TW201225697A - Identity management on a wireless device - Google Patents
Identity management on a wireless device Download PDFInfo
- Publication number
- TW201225697A TW201225697A TW100133738A TW100133738A TW201225697A TW 201225697 A TW201225697 A TW 201225697A TW 100133738 A TW100133738 A TW 100133738A TW 100133738 A TW100133738 A TW 100133738A TW 201225697 A TW201225697 A TW 201225697A
- Authority
- TW
- Taiwan
- Prior art keywords
- local
- authentication
- key
- network
- wireless device
- Prior art date
Links
- 238000000034 method Methods 0.000 claims description 76
- 238000009795 derivation Methods 0.000 claims description 14
- 238000012790 confirmation Methods 0.000 claims description 2
- 238000004891 communication Methods 0.000 description 66
- 230000006870 function Effects 0.000 description 40
- 230000004044 response Effects 0.000 description 24
- 230000008569 process Effects 0.000 description 19
- 238000005516 engineering process Methods 0.000 description 15
- 238000012795 verification Methods 0.000 description 9
- 230000007774 longterm Effects 0.000 description 7
- 239000003795 chemical substances by application Substances 0.000 description 6
- 238000010586 diagram Methods 0.000 description 6
- 238000004364 calculation method Methods 0.000 description 5
- 238000012217 deletion Methods 0.000 description 5
- 230000037430 deletion Effects 0.000 description 5
- 238000003860 storage Methods 0.000 description 5
- 239000011701 zinc Substances 0.000 description 5
- 238000013475 authorization Methods 0.000 description 3
- VJBCNMFKFZIXHC-UHFFFAOYSA-N azanium;2-(4-methyl-5-oxo-4-propan-2-yl-1h-imidazol-2-yl)quinoline-3-carboxylate Chemical compound N.N1C(=O)C(C(C)C)(C)N=C1C1=NC2=CC=CC=C2C=C1C(O)=O VJBCNMFKFZIXHC-UHFFFAOYSA-N 0.000 description 3
- 239000000463 material Substances 0.000 description 3
- 230000007246 mechanism Effects 0.000 description 3
- 230000002093 peripheral effect Effects 0.000 description 3
- 238000004846 x-ray emission Methods 0.000 description 3
- 102100022887 GTP-binding nuclear protein Ran Human genes 0.000 description 2
- 208000021236 Hereditary diffuse leukoencephalopathy with axonal spheroids and pigmented glia Diseases 0.000 description 2
- 101150069124 RAN1 gene Proteins 0.000 description 2
- 241000700159 Rattus Species 0.000 description 2
- 230000009471 action Effects 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 2
- 238000004422 calculation algorithm Methods 0.000 description 2
- 208000036969 diffuse hereditary with spheroids 1 leukoencephalopathy Diseases 0.000 description 2
- 238000002955 isolation Methods 0.000 description 2
- 210000004185 liver Anatomy 0.000 description 2
- 238000004519 manufacturing process Methods 0.000 description 2
- 238000013507 mapping Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- QELJHCBNGDEXLD-UHFFFAOYSA-N nickel zinc Chemical compound [Ni].[Zn] QELJHCBNGDEXLD-UHFFFAOYSA-N 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 238000012216 screening Methods 0.000 description 2
- 102100024768 ATP-dependent RNA helicase DDX50 Human genes 0.000 description 1
- 101710156103 ATP-dependent RNA helicase DDX50 Proteins 0.000 description 1
- 241000760358 Enodes Species 0.000 description 1
- HBBGRARXTFLTSG-UHFFFAOYSA-N Lithium ion Chemical compound [Li+] HBBGRARXTFLTSG-UHFFFAOYSA-N 0.000 description 1
- 229910005580 NiCd Inorganic materials 0.000 description 1
- 229910052770 Uranium Inorganic materials 0.000 description 1
- 239000008186 active pharmaceutical agent Substances 0.000 description 1
- 238000004873 anchoring Methods 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 229910052793 cadmium Inorganic materials 0.000 description 1
- BDOSMKKIYDKNTQ-UHFFFAOYSA-N cadmium atom Chemical compound [Cd] BDOSMKKIYDKNTQ-UHFFFAOYSA-N 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000001010 compromised effect Effects 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000009826 distribution Methods 0.000 description 1
- 235000013601 eggs Nutrition 0.000 description 1
- 238000005242 forging Methods 0.000 description 1
- 239000000446 fuel Substances 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 229910001416 lithium ion Inorganic materials 0.000 description 1
- 238000005259 measurement Methods 0.000 description 1
- 229910052987 metal hydride Inorganic materials 0.000 description 1
- 239000008267 milk Substances 0.000 description 1
- 235000013336 milk Nutrition 0.000 description 1
- 210000004080 milk Anatomy 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 229910052759 nickel Inorganic materials 0.000 description 1
- PXHVJJICTQNCMI-UHFFFAOYSA-N nickel Substances [Ni] PXHVJJICTQNCMI-UHFFFAOYSA-N 0.000 description 1
- -1 nickel metal hydride Chemical class 0.000 description 1
- 235000012149 noodles Nutrition 0.000 description 1
- 239000002957 persistent organic pollutant Substances 0.000 description 1
- 239000006187 pill Substances 0.000 description 1
- 230000009467 reduction Effects 0.000 description 1
- 239000004576 sand Substances 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 230000001568 sexual effect Effects 0.000 description 1
- 230000002269 spontaneous effect Effects 0.000 description 1
- 230000000153 supplemental effect Effects 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
Description
