Apparatus and method for performing user authentication by proxy in wireless communication system
First Claim
1. A method of performing user authentication of a mobile station by proxy in a communication system, the method comprising:
- receiving an authentication request including information of an Internet site, and user identification information to be used for authentication of the user from an internet service provider;
determining whether to allow the user to access the Internet site, in consideration of database information managed by the mobile station;
requesting security identification information for authentication of the user;
receiving the security identification information;
authenticating, by the mobile station, the user by determining whether the received security identification information comprises valid information, based on security-requiring information managed by the mobile station and the user identification information;
transmitting an authentication result to the internet service provider;
receiving an authorized authentication result from the internet service provider; and
displaying the authorized authentication result to provide a service related to authentication success or failure.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of performing user authentication of a mobile station by proxy in a communication system is provided. The method includes receiving an authentication request, which requests authentication of a user, from an Internet service provider having received information indicating that the mobile station can perform authentication based on only the mobile station'"'"'s own information, requesting the user to provide security identification information for authentication, receiving the security identification information input by the user, authenticating the user by determining whether the security identification information is valid information, through security-requiring information managed by the mobile station, and transmitting an authentication result to the Internet service provider and receiving an authorized authentication result from the Internet service provider and providing a service according to the authorized authentication result to the user.
-
Citations
8 Claims
-
1. A method of performing user authentication of a mobile station by proxy in a communication system, the method comprising:
-
receiving an authentication request including information of an Internet site, and user identification information to be used for authentication of the user from an internet service provider; determining whether to allow the user to access the Internet site, in consideration of database information managed by the mobile station; requesting security identification information for authentication of the user; receiving the security identification information; authenticating, by the mobile station, the user by determining whether the received security identification information comprises valid information, based on security-requiring information managed by the mobile station and the user identification information; transmitting an authentication result to the internet service provider; receiving an authorized authentication result from the internet service provider; and displaying the authorized authentication result to provide a service related to authentication success or failure. - View Dependent Claims (2, 3, 7)
-
-
4. A mobile station for performing authentication of a user by proxy in a communication system, the mobile station comprising:
-
an integrated circuit; and a user interface configured to; request security identification information for authentication of a user, and receive the security identification information; and a security local web server configured to; receive an authentication request including information of an Internet site, and user identification information to be used for authentication of the user from an internet service provider, determine whether to allow the user to access the Internet site, in consideration of database information managed by the mobile station, authenticate the user by determining whether the received security identification information comprises valid information, based on security-requiring information managed by the mobile station and the user identification information, transmit an authentication result to the internet service provider, receive an authorized authentication result from the internet service provider, and display the authorized authentication result to provide a service related to authentication success or failure. - View Dependent Claims (5, 6, 8)
-
Specification