WO1999062222A2 - Method for safe telephony with mobility in a tele and data communications system which includes an ip-network - Google Patents
Method for safe telephony with mobility in a tele and data communications system which includes an ip-network Download PDFInfo
- Publication number
- WO1999062222A2 WO1999062222A2 PCT/SE1999/000814 SE9900814W WO9962222A2 WO 1999062222 A2 WO1999062222 A2 WO 1999062222A2 SE 9900814 W SE9900814 W SE 9900814W WO 9962222 A2 WO9962222 A2 WO 9962222A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- network
- identity code
- unit
- mobility manager
- initiating
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 23
- 238000004891 communication Methods 0.000 title claims abstract description 14
- 230000000977 initiatory effect Effects 0.000 claims abstract description 16
- 230000005540 biological transmission Effects 0.000 claims abstract description 6
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 1
- 238000010079 rubber tapping Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0807—Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0281—Proxies
Definitions
- the present invention relates to a method for safe telephony with mobility in a tele and data communications system which includes an IP-network.
- Kerberos ⁇ A known solution of the managing of keys is called Kerberos ⁇ .
- This known solution provides a central distribution of keys and is intended for users of services in networks. Kerberos ® attends to that the user can confirm his/her identity to a given service without risk that anybody is tapping the transmission in order to in a later stage unduly borrow the user's identity.
- an authentication is performed in two steps. In the first step one issues an authentication service (AS) , a so called TGS-ticket in exchange for a person proving that he/she is the person he/she gives himself/herself out to be.
- AS authentication service
- the user identification is made by the user initially once and for all registers himself/herself manually and receives a password from Kerberos ® .
- the password is stored centrally.
- the TGS-ticket includes i.a. a TGS-session key, the name of the service (i.e. TGS), a time stamp and period of validity.
- TGS-session key the name of the service (i.e. TGS)
- TGS-session key the name of the service
- TGS-session key the name of the service
- period of validity i.e.
- the user receives the TGS-ticket encrypted by TGS password and a copy of the TGS-session key encrypted by the user's password.
- the TGS-ticket is valid as access to a ticket issuing service (TGS) .
- TGS ticket issuing service
- the user for that reason turns to TGS to get service tickets to other services.
- the user transmits the TGS-ticket encrypted by TGS password and the name of the service which is asked for to TGS.
- TGS returns a ticket to the service encrypted by the password of the service and a copy of a service session key encrypted by the TGS-session key.
- For each new service the user wants to utilise he/she in the same way turns to said TGS and encloses his/her TGS-ticket in the transmission .
- This known method has several advantages. The user need only give his/her password once per working period.
- Kerberos ® is not directly applicable on IP-telephony with mobility, such as a system with DECT-telephones which have access to an IP- network. For that reason there exists a need for a security solution for such telephony.
- the aim of the present invention consequently is to create a security solution for IP-telephony with mobility.
- Figure 1 diagrammatically shows a tele and data communications system in which an embodiment of the method is implemented
- Figure 2 diagrammatically shows a part of the system in Figure 1 in detail .
- each DECT-telephone 3 an identity code (ID-code) is stored which is created in such a way that it is unique, preferably globally unique.
- ID-code is transmitted to the base station 5 of the domain. From there the ID-code is forwarded to a mobility manager, here a so called proxy manager 9, see Figure 2, which is arranged in an IP-managing unit (IMU) 7.
- the proxy manager 9 starts for each DECT-telephone 3 a proxy 11, i.e. en proxy which represents the DECT-telephone 3 towards the Internet, or any other IP-network.
- the information is collected from a specific initiating database 13, which here is called telephone directory.
- the telephone directory is reached via the IP-network 15.
- Kerberos ® is utilised, and which i.a. is implemented on a server 17, which handles the central distribution of keys.
- the information includes IP-address, the subscriber's user name, and a key for mobile IP.
- the proxy manager 9 is user and the telephone directory 13 the service which shall be used.
- the proxy manager 9 For the proxy manager 9 to receive the information, it consequently must authenticate itself to the AS-part of the server 17 to get a TGS-ticket, and then utilises the identity code as user identity, and then by transmitting the TGS-ticket to the TGS-part of the server 17 receive a service ticket to the telephone directory.
- the information is transmitted well encrypted from the telephone directory 13 to the proxy manager 9, as has been described above.
