Method and system for authentification of a mobile user via a gateway
First Claim
1. A method of authenticating a first party (42) to a second party (44) via a gateway (46) the first party using an encryption protocol between itself and the gateway and the second party using an encryption protocol between itself and the gateway the method comprising the steps of:
- installing in the second party that the gateway is a trusted certification authority (48);
the gateway issuing a digital certificate authenticating the first party; and
the second party verifying the digital certificate in order to confirm to the second party that the digital certificate comes from the trusted certification authority;
2 Assignments
0 Petitions
Accused Products
Abstract
A method of authenticating a client (42) and a server (44) to each other via a gateway (46) in which the client uses a first encryption protocol between itself and the gateway and the server uses a second different encryption protocol between itself and the gateway, the method comprising the steps of: installing in the server that the gateway is a trusted certification authority (48); the gateway issuing a digital certificate authenticating the client; and the server verifying the digital certificate in order to confirm to itself that the digital certificate comes from the trusted certification authority.
-
Citations
28 Claims
-
1. A method of authenticating a first party (42) to a second party (44) via a gateway (46) the first party using an encryption protocol between itself and the gateway and the second party using an encryption protocol between itself and the gateway the method comprising the steps of:
-
installing in the second party that the gateway is a trusted certification authority (48);
the gateway issuing a digital certificate authenticating the first party; and
the second party verifying the digital certificate in order to confirm to the second party that the digital certificate comes from the trusted certification authority;
- View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A transaction system (40) comprising a first party (42) and a second party (44) which communicate via a gateway (46) communication between the parties requiring authentication of the first party to the second party using an encryption protocol between the first party and the gateway and an encryption protocol between the second party and the gateway wherein:
-
the gateway comprises a digital certificate signer (48) to issue a digital certificate authenticating the first party;
the second party comprises a digital certificate verifier corresponding to the digital certificate signer of the gateway which verifies the digital certificate in order to confirm to the second party that the gateway signed digital certificates are authentic. - View Dependent Claims (21, 22)
-
- 23. A gateway (46) through which a first party (42) and a second party (44) can communicate, communication between the parties requiring authentication of the first party to the second party using an encryption protocol between the first party and the gateway and an encryption protocol between the second party and the gateway, the gateway comprising a digital certificate signer (48) to issue a digital certificate authenticating the first party the signer of the gateway corresponding to a verifier of the second party which verifies the digital certificate in order to confirm to the second party that the gateway signed digital certificates are authentic.
-
25. A computer program product for authenticating a first party (42) to a second party (44) via a gateway (46) the first party using an encryption protocol between itself and the gateway and the second party using an encryption protocol between itself and the gateway, the computer program product comprising:
-
computer executable code to indicate to the second party that the gateway is a trusted certification authority (48);
computer executable code to enable the gateway to issue a digital certificate authenticating the first party; and
computer executable code to enable the second party to verify the digital certificate in order to confirm to the second party that the digital certificate has been issued by the trusted certification authority. - View Dependent Claims (26)
-
-
27. A method of content delivery from a content provider (44) to a terminal (42) through a communications network in which the content provider and the terminal authenticate each other via a gateway (46) the terminal using an encryption protocol between itself and the gateway and the content provider using an encryption protocol between itself and the gateway the method comprising the steps of:
-
the content provider determining that the gateway is a trusted certification authority (48);
the gateway issuing a digital certificate authenticating the terminal; and
the content provider verifying the digital certificate in order to confirm to the content provider that the digital certificate comes from the trusted certification authority.
-
-
28. A method for authenticating a first party (42) and a second party (44) to each other via a gateway (46), the method comprising the steps of:
-
providing the gateway with a gateway public key and a corresponding gateway private key;
providing the first party and the gateway with a common public key to authenticate the source of information transferred from one to the other; and
providing the second party with the gateway public key to authenticate information received from the gateway, the gateway public key being different to the common public key.
-
Specification