FEDERATED MOBILE AUTHENTICATION USING A NETWORK OPERATOR INFRASTRUCTURE
First Claim
1. A computer-implemented security system having computer readable media that store executable instructions executed by a processor, comprising:
- an authentication component of a network operator infrastructure that authenticates a mobile client to the network operator infrastructure based on a mobile identity and issues proof of authentication; and
a network operator security token server of the network operator infrastructure that communicates with the authentication component to obtain the proof of authentication in response to a request by the mobile client for access to an application, the network operator infrastructure having an established trust and in identity federation with the application.
2 Assignments
0 Petitions
Accused Products
Abstract
Architecture that utilizes the strong authentication mechanisms of network operators to provide authentication to mobile applications by identity federation. When a mobile client initiates request for access to an application outside the network operation infrastructure, the request is passed to an associated application secure token service. The application secure token service has an established trust and identity federation with the network operator. The application secure token service redirects the request to a network operator security token server, which then passes the request to a network operator authentication server for authentication against an operator identity service. Proof of authentication is then issued and returned from the network operator security token server to the application secure token service and the application, which allows the mobile client to access the application.
37 Citations
20 Claims
-
1. A computer-implemented security system having computer readable media that store executable instructions executed by a processor, comprising:
-
an authentication component of a network operator infrastructure that authenticates a mobile client to the network operator infrastructure based on a mobile identity and issues proof of authentication; and a network operator security token server of the network operator infrastructure that communicates with the authentication component to obtain the proof of authentication in response to a request by the mobile client for access to an application, the network operator infrastructure having an established trust and in identity federation with the application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer-implemented security method executed by a processor, comprising:
-
receiving at an application a request from a mobile client; checking if the request is associated with a network operator based on network operator information; redirecting the request to a network operator security token service based on the network operator information; mapping the request to the mobile client using a network operator identity service; and providing identity of the mobile client to the application. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A computer-implemented security method executed by a processor, comprising:
-
receiving from a mobile client a request for access to an application, the application external to a network operator infrastructure of which the mobile client is a subscriber; passing the request to an application secure token service associated with the application; checking the request for network operator information associated with the network operator infrastructure; redirecting the request to a network operator security token server of the network operator infrastructure based on the network operator information; mapping the request to the mobile client using a network operator identity service; providing proof of authentication and the request to the application; and allowing access to the application by the mobile client. - View Dependent Claims (17, 18, 19, 20)
-
Specification