- the proxy manager 9 then starts a proxy 11 with the information as input data.
- the proxy 11 now has the function of a mobile node. If it should be in a foreign network it will make use of a mobile IP to attend to that traffic which is intended for it is routed to right address.
- This authentication is made by means of an encryption algorithm and a secret key which is shared by the mobile node, i.e. the proxy 11, and the mobility manager in its home network.
- the secret key is the above mentioned key for mobile IP which the proxy manager 9 receivers from the database 13.
- the proxy 11 is preferably compatible with the ITU- standard H.323, which can be utilised according to the following.
- the receiver collects a session key from Kerberos ® and establishes a safe and authenticated channel. After that H.323 follows on.
- the speech is accordingly transmitted encrypted in order that it shall not be possible to tap.
- participants, which are not authorised subscribers in the system are prevented, by the authentication, from making free calls.
- Kerberos ® can be exchanged for another equivalent method which implies equivalent good authentication and encryption.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
Abstract
Description
Claims
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP99929982A EP1082837A2 (en) | 1998-05-27 | 1999-05-12 | Method for safe telephony with mobility in a tele and data communications system which includes an ip-network |
EEP200000701A EE03893B1 (en) | 1998-05-27 | 1999-05-12 | A secure mobile communication method for use in an IP network communication and data communication system |
NO20005868A NO20005868L (en) | 1998-05-27 | 2000-11-21 | Procedure for secure telephony in a telecommunications and data communication system |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
SE9801871-6 | 1998-05-27 | ||
SE9801871A SE512440C2 (en) | 1998-05-27 | 1998-05-27 | Method for secure telephony with mobility in a telephone and data communication system comprising an IP network |
Publications (2)
Publication Number | Publication Date |
---|---|
WO1999062222A2 true WO1999062222A2 (en) | 1999-12-02 |
WO1999062222A3 WO1999062222A3 (en) | 2000-02-03 |
Family
ID=20411477
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/SE1999/000814 WO1999062222A2 (en) | 1998-05-27 | 1999-05-12 | Method for safe telephony with mobility in a tele and data communications system which includes an ip-network |
Country Status (5)
Country | Link |
---|---|
EP (1) | EP1082837A2 (en) |
EE (1) | EE03893B1 (en) |
NO (1) | NO20005868L (en) |
SE (1) | SE512440C2 (en) |
WO (1) | WO1999062222A2 (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2807597A1 (en) * | 2000-04-11 | 2001-10-12 | Sagem | Digital cordless communication network mobility having handset entering second base area detected/requesting registration with location sent and server requesting position confirmation/base state re initialisation request. |
WO2005083972A1 (en) | 2004-03-01 | 2005-09-09 | Jobbagy Miklos | Set of equipment for secure direct information transfer over the internet |
CN1322702C (en) * | 2003-12-30 | 2007-06-20 | 华为技术有限公司 | Identificaton method of internet protocol speech sound cut-in equipment |
CN100349400C (en) * | 2004-02-11 | 2007-11-14 | 任荣昌 | Multiple service exchange method and system based on IP network user identification |
US8365258B2 (en) | 2006-11-16 | 2013-01-29 | Phonefactor, Inc. | Multi factor authentication |
US9762576B2 (en) | 2006-11-16 | 2017-09-12 | Phonefactor, Inc. | Enhanced multi factor authentication |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5535276A (en) * | 1994-11-09 | 1996-07-09 | Bell Atlantic Network Services, Inc. | Yaksha, an improved system and method for securing communications using split private key asymmetric cryptography |
US5602918A (en) * | 1995-12-22 | 1997-02-11 | Virtual Open Network Environment Corp. | Application level security system and method |
GB2317539B (en) * | 1996-09-18 | 2001-03-28 | Secure Computing Corp | Generalized security policy management system and method |
US5684950A (en) * | 1996-09-23 | 1997-11-04 | Lockheed Martin Corporation | Method and system for authenticating users to multiple computer servers via a single sign-on |
-
1998
- 1998-05-27 SE SE9801871A patent/SE512440C2/en not_active IP Right Cessation
-
1999
- 1999-05-12 WO PCT/SE1999/000814 patent/WO1999062222A2/en active Application Filing
- 1999-05-12 EP EP99929982A patent/EP1082837A2/en not_active Withdrawn
- 1999-05-12 EE EEP200000701A patent/EE03893B1/en not_active IP Right Cessation
-
2000
- 2000-11-21 NO NO20005868A patent/NO20005868L/en not_active Application Discontinuation