201225697 六、發明說明: 【發明所屬之技術領域】 [0001] 本申請請求2010年9月20曰申請的美國臨時專利申請 1.61增3,729和2_年12月3()日巾請的美國臨時專利 申請No. 61/428, 388的權益,所述申請的内容在這裏全 文引入作為參考。 [先前技術] _聰網路用戶常常擁有多個用戶名和密碼(㈣存取多個 〇 、網站的舒鑑別)。例如’網際網路用戶可擁有用於存取 社交網路網站(例如Faceb〇〇k)的一個用戶名/密瑪組 合’以及用於存取電子郵件網站(例如Gmaii)的另一個 用戶名/密碼組合。雖然多個用戶名/密碼組合可實現用 戶鑑別,但是網際網路用戶會發現記住每個用戶名/密碼 組合很麻煩。例如’網際網路用戶會忘記他們的一個網 站的用戶名/密碼組合,且結果不能存取該網站。 為了使網際網路用戶的用戶鑑別沒那麼麻煩,已經提出 〇 了單點登錄方法,例如GPenId。然而,作為網頁服務的 單點登錄(SS0)在實現時存在若干缺點。例如,用戶可 月&沒有至基於網頁的SS0提供方的安全通道。此外,用戶 可能對SS0提供方的控制有限。 而且,SS0中的鑑別會經由空中介面通信產生,這會由於 增長的訊務而產生網路實體(例如,〇penID提供方(0p )和/或NAF )和/或網路本身上的負載。此外,MN〇可能 必須承受該額外訊務的花費。 【發明内容】 10013373#單編號 A0101 第3頁/共頁 1013091673-0 201225697 [0003]本部分被提供以以簡單形式介紹各種概念,並將在以下 的具體實施方式中進一步描述。 這裏描述了系統、方法和裴置的實施方式,以用於在無 線設備處的本祕财提供與服務提供方彳目關聯的會話 密錄。如這裏所述’可接收到從無線設備與網路實體之 間的網路鑑別中取得的臨時密輪。基於所述臨時密錄, 可取得與服務提供方相_的會話料。所述I話穷錄 可與網路實體Μ,並以配置祕在㈣設備處執行 的本地鑑财。會話密鍮可射相於無線設備處的本地 鑑別中。 這長逛描述了用於執行無線設備處的本地鏗別的系統、 方法和裝置的實施方式。如這裏所述,可從服務提供^ 中接收到關聯控制瑪(handle),其指示服務提供方 經執行與網路實體的關聯。可接收到與無線設備的用戶 相關聯的鑑別資訊。鐘別資訊可在無線設備處進行本糾 驗證,以及可基於關聯控制碼和與服務提供方關聯㈣ 話密錄生成簽名密錄。會話密矯可從網路實體與無㈣ 備之間的網隸別中導出(derive),並被配置用於: 行無線設備處的本地鑑別。可使用簽名密输來簽署身我 (identity)㈣,以指示無線設傷已經本地驗證了 述鐘別資訊。 本部分提供用於以簡單形式介紹這些概念的選擇,其米 在以下的具體實施方式中進一步描述。本部分不意欲讀 別要求的主題的關鍵特徵或必要特徵,也不意欲用㈣ 制要求的主題的範圍。此外,要求的主題不限制在鮮 1013091673-0 豸公開内容任何部分中提出的任何或所有缺點的局㈣ 10013373#單編號A0101 第4頁/共100頁 201225697 中。 [實施方式】 [_在下文中提到時’術語“無線發射/接收單元(wtru),, 可包括但是不限制為,用戶設備(ϋΕ)、移動站、固定 或移動用戶單元、傳呼器、行動電話、個人數位助理( PDA)、電腦、機對機(Μ2Μ)設備、感測器,毫微微社 區、接入點’或可在無線環境中操作的任何其他類型的 設備。在下文中提到時,術語“節點Β”可包括但是不限 〇 S i站站點控制器、接入點(Αρ )、毫微微社區 ’或可在無線環境中操作的任何其他類型的介面裝置。 這裏描述的是本地或分散式的在WTRU上實現的移動 0penID提供方、智慧卡、H(e)NB和/或其他類型設備。 雖然运裏的實施方式可在〇penID協定的上下文中描述, 但所述實施方式可擴展到其他單點登錄(ss〇)協定和/ 或聯合身份協定。類似地,就像〇penID實體可在這裏描 述一樣,OpenlD實體可擴展到執行相同或類似功能的其 ^ 他實體。例如,可由信賴方(Rp)執行的這裏描述的功 能可由任何服務提供方執行。 本地移動sso協定,例如本地移動0penID,可允許位於 本地的模組或實體執行身份鑑別/聲明功能,所述功能作 為SS0和/或身份管理協定(例如〇peniD協定)的部分。 位於本地的模組可以是智慧卡、USIM、UICC、Java卡、 智能卡網頁伺服器(SCWS)使能的智能卡,或其他值得 信任的實體。 本地移動%0是一個術語’用於共同指示各種實施,由此 可由基於網頁的SS0伺服器執行的單點登錄(ss〇)和/或 10013373产單編號 A0101 第 5 頁 / 共 100 頁 1013091673-0 201225697 相關身份管理功能的部分或全部由為通信設備本身的一 部分或全部的基於本地的實體和/或模組替代或執行,或 其中這種實體/模組在物理上和/或邏輯上位於(例如, 位於本地)通信設備和/或其用戶的附近。例如’實體或 模組可嵌入到設備中、附著在設備上、和/或由本地介面 、接線和/或短距無線裝置連接到設備。 本地OpenlD還可以用作一個術語’用於指示本地移動 SS0實施的子集’由此SS0和/或身份管理的實施巧*基於 Open ID協定。例如,本地〇PenII)可用於指示可由位於本 地的實體或模組執行的0PenIi)身份提供方(或0penID IdP)的功能。 本地0P是一個術語’用於指示執行設備上本地的〇PenID 伺服器的功能的實體或模組。縮寫詞OPloc可用於表示本 地0P。本地〇P的實施之一可以通過關於用戶和/或設備的 身份聲明來促進用戶和/或設備的鑑別。所述聲明4從本 地0P被發送到在設備上運行的流覽器中或流覽器代理( BA),然後其將所述聲明轉發到外部信賴方(狀)°在 由本地0P提供的功能主要被限制為提供所述身份聲明時 ,本地0P可被稱作本地聲明提供方(LAP)。 本地0P可處理、生成、管理身份聲明消息和/或向一個或 多個外部接收方發送身份聲明消息。所述身份聲明消息 可聲明與用戶和/或設備相關的一個或多個識別字的驗證 狀態。例如,在OpenlD協定中,被叫做信賴方(RP)的 第三方實體可以是身份聲明消息的接收方之一。本地op 也可以使用簽名、加密密鑰、密碼學等等來簽署身份聲 明 >肖息® 1001337#單編號 A〇101 第6頁/共1〇〇頁 1013091673-0 201225697 本地OpenlD方法可使用一個或多個加密密鑰,例如根會 話密鑰。所述根會話密餘可用Krp表示’並且可以是用在 RP和0P之間的會話密鑰°所述會話密鑰也可以是201225697 VI. Description of the Invention: [Technical Field of the Invention] [0001] The present application claims US Provisional Patent Application No. 1.61 of September 20, 2010, and 3,729, and December 3, Application No. 61/428,388, the disclosure of which is incorporated herein in its entirety by reference in its entirety. [Prior Art] _ Cong network users often have multiple usernames and passwords ((4) access to multiple 〇, website authentication). For example, 'Internet users can have a username/Mirma combination' for accessing social networking sites (such as Faceb〇〇k) and another username for accessing email sites (such as Gmaii) / Password combination. While multiple username/password combinations enable user authentication, Internet users find it cumbersome to remember each username/password combination. For example, 'Internet users forget the username/password combination of one of their websites and the result is that they cannot access the website. In order to make the user identification of Internet users less troublesome, a single sign-on method such as GPenId has been proposed. However, single sign-on (SS0) as a web service has several drawbacks when implemented. For example, the user can have a secure channel to the web-based SS0 provider. In addition, users may have limited control over the SS0 provider. Moreover, authentication in SS0 is generated via empty inter-media communication, which can result in network entities (e.g., 〇penID provider (0p) and/or NAF) and/or load on the network itself due to increased traffic. In addition, MN〇 may have to bear the cost of this additional service. SUMMARY OF THE INVENTION 10013373#Single Number A0101 Page 3/Total Page 1013091673-0 201225697 [0003] This section is provided to introduce various concepts in a simplified form and are further described in the Detailed Description. Embodiments of systems, methods, and devices are described herein for use in the secrets at the wireless device to provide a session secret associated with the service provider. A temporary sticky wheel obtained from network authentication between the wireless device and the network entity can be received as described herein. Based on the temporary secret record, a conversation material with the service provider can be obtained. The I-record can be associated with the network entity and configured to perform local authentication at the (4) device. The session key can be shot in the local authentication at the wireless device. This walk-through describes an embodiment of a system, method and apparatus for performing local screening at a wireless device. As described herein, an associated control handle can be received from the service provider, which instructs the service provider to perform an association with the network entity. Authentication information associated with the user of the wireless device can be received. The clock information can be verified at the wireless device, and the signature can be generated based on the associated control code and associated with the service provider (4). The session secret can be derived from the network component between the network entity and the non-synchronous device and configured for: local authentication at the line wireless device. You can use the signature key to sign the identity (4) to indicate that the wireless damage has been verified locally. This