Authenticating users
First Claim
1. A method of authenticating a user seeking access to a service from a service provider in a communication network, the method comprising:
- allocating to a user a plurality of service-specific identities for accessing respective services;
issuing a request from the user, the request identifying the service to be accessed and including a public key of the user;
at a certification authority, authenticating the request and issuing a public key certificate for binding a service-specific identity with the public key in the request, and returning the public key certificate to the user.
2 Assignments
0 Petitions
Accused Products
Abstract
A method of authenticating a user seeking access to a service from a service provider in a communication network, the method comprising: allocating to a user a plurality of service-specific identities for accessing respective services; issuing a request from the user, the request identifying the service to be accessed and including a public key of the user; at a certification authority, authenticating the request and issuing a public key certificate for binding the service-specific identity with the public key in the request, and returning the public key certificate to the user.
-
Citations
19 Claims
-
1. A method of authenticating a user seeking access to a service from a service provider in a communication network, the method comprising:
-
allocating to a user a plurality of service-specific identities for accessing respective services;
issuing a request from the user, the request identifying the service to be accessed and including a public key of the user;
at a certification authority, authenticating the request and issuing a public key certificate for binding a service-specific identity with the public key in the request, and returning the public key certificate to the user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A user terminal for use in a communications network comprising:
-
means for issuing a request identifying a service to be accessed and including a public key;
means for receiving a public key certificate issued by a certification authority which associates a service-specific identity for the service to be accessed with the public key; and
means for forwarding the public key certificate to a service provider for authenticating the service-specific identity for the user and thereby authorising the access to the service. - View Dependent Claims (11, 12, 13)
-
-
14. An authentication system for use in a communications network for allowing access to a service from a service provider, the system comprising:
-
means for receiving a request from a user, the request identifying the service to be accessed and including a public key of the user; and
a certification authority arranged to authenticate the request and issue a public key certificate for a service-specific identity of the service to be accessed and to return the public key certificate to the user. - View Dependent Claims (15, 16, 17, 18, 19)
-
Specification