MFAP) may trigger the authentication agents to nm authentication protocols and the MFAP may provide tickets to a client agent of the UE. A user may seamlessly transition between client agents on the same UE or between client agents on different UEs by leveraging authentications.
Abstract:
Systems, methods and apparatus embodiments are described herein for leveraging security associations to enhance security of proximity services. Existing security associations are leveraged to create security associations that are used by proximity services. For example, existing keys may be leveraged to derive new keys that may be used to secure peer-to-peer communications.
Abstract:
As users gain access to different services, the grade of the services may vary, for example, from low value services to high value services. A low value may indicate that a low strength of authentication is required, while a high value may indicate that a high strength of authentication is required to access the service. There is disclosed a method for authenticating a device comprising the determination (204) of an authentication requirement to access a first service that is provided by a service provider, SP, the discovery (208) of one or more authentication factors, associated with the device or the user, that are available for the authentication, the determination (210) whether at least one of the discovered authentication factors are sufficient to achieve the authentication requirement and, if so, the performance (212-228) of corresponding authentication procedures.
Abstract:
Systems, methods and apparatus embodiments are described herein for authenticating a user and/or a user equipment (UE). For example, a user and/or UE may request access to a service controlled by a service provider (SP). The user may be authenticated by an identity provider (IdP), producing a result. A user assertion may be provided to the SP, and the user assertion may comprise the user authentication result. The UE may be authenticated with another IdP, producing an associated result. A device assertion may be provided to the SP and may comprise the device authentication result. A master IdP may bind the assertions together and a consolidated assertion may be provided to the SP so that the user/UE can receive access to a service that is provided by the SP.