section provides an alternative for introducing these concepts in a simplified form, which is further described in the following detailed description. This section is not intended to read key features or essential features of the claimed subject matter, nor is it intended to use the scope of the claimed subject matter. In addition, the subject matter of the request is not limited to any of the shortcomings in any part of the public content (4) 10013373# single number A0101 page 4 / total 100 pages 201225697. [Embodiment] [_When referred to hereinafter, the term "wireless transmitting/receiving unit (wtru)" may include, but is not limited to, user equipment (ϋΕ), mobile station, fixed or mobile subscriber unit, pager, action Telephone, personal digital assistant (PDA), computer, machine-to-machine (device), sensor, femto community, access point' or any other type of device that can operate in a wireless environment. The term "node" may include, but is not limited to, a site controller, an access point (Αρ), a femto community, or any other type of interface device that may operate in a wireless environment. Local or decentralized mobile 0penID provider, smart card, H(e)NB, and/or other type of device implemented on the WTRU. Although the implementation may be described in the context of a 〇penID agreement, the implementation The way can be extended to other single sign-on (ss) protocols and/or federated identity agreements. Similarly, as the 〇penID entity can be described here, OpenlD entities can be extended to perform the same or similar functions. For example, the functions described herein that can be performed by a relying party (Rp) can be performed by any service provider. Local mobile sso protocols, such as local mobile 0penIDs, can allow local modules or entities to perform identity authentication/declaration. Function, which is part of the SSO and/or identity management protocol (eg 〇peniD protocol). The local modules can be smart cards, USIM, UICC, Java cards, smart card web server (SCWS) enabled smart cards. , or other trustworthy entity. Local Move %0 is a term 'used to collectively indicate various implementations, whereby single sign-on (ss〇) and/or 10013373 order number A0101 can be performed by a web-based SS0 server. 5 pages / total 100 pages 1091091673-0 201225697 Part or all of the associated identity management functions are replaced or performed by local-based entities and/or modules that are part or all of the communication device itself, or where such entities/modules are Physically and/or logically located (eg, located locally) in the vicinity of the communication device and/or its users. For example, 'entity or mode Can be embedded in the device, attached to the device, and/or connected to the device by a local interface, wiring, and/or short-range wireless device. Local OpenlD can also be used as a term 'used to indicate a subset of local mobile SS0 implementations' Thus the implementation of SSO and/or identity management is based on the Open ID protocol. For example, local 〇PenII can be used to indicate the functionality of the TOPIi) Provider (or 0penID IdP) that can be executed by a local entity or module. 0P is a term 'an entity or module that is used to indicate the function of a local 〇PenID server on the device. The abbreviation OPloc can be used to represent local 0P. One of the implementations of the local device P can facilitate the authentication of the user and/or device by means of an identity statement with respect to the user and/or device. The statement 4 is sent from the local 0P to the browser running on the device or to the browser agent (BA), which then forwards the statement to the external relying party (in the form) ° in the function provided by the local 0P Mainly limited to providing the identity claim, the local 0P may be referred to as a local claims provider (LAP). The local OP can process, generate, manage, and/or send an identity claim message to one or more external recipients. The identity claim message may declare the verification status of one or more identifiers associated with the user and/or device. For example, in the OpenlD protocol, a third party entity called a relying party (RP) can be one of the recipients of an identity claim message. The local op can also use the signature, encryption key, cryptography, etc. to sign the identity statement > Xiao Xi® 1001337#单号A〇101 Page 6 of 1 Page 1013091673-0 201225697 The local OpenlD method can use one Or multiple encryption keys, such as a root session key. The root session secret may be represented by Krp' and may be a session key used between the RP and the OP. The session key may also be
Kext/int)_NAF或例如存儲在智慧卡中另一密鑰。會 話密錄(例如,Krp)也可以充當RP和0P之間(從中可以Kext/int)_NAF or another key stored, for example, in a smart card. The session secret (for example, Krp) can also act as between RP and 0P (from which you can
