EP1762037A2 - Method and system for certifying a user identity - Google Patents
Method and system for certifying a user identityInfo
- Publication number
- EP1762037A2 EP1762037A2 EP05778769A EP05778769A EP1762037A2 EP 1762037 A2 EP1762037 A2 EP 1762037A2 EP 05778769 A EP05778769 A EP 05778769A EP 05778769 A EP05778769 A EP 05778769A EP 1762037 A2 EP1762037 A2 EP 1762037A2
- Authority
- EP
- European Patent Office
- Prior art keywords
- terminal
- server
- identity
- user
- connection
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
Definitions
- the present invention relates to a method and system for certifying the identity of a user.
- the invention applies more particularly to the certification of the identity of a user of a terminal during a request for authentication of said user, after at least one access control to a packet network.
- This packet network may be a public packet network for IP (Internet Protocol) transmission, in particular the Internet network, or a private network for IP transmission packets, such as the intranet network of a company, or well any other network of packets for which the access of the users is controlled by a protocol of the AAA type (Authentication, Authorization and Accounting, ie authentication, authorization and accounting).
- IP Internet Protocol
- AAA Authentication, Authorization and Accounting
- the access control to a packet network is achieved by an identification and authentication procedure, with at least one identifier and a password. After validation of the access control, the user receives an authorization to transmit information on the network to which he has connected.
- a public IP address is first assigned to the user's terminal. Then, when the connection to the intranet is actually active, the terminal uses a private IP address corresponding to the addressing domain of the intranet.
- the terminal of the user uses his own permanent IP address regardless of access to the network.
- Gold 1 processes and existing identification and authentication systems rely on the IP address assigned to the user terminal via the packet network to carry identification while in some configurations (private intranet, Mobile IP, ...) the terminal uses an IP address different from that assigned by the packet network to which the user accesses.
- the technical problem to be solved by the object of the present invention is to propose a method and a system for certifying the identity of at least one user of a terminal, after at least one access control to a terminal.
- Packet network which would allow the user to avoid the multiplication of identification and authentication procedures, after performing access control to a packet network.
- connection indicator by the identity server in the database associated with said correlation element; transmitting the connection indicator by the terminal to a service provider when requesting a connection to said provider of a connection; services,
- connection cookie also known as “cookie”
- cookie a set of information from the identity server and automatically stored in the terminal when a connection to said identity server.
- a system for certifying the identity of at least one user of a terminal, after at least one access control to a packet network is remarkable in that said system comprises:
- an access server able to receive at least one correlation element from said terminal during a connection request to said packet network
- an identity server capable of transmitting a connection indicator to the terminal after receiving a request from said terminal
- a proxy server capable of transmitting said correlation element and at least one identifier of said user, from the access server, to at least one database linked to the identity server, the terminal being able to transmit said control witness; connection during a connection request to a service provider to retrieve said user identifier transmitted during access control to the packet network.
- the technical result obtained aims at reusing the identity certification, already performed by the user during access control to the packet network when accessing a service provider accessible only after a new access control.
- the system and the method according to the invention thus provide a simplification of access to a service provider through the use of the certification of the identity of the user already made during the access control to a network packets, for example the Internet network or a private IP network.
- a network packets for example the Internet network or a private IP network.
- the terminal When requesting the connection to the packet network, the terminal includes at least one correlation element in a request to an access server.
- the access server relays the packet network access control procedure to an authentication server using an Authentication, Authorization and Accounting (AAA) type protocol (authentication, authorization, and accounting).
- AAA Authentication, Authorization and Accounting
- said correlation element will make it possible to retrieve at least the user's identifier, stored in a database connected to the identity server.
- the identity server manages the deposit of a connection indicator on the terminal, when the latter issues a request after the first access control is made.
- the identity server responds to the identity certification requests of the user who wishes to connect to a service provider.
- the said connection indicator serves as a reference key for the database of data connected to the identity server to know the authentication already performed by the user when connecting to the packet network.
- said method and system for certifying the identity of a user in accordance with the invention, allow identification and authentication independently of the IP address assigned to the user's terminal by said packet network, unlike existing systems.
- said correlation element is an indifferently random or pseudo-random number provided by the terminal to at least one authentication server located in the packet network.
- the terminal transmits a correlation element to the access server, which relays it to an authentication server.
- Said correlation element, with the user's identifier, is then stored in a database connected to the identity server.
- at least one authentication request from the service provider is transmitted to the identity server using a redirection mechanism.
- the user accesses a service, provided by a service provider, that requires identity certification.
- the service provider issues an authentication request.
