User authentication in a communications system
First Claim
Patent Images
1. A method comprising:
- receiving a network originated identity from a user in a communication network;
associating the network originated identity with at least one non-network originated identity stored in a data storage, wherein the at least one non-network originated identity comprises a first identity of an application outside a domain of an operator of the communication network, and wherein the network originated identity comprises at least a second identity originated by the operator, an internet protocol multimedia private identity, and an international mobile subscriber identity;
receiving a non-network originated identity from the user;
storing data for associating an intermediate identity with the non-network originated identity and the associated network originated identity;
accessing the intermediate identity for verification of the non-network originated identity;
comparing the non-network originated identity from the user with the at least one non-network originated identity from the data storage; and
authenticating the user if the comparison is valid.
2 Assignments
0 Petitions
Accused Products
Abstract
A method in a communication network wherein users are authenticated based on network originated user identities is disclosed. The authentication method comprising the steps of receiving a network originated identity from a user and associating the network originated identity with at least one non-network originated identity stored in a data storage. When a non-network originated identity is received from the user, the non-network originated identity from the user is compared with the at least one non-network originated identity from the data storage. The user is authenticated if the comparison is valid.
-
Citations
22 Claims
-
1. A method comprising:
-
receiving a network originated identity from a user in a communication network; associating the network originated identity with at least one non-network originated identity stored in a data storage, wherein the at least one non-network originated identity comprises a first identity of an application outside a domain of an operator of the communication network, and wherein the network originated identity comprises at least a second identity originated by the operator, an internet protocol multimedia private identity, and an international mobile subscriber identity; receiving a non-network originated identity from the user; storing data for associating an intermediate identity with the non-network originated identity and the associated network originated identity; accessing the intermediate identity for verification of the non-network originated identity; comparing the non-network originated identity from the user with the at least one non-network originated identity from the data storage; and authenticating the user if the comparison is valid. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A computer program, embodied on a non-transitory computer readable medium, said computer program controlling a computing system to perform operations comprising:
-
receiving a network originated identity from a user in a communication network; associating the network originated identity with at least one non-network originated identity stored in a data storage, wherein the at least one non-network originated identity comprises a first identity of an application outside a domain of an operator of the communication network, and wherein the network originated identity comprises at least a second identity originated by the operator, an interne protocol multimedia private identity, and an international mobile subscriber identity; receiving a non-network originated identity from the user; storing data for associating an intermediate identity with the non-network originated identity and the associated network originated identity; accessing the intermediate identity for verification of the non-network originated identity; comparing the non-network originated identity from the user with the at least one non-network originated identity from the data storage; and authenticating the user if the comparison is valid.
-
-
16. An apparatus comprising:
-
a receiver configured to receive a network originated identity from a user in a communication network; an associating unit configured to associate the network originated identity with at least one non-network originated identity, wherein the at least one non-network originated identity comprises a first identity of an application outside a domain of an operator of the communication network, and wherein the network originated identity comprises at least a second identity originated by the operator, an internet protocol multimedia private identity, and an international mobile subscriber identity; a receiver configured to receive a non-network originated identity from the user; storage including data for associating an intermediate identity with the non-network originated identity and the associated network originated identity, the intermediate identity accessed for verification of the non-network originated identity; a comparator configured to compare the non-network originated identity from the user with the at least one non-network originated identity from the associating unit; and an authenticator configured to authenticate the user if the comparison is valid. - View Dependent Claims (17, 18, 19, 20, 21, 22)
-
Specification