導出其他密鍮)的會話密输。會話密錄可以從網路和無線 設備(例如,本地0P)之間的關聯中導出。本地OpenlD 也可以使用聲明密鑰或簽名密鑰,其可被表示為Kasc。 簽名密錄(例如,Kasc)可用於簽署(sign)用於鑑別 〇 用戶和/或設備的一個或多個身份聲明消息。簽名密鑰( 例如,Kasc)可從會話密錄(例如’ Krp)中導出。 本地〇penID方法還可以使用叫做OpenlD伺服器功能( 0PSF)的服務’其任務是生成、共用和/或分發本地和 /或信賴方(RP)可以使用的機密(secret) ° 0PSF和 本地0P可由作為單獨實體的外部伙觀測到。0PSF還能夠 驗證由本地OpenlD發佈的簽名,以及可以例如經由公共 網際網路由RP直接獲得°設備上的流覽器可通過修改設 〇 備上解析快取的本地DNS而被重定向到本地0.P,從而 0PSF的位址映射到本地。 本地OpenlD方法還可以使用由ΟΡ-agg表示的服務’其任 務是代表RP促進本地0P的發現。 SS0協定,例如OpenlD,可與通用引導程式結構(GBA) 整合。GBA是用於從接入層密鑰引導(bootstrap)應用 層密鑰的一種方式。整合OpenlD和GBA的方法可包括分 開的供應階段和/或鑑別階段。在供應階段可以為以後的 鑑別提供某些證書。在所述鑑別階段可以將先前提供的 10013373#單編號 A〇1〇l 第 7 頁 / 共 100 頁 1013091673-0 201225697 證書用於用戶身份的本地聲明。 本地鐘別,例如至本地0penID提供方(〇p)的本地鑑別 ’可減少網路上的空中訊務。可例如在網路和無線設備 之間的鐘別過程之後執行所述本地鑑別。本地〇p可與無 線設備(例如智慧卡網頁伺服器(scws))上的本地網 頁伺服器相關聯。例如,本地OP可包括本地網頁伺服器 ’或本地網頁飼服器可被包括在本地〇 P中或在本地〇 p上 建立。如這裏所述’鑑別訊務可以是本地的,且可以不 給網路本身造成負擔。可在網路實體(例如,〇peniD伺 服器功能(0PSF))和用於用戶訪問的每個rp的本地〇p 之間建立共用的機密或會話密鑰。所述共用的機密或會 話密輪可從在網路實體和無線設備之間執行的鑑別中被 建立’其中本地0P與所述無線設備相關聯。這裏公開了 建立所述機密的若干示例性機制。如果RP使用關聯,它 們可存儲用於簽名驗證的機密或會話密鑰,並且可以在 用戶下次訪問它們的時候將其重新使用。然而,如果信 賴方(RP)使用無狀態模式,則RP不能保存機密或會話 密鑰。仍然在該無狀態情況中,OP可生成機密,並可與 0PSF將其安全地共用。本地〇P可存儲該機密或會話密鑰 ,並在用戶下次訪問RP的時候將其重新使用。此外, 0PSF可存儲所述機密或會話密鑰,從而0psF可將其直接 使用來進行簽名驗證(例如在無狀態模式中)。通過存 儲和/或重新使用機密或會話密鑰’這裏描述的實施方式 可減少網路訊務。 在示例性實施方式中,本地驗證可面向本地0P被執行。 本地OP可與例如智能卡網頁伺服器(SCWS)相關聯。共 ,單編號細1 第8頁/共100頁 1013091673-0 10013373» 201225697 用的機密或會話密鑰可在網路0PSF實體和用於與用戶訪 問相關聯的信賴方(RP)的本地0P之間被建立。例如, 共用的機密或會話密錄可基於網路和無線設備和/或本地 0P之間的鑑別而被建立。根據一個實施方式,共用的機 密或會話密鑰可從網路鑑別密鑰中導出,所述網路鑑別 密鑰是從網路和無線設備和/或本地0P之間的鑑別中生成 的《共用的機密或會話密鑰可由本地0P存儲。然後可重 新使用共用的機密或共用密鑰(例如用於隨後網路實體的 鑑別)。 在一個示例性實施方式中,在執行面向本地0P的本地鑑 別時,可最小化網路訊務。用戶提供的識別字可被發送 到信賴方(RP)。可從RP中接收到重定向,其包括請求 參數中的關聯控制碼。可發送對本地0P的鑑別的本地請 求。本地0P的鑑別可以發生◊可從本地0P中接收到重定 向,其包括關聯控制碼和簽署的參數》 在一個示例性實施方式中,可使用網域名稱系統(DNS) ,, 查找(lookup)。例如,DNS查找可用於繞過SS0協定中Export other passwords for session encryption. Session secrets can be derived from associations between the network and wireless devices (for example, local 0Ps). The local OpenlD can also use a claim key or a signing key, which can be represented as Kasc. A signature secret (e.g., Kasc) can be used to sign one or more identity claim messages for authenticating the user and/or device. The signing key (e.g., Kasc) can be derived from a session secret (e.g., 'Krp). The local 〇penID method can also use a service called OpenlD Server Function (OPSF) whose task is to generate, share, and/or distribute the secrets available to the local and/or relying party (RP) ° 0PSF and local 0P can be Observed as an outside gang of separate entities. The 0PSF is also capable of verifying the signatures issued by the local OpenlD, and can be directly obtained, for example, via the public Internet routing RP. The browser on the device can be redirected to the local 0 by modifying the local DNS of the parsing cache on the device. P, so the address of 0PSF is mapped to the local. The local OpenlD method can also use the service represented by ΟΡ-agg' whose task is to facilitate the discovery of local POPs on behalf of the RP. The SS0 protocol, such as OpenlD, can be integrated with the Common Bootstrap Architecture (GBA). GBA is a way to bootstrap application layer keys from the access layer key. The method of integrating OpenlD and GBA may include separate supply phases and/or authentication phases. Certain certificates can be provided for future authentication during the supply phase. The previously provided 10013373# single number A〇1〇l page 7 / 100 page 1013091673-0 201225697 certificate can be used for local declaration of user identity during the authentication phase. Local clocks, such as local authentication to the local 0penID provider (〇p), can reduce air traffic on the network. The local authentication can be performed, for example, after a clocking process between the network and the wireless device. Local 〇p can be associated with a local web server on a wireless device such as a smart card web server (scws). For example, the local OP may include a local web server' or a local web server may be included in the local 〇P or established on the local 〇p. As described herein, the authentication service can be local and can not burden the network itself. A shared secret or session key can be established between a network entity (e.g., 〇peniD server function (0PSF)) and a local 〇p for each rp accessed by the user. The shared secret or session secret wheel may be established from an authentication performed between the network entity and the wireless device' wherein the local OP is associated with the wireless device. Several exemplary mechanisms for establishing such a secret are disclosed herein. If the RP uses associations, they can store secret or session keys for signature verification and can reuse them the next time they access them. However, if the relying party (RP) uses stateless mode, the RP cannot save the secret or session key. Still in this stateless situation, the OP can generate a secret and can safely share it with the 0PSF. Local 〇P can store the secret or session key and reuse it the next time the user accesses the RP. In addition, the 0PSF can store the secret or session key so that 0psF can be used directly for signature verification (e.g., in stateless mode). Network traffic can be reduced by storing and/or reusing confidential or session keys' embodiments described herein. In an exemplary embodiment, local verification may be performed for local 0P. The local OP can be associated with, for example, a smart card web server (SCWS). Total, single number fine 1 Page 8 / Total 100 pages 1013091673-0 10013373» 201225697 The secret or session key used can be used in the network 0PSF entity and the local 0P for the relying party (RP) associated with user access. The room was built. For example, a shared secret or session secret can be established based on authentication between the network and the wireless device and/or local 0P. According to one embodiment, the shared secret or session key may be derived from a network authentication key that is generated from the authentication between the network and the wireless device and/or local OP. The secret or session key can be stored by the local 0P. The shared secret or common key can then be reused (for example for subsequent authentication of the network entity). In an exemplary embodiment, network traffic may be minimized when performing local authentication for local 0P. The user-provided identification word can be sent to the relying party (RP). A redirect can be received from the RP that includes the associated control code in the request parameters. Local requests for authentication of local 0Ps can be sent. The local 0P authentication may occur, the redirection may be received from the local OP, including the associated control code and the signed parameters. In an exemplary embodiment, the Domain Name System (DNS), may be used, lookup . For example, DNS lookups can be used to bypass the SS0 protocol.
