Abstract:
A service integration platform for providing Internet services includes an interface configured to receive a service request message that is initiated by a user of an application provided by an Independent Software Vendor, the service request message implemented in an API interface and including a plurality of platform-level parameters conforming to the API type The system includes one or more processors coupled to the interface, configured to locate a set of API-appropriate authentication checks, perform authentication of the service request according to the set of authentication checks, and route the service request to a service address of the Internet Service Provider (ISP) in the event that the service request is authenticated
Abstract:
A method and apparatus for intersystem mobility security context handling between different radio access networks which can include a receiver configured to receive a tracking area update message from a user terminal. The message can include a first key identifier configured to identify a mapped security context and a second key identifier configured to identify a cached security context. A verifier can be configured to verify the tracking area update message with a key identified by the first or second key identifier.
Abstract:
A wireless personal area network accessing method is provide, the method includes that: a coordinator broadcasts a beacon frame, the beacon frame includes the information about whether the coordinator sends an authentication requirement, the beacon frame also includes the authentication supported by the coordinator and key management package when a device receipts the authentication requirement; the device receives the beacon frame, the authentication between the coordinator and the device is made by using a authentication method corresponding to the authentication supported by the coordinator and key management package, when the device determines that the coordinator sends the authentication requirement, then an association between the coordinator and the device is directly made according to the authentication result, or the association between the coordinator and the device is made after making session key negotiation.
Abstract:
An application server enables a secure network interaction. The application server receives a request for the secure network interaction from a third-party server. In response, the application server determines a security procedure, such as an authentication procedure, and a client corresponding to the secure network interaction. The client includes a secure desktop agent (SDA). The application server sends a message to the client that activates the SDA. The SDA establishes a secure connection with the application server. The SDA receives user credentials in a secure desktop environment and transmits them to the application server over the secure connection. The application verifies the user credentials and sends a digitally-signed authenticated response to the third-party server.
Abstract:
A method for negotiating about safety ability while a terminal is moving is disclosed in the present invention. The method comprises the steps of: receiving a router area updating request of an UE by a target network side entity; acquiring an authority vector associated key derived from the root key, and sending a selected safety algorithm to the UE; deriving the authority vector associated key by the UE from its own root key. A system, SGSN and MME for negotiating about safety ability while a terminal is moving are also provided in the present invention. The present invention is suitable to realize the negotiation of the UE with the network side about safety ability.
Abstract:
A highly scalable application network appliance is described herein. According to one embodiment, a network element includes a switch fabric, a first service module coupled to the switch fabric, and a second service module coupled to the first service module over the switch fabric. In response to packets of a. network transaction received from a client over a first network to access a server of a data center having multiple servers over a second network, the first service module is configured to perform a first portion of OSI (open system interconnection) compatible layers of network processes on the packets while the second service module is configured to perform a second portion of the OSI compatible layers of network processes on the packets. The first portion includes at least one OSI compatible layer that is not included in the second portion. Other methods and apparatuses are also described.
Abstract:
A method of authenticating a user device includes transmitting a request, the request including a query for information, and receiving an identifier, the identifier being associated with one or more authentication mechanisms for obtaining access to emergency services.
Abstract:
A method and a system for authenticating a user terminal in an IMS network, the method comprises: receiving a REGISTER message of user terminal UE; determining an authentication mode according to the Authentication head domain and/or private access network information P-Access-Network-Info head domain in the REGISTER message, performing an authentication processing according to the determined authentication mode.
Abstract:
There is presented an authentication type selection for user authentication in a communication system supporting multiple authentication mechanisms. The authentication type selection may comprise a determination of an authentication scheme to be used for authenticating a user equipment based on information in a request from said user equipment, an indication about the authentication scheme to be used, and a determination of a type of an authentication scheme to be used for authenticating said user equipment based on a mapping between private and public user identities and usable authentication types.
Abstract:
Techniques to overlay ciphersuite negotiation on top of the mesh link establishment protocol without sacrificing security. Two cryptographic primitives may be utilized: (1) a message integrity code, which is denoted as m K , where K is an authentication key (m K may be utilized to detect forged messages); and (2) a cryptographic random number generator, which will be denoted as rng. The techniques may use rng to produce values that cannot be predicted by any polynomial time algorithm.