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2807597A1 (en) * | 2000-04-11 | 2001-10-12 | Sagem | Digital cordless communication network mobility having handset entering second base area detected/requesting registration with location sent and server requesting position confirmation/base state re initialisation request. |
CN1322702C (en) * | 2003-12-30 | 2007-06-20 | 华为技术有限公司 | Identificaton method of internet protocol speech sound cut-in equipment |
CN100349400C (en) * | 2004-02-11 | 2007-11-14 | 任荣昌 | Multiple service exchange method and system based on IP network user identification |
WO2005083972A1 (en) | 2004-03-01 | 2005-09-09 | Jobbagy Miklos | Set of equipment for secure direct information transfer over the internet |
US8208638B2 (en) | 2004-03-01 | 2012-06-26 | Jobbagy Miklos | Set of equipment for secure direct information transfer over the internet |
US8365258B2 (en) | 2006-11-16 | 2013-01-29 | Phonefactor, Inc. | Multi factor authentication |
US9762576B2 (en) | 2006-11-16 | 2017-09-12 | Phonefactor, Inc. | Enhanced multi factor authentication |
US10122715B2 (en) | 2006-11-16 | 2018-11-06 | Microsoft Technology Licensing, Llc | Enhanced multi factor authentication |
Also Published As
Publication number | Publication date |
---|---|
SE9801871L (en) | 1999-11-28 |
SE9801871D0 (en) | 1998-05-27 |
EE200000701A (en) | 2002-04-15 |
NO20005868D0 (en) | 2000-11-21 |
NO20005868L (en) | 2001-01-25 |
WO1999062222A3 (en) | 2000-02-03 |
SE512440C2 (en) | 2000-03-20 |
EP1082837A2 (en) | 2001-03-14 |
EE03893B1 (en) | 2002-10-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7882543B2 (en) | Systems and methods for added authentication in distributed network delivered half-duplex communications | |
US6334056B1 (en) | Secure gateway processing for handheld device markup language (HDML) | |
Hwang et al. | A self-encryption mechanism for authentication of roaming and teleconference services | |
US6145084A (en) | Adaptive communication system enabling dissimilar devices to exchange information over a network | |
US7865173B2 (en) | Method and arrangement for authentication procedures in a communication network | |
CN1839608B (en) | Device and method for generating a unique user's identity for use between different domains | |
US7197297B2 (en) | Authentication method for enabling a user of a mobile station to access to private data or services | |
US7340525B1 (en) | Method and apparatus for single sign-on in a wireless environment | |
CN100435508C (en) | Method and equipment for safety Internetwork protocol communication in call processing system | |
JP2000232690A (en) | Method for security for communication network and method for data transfer with security | |
WO2001054346A1 (en) | Method for issuing an electronic identity | |
WO2001050682A1 (en) | Communication using virtual telephone numbers | |
CN112565294A (en) | Identity authentication method based on block chain electronic signature | |
WO1999062222A2 (en) | Method for safe telephony with mobility in a tele and data communications system which includes an ip-network | |
JP2005020310A (en) | Information management system | |
MXPA01013117A (en) | System and method for local policy enforcement for internet service providers. | |
US20050190904A1 (en) | Method for performing network-based telephone user identification | |
US6961851B2 (en) | Method and apparatus for providing communications security using a remote server | |
US11146536B2 (en) | Method and a system for managing user identities for use during communication between two web browsers | |
US7139377B2 (en) | Method of providing services to remote private terminals and an associated device | |
JPH0759154A (en) | Inter-network authentication key generating method | |
KR100637996B1 (en) | Dial Authentication Provision System | |
WO1999037055A1 (en) | System and method for providing secure remote access to a computer network | |
US20040250067A1 (en) | Method and device for securing communications in a computer network | |
KR20000054658A (en) | Method for application SSMS |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A2 Designated state(s): EE JP LT LV NO US |
|
AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
AK | Designated states |
Kind code of ref document: A3 Designated state(s): EE JP LT LV NO US |
|
AL | Designated countries for regional patents |
Kind code of ref document: A3 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE |
|
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
WWE | Wipo information: entry into national phase |
Ref document number: 1999929982 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 1999929982 Country of ref document: EP |