J 的引導程式功能(BSF)用戶端。DNS查找可用於發現本J's Bootstrap Function (BSF) client. DNS lookup can be used to discover this
地0penID提供方(0P)。此外,MS查找可用於繞過GBA 模組。 在一個示例性實施方式中,可執行用於SS0協定的密鑰與 GBA導出的密鑰的綁定。例如,會話密鑰(例如,Krp) 和簽名密鑰(例如,Kasc)可被導出,和/或用於本地移 動OpenID協定,並且可通過密碼關聯綁定到GBA導出的 臨時密輪(例如,Ks_int_NAF)。會話密鑰(例如,Ground 0penID provider (0P). In addition, MS lookups can be used to bypass GBA modules. In an exemplary embodiment, the binding of the key for the SSO agreement to the GBA derived key may be performed. For example, a session key (eg, Krp) and a signing key (eg, Kasc) can be exported, and/or used to locally move the OpenID protocol, and can be bound to a GBA-derived temporary pad by a cryptographic association (eg, Ks_int_NAF). Session key (for example,
Krp)可與信賴方(RP)相關聯,通過所述RP可導出簽名 10_7#單编號A〇101 帛9頁/共⑽頁 1013091673-0 201225697 密鑰(例如’Kasc)。簽名密鎗(例如,Kasc) J用於 簽署用於用戶鑑別的身份聲明消息。臨時密输( Ks_int_NAF)可以是從用於應用的UICC内的GBA-U (以 UICC為中心的GBA過程,例如在3GPP TS 33.220中所福 述的)中導出的密鑰。 在一個示例性實施方式中,獨立的安全通道可被建立和/ 或在RP和用戶設備(UE)之間使用而作為5別協疋(例如 OpenlD協定)的部分。例如,這町以被完成用於建立RP 和獨立於0P的UE之間的獨立安全通信通道。14可允許〇P 和用戶/RP對之間的安全性分開,jt且可提供用於限制對 0P的安全性違背造成的損害的手段。 在一個示例性實施方式中,SS0協定可與鑑別和密餘協議 整合。例如,OpenlD可與鑑別和密錄協議(AKA)結合 (例如36??15 33.102中描述的八1(人)。 在這裏的實施方式中描述了使用與無線設備相關聯的本 地OpenlD提供方(0P)的鑑別。例如,本地⑽可駐留在 無線設備中’附著在無線設備上,和/或通過本地介面、 配線和/或短程無線裝置連接到無線設備。根據一個實施 方式,本地0P可與無線設備上的本地網頁伺服器相關聯 ,例如智能卡網頁伺服器(SCWS)。本地〇P可包括本地 網貢伺服器。可替換地或另外,本地網頁伺服器可在本 地0P上端建立’或本地0P可位於本地網頁伺服器上。 這裏描述的實施方式可實現網路通信,所述網路通信可 使用本地通信、通過空中通信和/或固定線路通信來執行 。在實現本地通信時,移動網路操作者(ΜΝ0) /空中網 路上有很少或沒有負載,其他(固定線路,或非ΜΝ0)網 10013373 #單編號 A0101 第10頁/共100頁 1013091673 201225697 Ο 路上沒有訊務,和/或無線設備内會發生通信。空中通信 可在ΜΝ0/空中網路上執行而作為資料訊務(例如,HTTP 和/或基於IP的通信),並且可代表MN0/空中網路上的負 載。使用空中通信,訊務不會減少為零,因為用戶可能 使用無線設備來接入網頁服務,這會生成相當大數量的 訊務,以使得用戶能夠訪問網頁服務和/或獲取内容。 OpenlD是例如用戶鑑別的過程的一部分,這會增加内容 獲取過程的訊務。這裏描述的實施方式可用於減少使用 空中通信的網路鑑別所帶來的訊務。網路訊務也可能在 固定線路網際網路上發生,和/或可使用現有的基礎設施 。固定線路通信不會增加ΜΝ0/空中介面網路上的負載。 第1圖示出了用於OpenlD協定運行的協定流的示例性實施 方式。所述協定流可以例如是用於標準OpenlD協定運行 的協定流。此外,例如協定流可用於接入來自使用基於 網頁的OpenlD 0P飼服器(例如myopenid.com)的 WTRU的信賴方(RP)。 〇 第1圖中示出的協定流可能不涉及本地訊務,但是可涉及 空中和/或固定線路通信。從第1圖中的空中網路卸載的 訊務可以是用於在112的發現過程和/或在114的RP 108 和網路0P 104之間的關聯建立的固定線路通信。由於網 路OP 1 04可以是網頁服務,因此用戶102 (例如,設備 、流覽器或其他在設備上運行的應用的用戶,和/或設備 本身)和網路0P 104之間的通信可以在空中介面上。 如第1圖所示,在110,用戶102可以例如通過使用 OpenlD登錄到信賴方108 »例如,用戶1〇2可以向RP 108提交OpenlD識別字。在112,RP 108可以通過與 1013091673-0 10013373#單編號A0101 第11頁/共100頁 201225697Krp) can be associated with a relying party (RP) through which the signature can be derived 10_7#single number A〇101 帛9 pages/total (10) pages 1013091673-0 201225697 keys (eg 'Kasc). A signature rifle (e.g., Kasc) J is used to sign an identity claim message for user authentication. The temporary secret transmission (Ks_int_NAF) may be a key derived from GBA-U (a UICC-centric GBA procedure within the UICC for application, such as that described in 3GPP TS 33.220). In an exemplary embodiment, a separate secure channel may be established and/or used between the RP and the User Equipment (UE) as part of a five-part protocol (eg, OpenlD Protocol). For example, this town is completed with an independent secure communication channel between the RP and the UE independent of the OP. 14 may allow security between 〇P and user/RP pairs to be separated, and may provide means for limiting the damage caused by security violations of 0P. In an exemplary embodiment, the SSO agreement can be integrated with the authentication and secret protocol. For example, OpenlD may be combined with an Authentication and Secret Recording Protocol (AKA) (e.g., eighty (human) as described in 36?? 15 33.102. The use of a local OpenlD provider associated with a wireless device is described in the embodiments herein ( Identification of 0P). For example, the local (10) may reside in a wireless device 'attached to the wireless device, and/or connected to the wireless device through a local interface, wiring, and/or short-range wireless device. According to one embodiment, the local 0P may be A local web server on the wireless device is associated, such as a smart card web server (SCWS). The local web P may include a local web server. Alternatively or additionally, the local web server may establish 'or local' at the local 0P upper end 0P may be located on a local web server. Embodiments described herein may implement network communications that may be performed using local communications, over air communications, and/or fixed line communications. When implementing local communications, mobile networks Road operator (ΜΝ0) / there is little or no load on the air network, other (fixed line, or non-ΜΝ0) network 10013373 #单号A0101第10页/ Total 100 pages 1013091673 201225697 没有 No traffic on the road, and / or communication within the wireless device. Air communication can be performed on the ΜΝ 0 / air network as a data service (for example, HTTP and / or IP-based communication), And can represent the load on the MN0/air network. With over-the-air communication, the traffic will not be reduced to zero because the user may use the wireless device to access the web service, which generates a considerable amount of traffic so that the user can access the web page. Serving and/or obtaining content. OpenlD is part of the process of user authentication, for example, which increases the traffic of the content acquisition process. The embodiments described herein can be used to reduce the traffic generated by network authentication