APPARATUS AND METHOD FOR PERFORMING USER AUTHENTICATION BY PROXY IN WIRELESS COMMUNICATION SYSTEM
First Claim
1. A method of performing user authentication of a mobile station by proxy in a communication system, the method comprising:
- receiving an authentication request, which requests authentication of a user, from an Internet service provider having received information indicating that the mobile station can perform user authentication based on the mobile station'"'"'s own information;
requesting the user to provide security identification information for authentication;
receiving the security identification information input by the user;
authenticating the user by determining whether the security identification information is valid information, through security-requiring information managed by the mobile station, and transmitting an authentication result to the Internet service provider; and
receiving an authorized authentication result from the Internet service provider and providing a service according to the authorized authentication result to the user.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of performing user authentication of a mobile station by proxy in a communication system is provided. The method includes receiving an authentication request, which requests authentication of a user, from an Internet service provider having received information indicating that the mobile station can perform authentication based on only the mobile station'"'"'s own information, requesting the user to provide security identification information for authentication, receiving the security identification information input by the user, authenticating the user by determining whether the security identification information is valid information, through security-requiring information managed by the mobile station, and transmitting an authentication result to the Internet service provider and receiving an authorized authentication result from the Internet service provider and providing a service according to the authorized authentication result to the user.
-
Citations
20 Claims
-
1. A method of performing user authentication of a mobile station by proxy in a communication system, the method comprising:
-
receiving an authentication request, which requests authentication of a user, from an Internet service provider having received information indicating that the mobile station can perform user authentication based on the mobile station'"'"'s own information; requesting the user to provide security identification information for authentication; receiving the security identification information input by the user; authenticating the user by determining whether the security identification information is valid information, through security-requiring information managed by the mobile station, and transmitting an authentication result to the Internet service provider; and receiving an authorized authentication result from the Internet service provider and providing a service according to the authorized authentication result to the user. - View Dependent Claims (2, 3, 4)
-
-
5. A method of performing user authentication of a mobile station by proxy in a communication system, the method comprising:
-
performing a predetermined authentication algorithm in response to a request from a mobile communication service provider and transmitting a result of the performing of the predetermined authentication algorithm to the mobile communication service provider; receiving a user authentication result through a permanent authentication key generated according to the result of the performing of the predetermined authentication algorithm from the mobile communication service provider and providing the user authentication result to the Internet service provider; and receiving an authorized authentication result from the Internet service provider and providing a user with a service according to the authorized authentication result. - View Dependent Claims (6, 7, 8, 9, 10)
-
-
11. A mobile station for performing user authentication by proxy in a communication system, the mobile station comprising:
-
a user interface for requesting a user to provide security identification information for authentication of the user and for receiving the security identification information input by the user; and a security local web server for receiving an authentication request, which requests authentication of the user, from an Internet service provider having received information indicating that the mobile station can perform user authentication based on the mobile station'"'"'s own information, for authenticating the user by determining whether the security identification information is valid information, through security-requiring information managed by the mobile station, for transmitting an authentication result to the Internet service provider, for receiving an authorized authentication result from the Internet service provider, and for providing a service according to the authorized authentication result to the user. - View Dependent Claims (12, 13, 14)
-
-
15. A mobile station of performing user authentication by proxy in a communication system, the mobile station comprising:
a security local web server for performing a predetermined authentication algorithm in response to a request from a mobile communication service provider and transmitting a result of the performing of the predetermined authentication algorithm to the mobile communication service provider, for receiving a user authentication result through a permanent authentication key generated according to the result of the performing of the predetermined authentication algorithm from the mobile communication service provider and providing the user authentication result to the Internet service provider, and for receiving an authorized authentication result from the Internet service provider and providing a user with a service according to the authorized authentication result. - View Dependent Claims (16, 17, 18, 19, 20)
Specification