- This request is transmitted to the identity server using a redirection mechanism, which allows the transmission of the latter to the identity server.
- the connection indicator received during the connection request to said service provider, is thus transmitted by the service provider to the identity server.
- the redirection mechanism towards the identity server avoids the realization of a second access control for the connection to the service provider and allows the use of the certification of the identity of the user, already carried out during the control d : access for connection to the packet network.
- the said connection indicator is used as a key for consulting the said database by the identity server in order to know the identifier of the user.
- the identity server has transmitted a connection cookie to the terminal which, in turn, transmits this cookie upon a connection request to a service provider.
- the identity server On receipt of the known connection indicator, thanks to the redirection mechanism, the identity server consults the database with the connection indicator used as a consultation key. In return, the identity server obtains the user's ID (or User ID).
- said terminal is configured to store at least one correlation element transmitted during a connection request to said packet network, to transmit at least one request including said correlation element to at least one server of identity, to store at least one connection indicator from said identity server and to transmit said connection indicator during a connection request to a service provider.
- the terminal includes an application for storing a correlation element, which is transmitted to an identity server by remission of an http request.
- Said application of the terminal also allows processing related to the response of said identity server and the filing of a connection indicator, stored by the terminal and transmitted during the connection request to a service provider requiring a certification of 'identity.
- FIG. 1 represents the general architecture of a system for certifying the identity of a user, according to the invention, during a connection to a packet network.
- Figure 2 shows the general architecture of said certification system of the identity of a user, when connecting to a service provider.
- a user wishes to access a service provider 30 through a packet network 20 with which he connects via a terminal 10.
- the terminus 10 of the user can be of any kind, for example a personal computer or PC, a mobile terminal or any other terminal equipped to control a connection request to said packet network, and called UE (User Equipment) on the FIG. 1.
- the user is subscribed to a telecommunications operator and, depending on the nature of said terminal 10, is connected to a telecommunications network of said indifferently fixed or mobile operator.
- the packet network 20 may be a public packet network for IP (Internet Protocol) transmission, in particular the Internet network, or a private network of IP transmission packets 1 such as a corporate intranet network. or any other packet network for which user access is controlled by an Authentication, Authorization and Accounting (AAA) protocol, defined by NETF.
- IP Internet Protocol
- AAA Authentication, Authorization and Accounting
- the service provider 30 provides various services 31,
- the terminal 10 transmits a connection request to a packet network access server 11, which relays it to at least one authentication server 21, in particular a Radius server (Remote Authentication Dial-ln User Service), located in the packet network to which the connection has been requested
- the access server 11 may for example be a Network Access Server (NAS) or Broadband Access Server (BAS) type device.
- NAS Network Access Server
- BAS Broadband Access Server
- the terminal 10 and the access server 11 s are therefore carried out indifferently at low bit rate or broadband and use for example a PPP transmission protocol (point-to-point protocol).
- the terminal 10 also transmits at least one identifier of the user (or User ID), as well as at least one correlation element, to the access server 11 and to the user. authentication server 21.
- the correlation element is, in particular, an indifferently random or pseudo-random number, provided by the terminal 10 to an authentication server 21 located in the packet network.
- the correlation element can be supplied to the terminal 10 by the access server 11 during the connection request to the packet network 20, at the opening of the PPP protocol (LCP layer) dialogue, or the terminal 10 may use data provided by the access server 11 to constitute said correlation element.
- PPP protocol LCP layer
- the terminal 10 includes an application for managing at least one PPP (point-to-point protocol) stack.
- PPP point-to-point protocol
- the terminal 10 is configured to store a data received during the packet network connection request and transmitted by the access server 11. Said correlation element is also stored by the terminal 10.
- the access server 11 transmits the connection request to a proxy server 12, for example of the Radius type, through which the information exchanged between each user terminal and the authentication server 21 flows. Said proxy server 12 then transmits the connection request to the authentication server 21, in particular a Radius server.
- a connection request at least one packet network access control is provided, which is performed by an identification and authentication procedure, for example with at least one identifier (known as "login"). ") And a password.
- the authentication server 21 transmits a packet network connection authorization for the terminal 10.
- the connection request is stored in a database data (BdD) connected to the authentication server 21.
- the protocol Radius specific for authentications, is defined by NETF and standardized by the organization ETSI (European Telecommunications Institute Standards, ie European Telecommunications Standardization Institute).
- the proxy server 12 transmits the identifier of the user (or User ID) and the correlation element, from the access server 11, to a database 13 connected to to an identity server 14.
- Said base data 13 memorizes "IElement correlation with the user identifier transmitted by the terminal 10 when the connection request to the packet network.