using over-the-air communication. Traffic may also occur on fixed-line internet and/or existing infrastructure. Fixed-line communications do not increase the load on the ΜΝ0/empty-intermediate network. Figure 1 shows the agreement for OpenlD protocol operation. An exemplary embodiment of a flow. The contract flow may be, for example, a contract flow for a standard OpenlD protocol run. The protocol flow can be used to access a relying party (RP) from a WTRU using a web-based OpenlD 0P feeder (eg myopenid.com). The protocol flow shown in Figure 1 may not involve local traffic, but may Involving air and/or fixed line communications. Traffic offloaded from the air network in FIG. 1 may be for the discovery process at 112 and/or the association between RP 108 and network OP 104 of 114. Fixed line communication. Since the network OP 1 04 can be a web service, the user 102 (eg, a user of a device, browser or other application running on the device, and/or the device itself) and the network OP 104 The communication can be on the empty mediation surface. As shown in FIG. 1, at 110, the user 102 can log in to the relying party 108, for example by using OpenlD. For example, the user 1〇2 can submit the OpenlD identification word to the RP 108. At 112, RP 108 can be passed with 1013091673-0 10013373# single number A0101 page 11 / total 100 pages 201225697
OpenlD URI 106通信來發現網路OpenID提供方(OP) 104。在發現網路OP 104之後,RP 108可在114執行與 網路0P 104的關聯。例如,RP 108和網路0P 104可生 成共用的機密。在116,RP 108可向用戶102發送重定向 消息(例如,HTTP重定向消息)而將用戶102重定向到網 路0P 104。用戶102可在118向網路0P 104發送對鑑別 頁面的請求(例如,HTTP GET (獲得)請求)。網路0P 104可在120向用戶102發送0P鑑別頁面,以鑑別用戶102 。用戶102可在122向網路0P 104發送鑑別憑證。網路0P 104可在124向用戶102發送重定向消息(例如,HTTP重 定向消息)而將用戶102重定向到RP 108。在126,用戶 102可向RP 108發送消息(例如,HTTP GET消息)而請 求登錄到服務。所述消息可包括來自網路0P 104的簽署 的身份聲明,其指示用戶102已經由網路0P 104鑑別。 RP 108可基於所述身份聲明消息允許用戶102接入其服 務,並且在128, RP 108可向用戶指示該用戶已經登錄 並可接入服務。 根據一個實施方式,第1圖所示的協定流中的步驟112和/ 或114可在固定線路網際網路上執行,從而不增加例如 MN0/空中介面網路上的負載。第1圖所示的其他步驟可以 是空中通信(其例如可以在MN0/空中網路上執行)而作 為資料訊務(例如,HTTP,基於IP的通信),和/或可表 示MN0網路上的負載。訊務不會被減少為零,因為用戶 102可能使用設備來接入網頁服務,這會生成使用戶102 能夠訪問網頁服務和/或獲取内容的訊務。Open ID是例如 用戶鑑別的過程的一部分,這會增加内容獲取過程的訊 10013373#單編號 A〇101 第12頁/共100頁 1013091673-0 201225697 務。如這裏所述,減少網路鑑別可以降低網路上的總訊 務。 第2圖示出了用於OpenID/GBA的訊務流的示例性實施方 式。如第2圖所示,用戶設備(UE) 204可以在210發送 用戶提供的識別字給RP 208。RP 208可在212獲取用於 與網路0P/NAF 206通信的0P位址。RP 208可以(例如 ,可選地)在214與網路0P/NAF 206建立共用機密。在 216,RP 208可將UE 204重定向到網路0P/NAF 206。 例如,RP 208可使用OpenID鑑別請求重定向UE 204上 ^ 的流覽器。在218,UE 204可發送鑑別請求(例如, HTTPS GET請求)給0P/NAF 206。在220,0P/NAF 206可發送鑑別請求給UE 204。在222, UE 204和BSF 202可執行如這裏所述的引導操作。在224, UE 204可向 0P/NAF 206發送請求消息(例如,HTTPS請求消息)。 所述請求消息可包含引導事務識別字(B-TID)。在226 ,0P/NAF 206可從BSF 202獲取密鑰和/或相關資訊( 例如,有效期,GUSS等等)並鑑別用戶。0P/NAF 206可 ❹ 在228發送重定向消息給UE 204而將UE 204重定向到rp 208。例如,0P/NAF 206可將ME流覽器重定向到RP 208 。所述重定向消息可與指示用戶204已經被鑑別的身份鑑 別聲明一起發送。在230,RP可在228確認(validate )由UE 204接收的鑑別聲明有效。 如第2圖所示,不管RP和MN0之間的關聯步驟如何,通信 可在空中網路上發生。然而,與基於網頁的0P相比,訊 務會在OpenID/GBA中增加,因為用於鑑別的額外步驟( 步驟222和226)會增加空中資料網路以及用於GBA锻別 10013373#單編號A〇101 第13頁/共100頁 1013091673-0 201225697 的後端&務上的負擔’例如BSF和/或NAF子系統。因此在 第2圖不出的訊務流中,空中網路訊務之增加和網路實體 上的負載增加會發生。 第3圖不出了使用本地卵的協定流的示例性實施方式。如 第3圖所不’可通過卸載到本地設備的訊務來減少空中網 路訊務例如,用戶/流覽器302和本地0P 304之間的鑑 別訊務可被本地執行,並且不增加空中網路或網路服務 的負擔。另外’ Rp 306和網路〇p 308之間的發現和/或 M sfl務可不經由空中網路發生,並且可在其他基礎設 施上發生’例如固定線路公共網際網路。第3圖中所示的 其他sfl務可例如在空中網路上發生。 第3圖中所示的實體包括用戶/流覽器302、本地OP 304 、1^ 30 6和網路仙3〇8。用戶/流覽器3〇2可包括無線 設備像是例如WTRU、與無線設備相關聯的用戶、和/或在 無線設備上運行的流覽器或其他應用。本地〇P 3〇4可以 是本地駐留在無線設備上或直接連接到無線設備的實體 ’其充當駐留在網路的網路〇p (像是例如網路〇P 308 ) 的代理。本地OP 304可與駐留在無線設備上的本地網頁 伺服器(例如智慧卡網頁伺服器(SCWS ))相關聯。網 路OP 308是本地op 304所駐留或所連接的無線設備外部 的OP。例如,網路OP 308可以是與MNO和/或網路實體相 關聯的OP。 如第3圖所示,RP 306可在310接收到來自用戶/流覽器 302的登錄請求。所述登錄請求可以是例如使用OpenID 的登錄請求。在312, RP 306和網路OP 308可執行發現 。所述發現可以是發現0P伺服器和/或基於例如Ope η II) 10013373# 單編號 λ0101 ^ 14 1 / ^ 100 I 1013091673-0 201225697 身份。RP 306可在314發送關聯請求給網路308。〇p 308可在316生成隨機的、唯一的關聯控制碼A和/或計算 簽名密餘S (例如’ Kasc)。網路〇P 308可在318發送關 聯回應給RP 306 »所述關聯回應可包括關聯控制碼A和/ 或簽名密鑰S (例如,Kasc)。在320 ’ RP 306可存儲簽 名密餘S (例如’ Kasc)和/或關聯控制碼A。在322,Rp 306可發送重定向消息給用戶/流覽器302。所述重定向消 息可將用戶/流覽器302重定向到本地〇P 304。所述重定 向消息可包括請求參數中的關聯控制碼。 " 在324,用戶/流覽器302可執行本地DNS查找。DNS查找 可用於例如找到本地0P 304。在326,本地0P 304可接 收到來自用戶/流覽器302的本地錐別請求。在328,本地 0P 304和用戶/流覽器302可執行本地用戶鑑別。在328 的本地用戶鑑別中,本地0P可發送0P鑑別頁面給用戶/流 覽器302和/或用戶/流覽器302可發送鑑別資訊(例如, 鑑別憑證)給本地0P 304。在330 ’本地0P 304可驗證 r, 所述鑑別資訊(例如,鑑別憑證)。在332本地OP 304The OpenlD URI 106 communicates to discover the network OpenID Provider (OP) 104. After the network OP 104 is discovered, the RP 108 can perform an association with the network OP 104 at 114. For example, RP 108 and network OP 104 can generate a shared secret. At 116, RP 108 can send a redirect message (e.g., an HTTP redirect message) to user 102 to redirect user 102 to network OP 104. User 102 can send a request for an authentication page (e.g., an HTTP GET request) to network OP 104 at 118. Network OP 104 may send an OP authentication page to user 102 at 120 to authenticate user 102. User 102 can send an authentication credential to network OP 104 at 122. Network OP 104 may send a redirect message (e.g., an HTTP redirect message) to user 102 at 124 to redirect user 102 to RP 108. At 126, user 102 can send a message (e.g., an HTTP GET message) to RP 108 requesting to log in to the service. The message may include a signed identity statement from network OP 104 indicating that user 102 has been authenticated by network OP 104. The RP 108 can allow the user 102 to access its service based on the identity claim message, and at 128, the RP 108 can indicate to the user that the user has logged in and can access the service. According to one embodiment, steps 112 and/or 114 in the protocol flow shown in Figure 1 can be performed over a fixed line internet network, thereby not increasing the load on, for example, the MN0/empty interfacing network. The other steps shown in Figure 1 may be over-the-air communication (which may be performed, for example, on MN0/air network) as data traffic (e.g., HTTP, IP-based communication), and/or may represent a load on the MN0 network. . The traffic will not be reduced to zero because the user 102 may use the device to access the web service, which generates traffic that enables the user 102 to access the web service and/or obtain content. The Open ID is part of the process of user authentication, for example, which will increase the content acquisition process. 