Characteristics of security associations
First Claim
1. A method of authenticating a subscription for access to a service from a service provider, the method comprising:
- sending an access request to the service provider from a user device;
in response to the access request, receiving, from the service provider, a request for a subscription authentication;
in response to the request for the subscription authentication, generating an authentication response, wherein the authentication response comprises a subscription identity associated with the subscription; and
sending the authentication response to the service provider to receive access to the service via the user device,wherein the authentication response comprises an indication of a freshness of the subscription authentication, and an indication of a strength of the subscription authentication, the indication of the freshness based on a time that the authentication of the subscription occurred.
0 Assignments
0 Petitions
Accused Products
Abstract
Authentication of a user or a wireless transmit/receive unit may be based on an obtained measure of authentication strength, which may referred to as an assurance level. For example, a user, via a WTRU, may request access to a service controlled by an access control entity (ACE). The user may be authenticated with a user authenticator and assertion function (UAAF), producing a result. A user assertion may be provided that includes the user authentication result, a user assurance level, and/or a user freshness level. The WTRU may be authenticated with a device authenticator and assertion function (DAAF), producing an associated result. A device assertion may be provided that may include the device authentication result, a device assurance level, and/or a device freshness level. The assertions may be bound together to receive access to a service or resource.
-
Citations
18 Claims
-
1. A method of authenticating a subscription for access to a service from a service provider, the method comprising:
-
sending an access request to the service provider from a user device; in response to the access request, receiving, from the service provider, a request for a subscription authentication; in response to the request for the subscription authentication, generating an authentication response, wherein the authentication response comprises a subscription identity associated with the subscription; and sending the authentication response to the service provider to receive access to the service via the user device, wherein the authentication response comprises an indication of a freshness of the subscription authentication, and an indication of a strength of the subscription authentication, the indication of the freshness based on a time that the authentication of the subscription occurred. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A wireless transmit/receive unit (WTRU), the WTRU comprising:
-
a memory comprising executable instructions; and a processor in communications with the memory, the instructions, when executed by the processor, cause the processor to effectuate operations comprising; sending an access request to access a service from a service provider; in response to the access request, receiving, from the service provider, a request for an authentication of a subscription; in response to the request for the subscription authentication, generating an authentication response, wherein the authentication response comprises a subscription identity associated with the subscription; and sending the authentication response to the service provider to receive access to the service via the WTRU, wherein the authentication response comprises an indication of a freshness of the subscription authentication, and an indication of a strength of the subscription authentication, the indication of the freshness based on a time that the authentication of the subscription occurred. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
Specification