A Proposal for Federation Technology for Authenticated Information between Terminals
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32799
A Proposal for Federation Technology for Authenticated Information between Terminals

Authors: Katsuyuki Umezawa, Takashi Tashiro, Satoru Tezuka

Abstract:

Recently, various services such as television and the Internet have come to be received through various terminals. However, we could gain greater convenience by receiving these services through cellular phone terminals when we go out and then continuing to receive the same services through a large screen digital television after we have come home. However, it is necessary to go through the same authentication processing again when using TVs after we have come home. In this study, we have developed an authentication method that enables users to switch terminals in environments in which the user receives service from a server through a terminal. Specifically, the method simplifies the authentication of the server side when switching from one terminal to another terminal by using previously authenticated information.

Keywords: Authentication, Cookie, Federation, GBA, IPSec

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1334207

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1254

References:


[1] IETF RFC2109 HTTP State Management Mechanism
[2] IETF RFC2965 HTTP State Management Mechanism
[3] "Generic Authentication Architecture (GAA) Generic bootstrapping architecture," 3GPP TS 33.220 3rd Generation Partnership Project
[4] IETF RFC 2617 HTTP Authentication: Basic and Digest Access Authentication
[5] IETF RFC 2818 HTTP Over TLS
[6] IETF RFC 3310 Hypertext Transfer Protocol (HTTP) Digest Authentication Using Authentication and Key Agreement (AKA)
[7] IETF RFC 4301 Security Architecture for the Internet Protocol
[8] IETF RFC 4302 IP Authentication Header
[9] IETF RFC 4303 IP Encapsulating Security Payload (ESP)
[10] IETF RFC 4306 Internet Key Exchange (IKEv2) Protocol
[11] IETF RFC 4807 IPsec Security Policy Database Configuration MIB
[12] IETF RFC 4809 Requirements for an IPsec Certificate IETF Management Profile
[13] IETF RFC 4478 Repeated Authentication in Internet Key Exchange (IKEv2) Protocol
[14] IETF RFC 3526 More Modular Exponential (MODP) Diffie-Hellman groups for Internet Key Exchange (IKE)