10013373#单号 A〇101 Page 12 of 100 1013091673-0 201225697. As described herein, reducing network authentication can reduce the total traffic on the network. Figure 2 shows an exemplary implementation of a traffic flow for OpenID/GBA. As shown in FIG. 2, user equipment (UE) 204 may transmit a user-provided identification word to RP 208 at 210. The RP 208 can obtain an OP address for communication with the network OP/NAF 206 at 212. The RP 208 can (e.g., optionally) establish a shared secret with the network OP/NAF 206 at 214. At 216, RP 208 can redirect UE 204 to network OP/NAF 206. For example, RP 208 can use the OpenID authentication request to redirect the browser on UE 204. At 218, the UE 204 can send an authentication request (eg, an HTTPS GET request) to the OP/NAF 206. At 220, the OFDM/NAF 206 may send an authentication request to the UE 204. At 222, UE 204 and BSF 202 can perform a bootstrap operation as described herein. At 224, UE 204 can send a request message (e.g., an HTTPS request message) to 0P/NAF 206. The request message may include a boot transaction identification word (B-TID). At 226, the OP/NAF 206 may obtain a key and/or related information (e.g., validity period, GUSS, etc.) from the BSF 202 and authenticate the user. The 0P/NAF 206 may send a redirect message to the UE 204 at 228 and redirect the UE 204 to the rp 208. For example, 0P/NAF 206 can redirect the ME browser to RP 208. The redirect message may be sent with an identity authentication statement indicating that the user 204 has been authenticated. At 230, the RP may validate 228 that the authentication assertion received by the UE 204 is valid. As shown in Figure 2, communication can occur over the air network regardless of the association steps between RP and MN0. However, compared to web-based OP, the traffic will increase in OpenID/GBA because the extra steps for authentication (steps 222 and 226) will increase the air data network and for GBA forging 10013373# single number A 〇101 Page 13 of 100 Page 1013091673-0 201225697 Back-end & burdens such as BSF and / or NAF subsystem. Therefore, in the traffic flow not shown in Figure 2, the increase in air traffic and the increase in load on the network entity will occur. Figure 3 illustrates an exemplary embodiment of a protocol flow using native eggs. As shown in FIG. 3, the air traffic can be reduced by offloading the traffic to the local device. For example, the authentication traffic between the user/viewer 302 and the local OP 304 can be performed locally without increasing the air. The burden of network or network services. In addition, discovery and/or Msfl between the Rp 306 and the network 〇p 308 may occur not over the air network and may occur on other infrastructures such as a fixed line public internet. Other sfl tasks shown in Figure 3 can occur, for example, on the air network. The entities shown in FIG. 3 include a user/viewer 302, a local OP 304, a 1^30 6 and a network singapore 8. The user/viewer 〇2 may include a wireless device such as a WTRU, a user associated with the wireless device, and/or a browser or other application running on the wireless device. The local port P3〇4 may be an entity that resides locally on the wireless device or directly connected to the wireless device' which acts as a proxy for a network 驻留p (e.g., network 〇P 308) residing on the network. The local OP 304 can be associated with a local web server (e.g., a smart card web server (SCWS)) residing on the wireless device. The network OP 308 is an OP external to the wireless device in which the local op 304 resides or is connected. For example, network OP 308 can be an OP associated with an MNO and/or a network entity. As shown in FIG. 3, RP 306 can receive a login request from user/browser 302 at 310. The login request may be, for example, a login request using OpenID. At 312, RP 306 and network OP 308 can perform discovery. The discovery may be the discovery of an OP server and/or based on, for example, Ope η II) 10013373# single number λ0101 ^ 14 1 / ^ 100 I 1013091673-0 201225697 identity. The RP 306 can send an association request to the network 308 at 314. 〇p 308 may generate a random, unique association control code A at 316 and/or calculate a signature secret S (e.g., 'Kasc). Network 〇P 308 may send an associated response to RP 306 at 318. » The associated response may include association control code A and/or signature key S (e.g., Kasc). A signature secret S (e.g., ' Kasc) and/or associated control code A may be stored at 320' RP 306. At 322, Rp 306 can send a redirect message to user/browser 302. The redirect message can redirect the user/browser 302 to the local 〇P 304. The redirection message may include an associated control code in the request parameter. " At 324, the user/viewer 302 can perform a local DNS lookup. DNS lookup can be used, for example, to find local 0P 304. At 326, the local 0P 304 can receive a local cone request from the user/viewer 302. At 328, local 0P 304 and user/viewer 302 can perform local user authentication. In local user authentication at 328, the local 0P may send a 0P authentication page to the user/viewer 302 and/or the user/viewer 302 may send authentication information (e.g., authentication credentials) to the local 0P 304. At 330 'local 0P 304, r can be verified, the authentication information (e.g., authentication credentials). At 332 local OP 304