- the proxy server 12 acknowledges the connection request from the terminal 10 to the network 20 of packets.
- the terminal 10 then transmits a request, including the correlation element, to the identity server 14 via the access server 11 and a router equipment 22 located in the network 20 of packets.
- the request may be a request implementing a hyper text transfer protocol (http) type transfer protocol, usually used to transmit information, in particular to include said correlation element.
- http hyper text transfer protocol
- the identity server 14 After receiving the request, the identity server 14 transmits a connection indicator to the terminal 10, intended to be automatically stored by said terminal 10.
- the terminal 10 is configured for sending at least one request, for example a request implementing an http flow transfer protocol, to the identity server 14, as well as for processing linked to the server's response. 14 the receipt and storage of a cookie.
- the identity server 14 contacts the database 13, in which the user identifier (or User ID) and the associated correlation element are already stored. With the received and known correlation element, the identity server 14 updates the database 13 by adding the connection indicator, transmitted to the terminal 10, associated with the correlation element.
- connection indicator is stored in the database 13, associated with the correlation element.
- the database 13 may or may not be physically included in the identity server.
- the terminal 10 Upon the request to connect to the service provider, the terminal 10 also transmits at least the connection cookie to the service provider.
- the connection indicator will make it possible to retrieve the identifier of the user, stored during the packet network access control in said database 13 connected to the identity server 14. The transmission is performed via the access server 11 and the router equipment 22.
- the service provider 30 issues an authentication request.
- the request is transmitted to the identity server 14 using a redirection mechanism, which allows the transmission thereof to the identity server 14.
- the received connection indicator is transmitted by the service provider to the identity server.
- the redirection mechanism can, for example, be similar to those implemented from the recommendations defined by the consortium of companies called Liberty Alliance, whose purpose is the development of transactions on the Internet.
- the redirection mechanism towards the identity server 14 avoids the realization of a second access control for the connection to the service 31,
- the identity server 14 will recognize the connection indicator allowing to find the identifier of the user stored in the database 13. On receipt of the known connection indicator, the identity server 14 consults the database 13 with the connection indicator used as the consultation key. In return, the identity server 14 obtains the user identifier (or User ID). The connection cookie is used as a key for consulting the database 13 by the identity server 14 to know the identifier of the user.
- the identity server 14 transmits said user identifier to the service provider 30 avoiding new authentication of the user, after the authentication already performed during access control to the packet network.
- the service provider 30 therefore recognizes the user and obtains a certification of his identity by the identity server 14.
- the identity server 14 certifies the identity of the user to the service provider 30 by using the certification of the identity of the user performed during access control to said packet network.
- the identity server 14 may also specify the type of authentication used by said user, so as to indicate (if necessary) the reliability of the certification transmitted by the identity server 14 to the service provider 30.
- the service provider 30 then transmits the connection authorization to the terminal 10.
- the user identifier or User ID
- a random or pseudo random correlation element as described above.
- the service provider 30 receives the certification of the identity of the user by the identity server 14.
- this identity certification is performed from the user ID (or User ID).
- This can also be done from an equivalent identity, contained in said database 13.
- the user has previously transmitted the information corresponding to said equivalent identity.
- the user also indicates his preference as to the use by the identity server 14 of either the identifier of the user (or User Id) 1 or the equivalent identity.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer And Data Communications (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
Claims
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR0451363A FR2872363A1 (en) | 2004-06-29 | 2004-06-29 | METHOD AND SYSTEM FOR CERTIFYING THE IDENTITY OF A USER |
PCT/FR2005/001562 WO2006010810A2 (en) | 2004-06-29 | 2005-06-21 | Method and system for certifying a user identity |
Publications (1)
Publication Number | Publication Date |
---|---|
EP1762037A2 true EP1762037A2 (en) | 2007-03-14 |
Family
ID=34945700
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP05778769A Withdrawn EP1762037A2 (en) | 2004-06-29 | 2005-06-21 | Method and system for certifying a user identity |
Country Status (4)
Country | Link |
---|---|
US (1) | US20080052771A1 (en) |
EP (1) | EP1762037A2 (en) |
FR (1) | FR2872363A1 (en) |
WO (1) | WO2006010810A2 (en) |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8910255B2 (en) * | 2008-05-27 | 2014-12-09 | Microsoft Corporation | Authentication for distributed secure content management system |
US7600253B1 (en) * | 2008-08-21 | 2009-10-06 | International Business Machines Corporation | Entity correlation service |
US8327434B2 (en) * | 2009-08-14 | 2012-12-04 | Novell, Inc. | System and method for implementing a proxy authentication server to provide authentication for resources not located behind the proxy authentication server |
WO2014128732A1 (en) * | 2013-02-25 | 2014-08-28 | P Ashok Anand | Correlation identity generation method for cloud environment |
SG11201506512YA (en) * | 2013-02-25 | 2015-09-29 | Ashok Anand P | Electronic switching system for generating correlation identity |
JP6287401B2 (en) * | 2014-03-18 | 2018-03-07 | 富士ゼロックス株式会社 | Relay device, system and program |
CN108282475B (en) * | 2018-01-18 | 2020-09-08 | 世纪龙信息网络有限责任公司 | User identification information reading method and system, computer storage medium and device |
FR3103072A1 (en) * | 2019-11-08 | 2021-05-14 | Orange | method of configuring access to an Internet service |
-
2004
- 2004-06-29 FR FR0451363A patent/FR2872363A1/en active Pending
-
2005
- 2005-06-21 WO PCT/FR2005/001562 patent/WO2006010810A2/en active Application Filing
- 2005-06-21 US US11/630,938 patent/US20080052771A1/en not_active Abandoned
- 2005-06-21 EP EP05778769A patent/EP1762037A2/en not_active Withdrawn
Non-Patent Citations (1)
Title |
---|
See references of WO2006010810A3 * |
Also Published As
Publication number | Publication date |
---|---|
WO2006010810A2 (en) | 2006-02-02 |
WO2006010810A3 (en) | 2006-11-02 |
FR2872363A1 (en) | 2005-12-30 |
US20080052771A1 (en) | 2008-02-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3008872B1 (en) | Method for authenticating a terminal by a gateway of an internal network protected by an entity providing secure access | |
EP1909462B1 (en) | Method of compartmentalised provision of an electronic service | |
FR2877521A1 (en) | Position information distributing device, has distribution unit distributing return message to user terminal, where message is produced based on authentication request by adding position data based on cooperating procedure | |
WO2002102018A1 (en) | Method for authentication between a portable telecommunication object and a public access terminal | |
WO2012131275A2 (en) | Incoming redirection mechanism on a reverse proxy | |
EP1891771A1 (en) | Method for translating an authentication protocol | |
WO2006021661A2 (en) | Secured authentication method for providing services on a data transmission network | |
WO2015097369A1 (en) | Technique for controlling the service request routing | |
EP3588903A1 (en) | Method, device and server for secure distribution of a configuration with one terminal | |
EP3568966B1 (en) | Methods and devices for delegation of distribution of encrypted content | |
WO2006010810A2 (en) | Method and system for certifying a user identity | |
FR2834163A1 (en) | Contents provision network access control having interactive exchange digital words step across wireless communications network having confidence unit/mobile terminal user accessible. | |
WO2005034468A1 (en) | Network access system which is adapted for the use of a simplified signature method, and server used to implement same | |
WO2014154902A1 (en) | Method for issuing a location assertion | |
EP1983722A2 (en) | Method and system for securing internet access from a mobile telephone, corresponding mobile telephone and terminal | |
WO2005020538A2 (en) | Method and system for double secured authentication of a user during access to a service | |
EP3820112A1 (en) | Method for configuring access to an internet service | |
EP2911365B1 (en) | Method and system for protecting transactions offered by a plurality of services between a mobile device of a user and an acceptance point | |
EP2400726B1 (en) | Method for identifying a local network identified by a public IP address | |
EP3679499B1 (en) | Perfectioned enrollment of a device in a secure network | |
FR2827458A1 (en) | Virtual operator representing physical operator radiocommunications process having radiocommunication mechanism authenticating parameters and another physical operator establishing new authentication parameters/specific services. | |
EP4362391A1 (en) | Method for managing access of a user to at least one application, associated computer program and system | |
WO2017060624A1 (en) | Means for managing access to data | |
WO2007054657A2 (en) | Method and device for delivering a federation network identifier to a service provider | |
WO2007012786A2 (en) | Method for using a sequence of authentications |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20061212 |
|
AK | Designated contracting states |
Kind code of ref document: A2 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU MC NL PL PT RO SE SI SK TR |
|
AX | Request for extension of the european patent |
Extension state: AL BA HR LV MK YU |
|
RIC1 | Information provided on ipc code assigned before grant |
Ipc: H04L 29/06 20060101AFI20070516BHEP |
|
RIN1 | Information on inventor provided before grant (corrected) |
Inventor name: CROM, JEAN-MICHEL Inventor name: DELMOND, FREDERIC |
|
DAX | Request for extension of the european patent (deleted) | ||
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
18D | Application deemed to be withdrawn |
Effective date: 20120103 |