J 還可計算簽名密鑰S (例如’Kasc)。簽名密鑰s (例如 ,Kasc)可以是與在316由網路0P 308計算的和/或在 320由RP 306存儲的相同的密鑰。可基於長期共用機密 或會話密鑰K (例如,Krp,K_(ext/int)_NAF,或存儲 在智慧卡中的另一個密鑰)和關聯控制碼A來計算簽名密 餘S (例如,Kasc)。長期共用機密或會話密錄K (例如 ,Krp,K_(exVint)一NAF,或存儲在智慧卡中的另一 個密錄)可以是與網路0P 308共用的密錄。該會話密錄 1013091673-0 可從在網路和與本地0P相關聯的無線設備和/或本地〇P本 10013373#·單編號A01〇l 第15頁/共100頁 201225697 身之間執行的網路鑑別中導出。所述關聯控制碼A可以是 在31 6在關聯期間由網路0P生成的控制碼。簽名密鑰S ( 例如,Kasc)可由0P 304在334用於計算簽名,其可包 括在指示本地〇p已經本地驗證了來自用戶/流覽器3〇2的 鑑别資訊的身份聲明中。在336,本地OP 304可發送重 定向消息到用戶/流覽器302。所述重定向消息可包括關 聯控制碼A和/或使用在334計算的簽名的簽署的參數。 在338 ’用戶/流覽器3〇2可發送請求到rp 306。所述請 求可包括來自本地OP 304的簽署的身份聲明消息。RP 306可在340驗證身份聲明消息上的簽名。例如,rp 306 可使用在316由網路OP 308計算以及在318由RP 306接 收的簽名密鑰S (例如,Kasc )來驗證身份聲明消息上的 簽名。如果所述簽名在340被適當驗證,則RP 306可允 許用戶/流覽器302通過網路接入服務。在342,RP 306 可通過發送‘已登錄’頁面顯示給用戶/流覽器302來指 示用戶/流覽器302可接入該服務。 第4圖示出了使用本地鑑別的協定流的另一個示例性實施 方式。如第4圖所示,可通過卸載到本地設備的訊務來減 少空中網路訊務。例如,用戶4〇2、流覽器404和/或本地 OP 406之間的鑑別訊務可本地執行,並且不增加空中網 路或網路服務的負擔。另外,RP 408和網路OP 410之間 的發現和/或關聯訊務可不經由空中網路發生,並且可在 其他基礎設施上發生,例如固定線路公共網際網路。第4 圖中所示的其他訊務可例如在空中網路上發生。 第4圖中所示的實體包括用戶4〇2、流覽器404、本地OP 406、RP 408和網路〇p 41〇。用戶402可包括無線設備 10013373#單編號 A0101 第 16 頁 / 共 1〇〇 頁 1013091673-0 201225697 例如WTRU,與無線設備相關聯的用戶,和/或在無線設 備上執行的應用。流覽器404可包括網頁流覽器或正在無 線設備上執行的其他應用。本地OP 406可以是本地駐留 在無線設備上的實體,其充當駐留在無線設備之外的OP (例如網路OP 410)的代理。本地OP 406可與駐留在無 線設備上的SCWS相關聯。網路OP 410可以是位於本地〇P 406所駐留和/或所關聯的無線設備外部的OP。例如,網 路OP 410可以是與MNO相關聯的OP。 Ο 如第4圖所示,用戶40 2可嘗試經由流覽器404接入服務。 例如,在412,用戶402可訪問與RP 408相關聯的網站。 在412 ’用戶402還可以向流覽器404提供用戶識別字( 例如,OpenlD識別字)。在414,流覽器404可向RP 408發送請求消息(例如,HTTP消息)。所述請求消息可 包括例如OpenID身份URL°RP 408和網路0P 410可執行 0P伺服器的發現。例如,RP 408可在416向網路0P 410 發送請求消息(例如,HTTP GET身份頁面消息)。RP 408可在418從網路0P 410接收回應。所述回應可包括例 如OpenID 0P伺服器位址。在420,RP 408可向網路〇p 410發送關聯請求。例如,關聯請求可包括至網路〇p 410的HTTP post (投遞)。網路〇p 410可在422生成隨 機的、唯一的關聯控制碼A。在424,網路0P 410可計算 作為與RP 408之共用機密的簽名密鑰s (例如,Kasc) 。可使用在422生成的關聯控制碼A和例如在網路op 41Q 和本地OP 406之間共用的長期機密或會話密鑰κ (例如, Krp)來計算簽名密鑰S。所述會話密鑰可從在網路和無 1〇_产單編號 線設備(例如,本地〇p)之間執行的鑑別中導出。在426 A0101 第Π頁/共100頁 1013091673-0 201225697 ,網路OP 410可發送關聯回應給Rp 4〇8。例如,所述關 聯回應可包括HTTP p〇ste在426的關聯回應可包括在 422生成的關聯控制碼八和/或在424計算的簽名密鑰5 ( 例如,Kasc )。 RP 408可在428生成臨時標誌(n〇nce)和/或會話識別 字。在430,RP 408可存儲簽名密鑰S (例如,Kasc)和 /或關聯控制碼A。在432,RP 408可在要發送給流覽器 404的消息中包含關聯控制碼a。例如,所述關聯控制碼A 可被包括在配置為被發送給流覽器4 〇 4的重定向消息中。 在434,可將關聯控制碼a發送給流覽器4〇4。例如,包含 關聯控制碼A的重定向消息(例如,HTTP重定向消息)可 被發送給流覽器404。 用戶402、流覽器404和/或本地〇p 406可在能與網路通 信的設備(例如無線設備)執行本地鑑別。在436,流覽 器可執行本地DNS查找。例如,所述DNS查找可用於找到 本地0P 406。使用所述DNS查找,流覽器404可請求網頁 URL (例如 ’ opened· provider, com)。使用所述DNS 查找,URL可轉換為IP位址。流覽器404可對本地列表或 主機中所描述形式的固定映射執行查找。如果其不包括 對於所請求URL的映射,則設備可用遠端網域名稱伺服器 (DNS)執行查找。在436,流覽器404可在流覽器404請 求來自OP URL的頁面時接入本地IP位址(例如,與本地 0P 406相關聯的網頁伺服器的IP位址),所述OP URL可 由用戶提供作為用戶身份(例如,Open ID身份)的部分 。本地0P 406的IP位址可以是私有的或本地位址。因此 ,與本地0P相關聯的網頁伺服器可從本地0P所駐留的或 麵則^單編號應01 第18頁/共100頁 1013091673-0 201225697 相關聯的無線設備中獲得。 流覽器404可在438發送消息給本地0P 406。所述消息可 包括流覽器404從RP 408中接收的參數。本地OP 406可 在440發送鑑別頁面給流覽器404,該鑑別頁面可以顯示 給用戶40 2。在444,用戶402可輸入鑑別資訊(例如, 鑑別憑證),並且在446,鑑別資訊(例如,鑑別憑證) 可以被發送給流覽器404。本地OP 406可在448從流覽器 404接收鑑別資訊(例如,鑑別憑證),並在450驗證鑑 別貪訊(例如,鑑別憑證)。 在452,本地OP 406可使用與網路OP 410共用的會話密 鑰K (例如,Krp)和在438在重定向參數中接收的關聯控 制碼A來鼻簽名密餘S (例如’ Kasc)。所述會話密輪K (例如’ Krp)可從網路和與本地〇p 406相關聯的無線 設備之間的鑑別中導出。在454,簽名密錄S (例如, Kasc)可用於計算用於身份聲明的簽名。例如,所述簽 名可用於指示本地OP 406已經本地驗證了鑑別資訊。在 454計算的簽名可在456被包括在針對流覽器404的消息 中。例如’所述簽名可作為參數被包括在HTTp重定向消 息中。在458,重定向消息可被發送到流覽器404 *在 458的重定向消息可包括關聯控制碼丸和/或可使用通過使 用簽名密鑰S (例如Kasc )計算的簽名被簽署。流覽器 404可在460向RP 408發送指示用戶4〇2已經被適當的鑑 別的消息。例如,流覽器4 0 4可發送具有來自本地〇p 406的鑑別參數的HTTP GET消息,該鑑別參數例如是根 據簽名密鑰S (例如,Kasc)計算的簽名和關聯控制碼A °RP 408可在462驗證所述簽名並使用為關聯控制碼八存 1001337##^ A0101 第19頁/共100頁 1013091673-0 201225697 儲的密鑰。用戶402可在464被識別,並且RP 408可在 466顯示指示用戶登錄到流覽器404的頁面(例如,HTTP 頁面)。在468,流覽器404可向用戶402指示指示所述 用戶已經在RP 408登錄。 第5 A和5 B圖示出了使用本地鑑別的協定流的另一個示例 性實施方式。如第5圖所示,可通過却載到本地設備的訊 務來減少空中網路訊務。例如,用戶502、流覽器504和/ 或本地OP 506之間的鑑別訊務可以是本地的,並且不增 加空中網路或網路服務的負擔。另外,RP 508、網路 OP-agg 510和/或OpenID IdP伺服器(OPSF) 512之間 的發現和/或關聯訊務可不經由空中網路發生,並且可在 其他基礎設施上發生,例如固定線路公共網際網路。第 5A和5B圖中所示的其他訊務可例如在空中網路上發生。 第5 A和5B圖中所示的實體包括用戶502、流覽器504、本 地0P 506、RP 508、網路OP-agg 510和OpenID IdP 伺服器(OPSF) 512。用戶502可包括無線設備(例如 WTRU) ’與無線設備相關聯的用戶,和/或在無線設備上 執行的應用。流覽器504可包括網頁流覽器或正在無線設 備上執行的其他應用。本地〇p 506可以是本地駐留在無 線設備上的實體’其充當駐留在與無線設備通信的網路 上的0P (例如網路OP-agg 510)的代理。本地0P 506 可與無線設備上的本地網頁伺服器(例如sews)相關聯 。網路〇P-agg 510可以是位於本地〇p所駐留和/或所關 聯的無線設備外部的0P。例如,網路0p_agg 510可以是 與龍0相關聯的〇p,例如〇0主辦(h〇st)的網頁伺服器 °0pSF512還可與MN0相關聯,例如MN0相關服務。 1013091673-0 10013373#單編號A〇101 第20頁/共1〇〇頁 如第5A和5B圖所示,在514,用戶502可使用流覽器504 訪問與RP 508相關聯的網站。在516,流覽器504可發送 消息給RP 508。在516的消息可包含OpenID身份URL。 所述消息可以是例如HTTP消息》RP 508可在518發送發 現消息(例如,HTTP GET身份頁面消息)給網路OP-agg 510。作為回應,RP 508可在520從網路OP-agg 510接 收0PSF位址。 RP 508可在522向0PSF 512發送關聯消息(例如,POST (投遞)消息)》RP 508和0PSF 512之間的通信可例如 經由HTTP和/或公共網際網路通信發生。〇psf 512可在 524生成隨機的 '唯一的關聯控制碼a。在526,0PSF 512可計算簽名密鑰s (例如,Kasc)。可使用關聯控制 碼A和與本地〇p 506共用的機密或會話密鑰K(例如, Krp)來计算簽名密錄s (例如,Kasc)。所述會話密錄 K (例如’ Krp)可從在網路和與本地〇p相關聯的無線設 備之間執行的網路鑑別中導出。在528,0?8?512發送 關聯控制碼A和計算的簽名密鑰s (例如,Kasc)給RP 508。關聯可以在給定的時間週期内建立一次,例如每個 RP和/或每個身份。所述RP 508可包括未來通信中的簽 名密鑰和/或關聯控制碼。 在530 ’ RP 508可生成臨時標誌和/或會話識別字^ rP 508可在532存儲簽名密鑰δ (例如,Kasc)和/或關聯控 制碼A。在534,Ι?Ρ 508可在針對流覽器504的重定向消 息中包括關聯控制碼A,並在536發送重定向消息。根據 個實施方式’所述重定向消息可以是包括參數的HTTP 重定向消息’所述參數包括關聯控制碼A。 A0101 1013091673-0 第21頁/共1〇〇頁 201225697 用戶502、流覽器504和本地OP 506可在能夠與網路通信 的無線設備(例如WTRU)執行用戶502的本地鑑別。在 538,流覽器504可執行本地DNS查找《例如,DNS查找可 用於找到本地0P 506。例如,可如這裏所述執行DNS查 找。流覽器504可在540發送消息(例如,HTTP GET消息 )給本地OP 506,所述消息包括從RP 508中接收的參數 。具體地,本地0P 506可從流覽器504接收關聯控制碼A 。在542,本地OP 506可發送鑑別頁面給流覽器504,所 述頁面可以被顯示給用戶502。用戶502可在544輸入鑑 別資訊(例如,鑑別憑證),並且流覽器504可在546從 用戶502接收鑑別資訊(例如,鑑別憑證)。流覽器504 可在548向本地0P發送用戶鑑別資訊(例如,鑑別憑證) 。在550,本地0P 506可驗證所述鑑別資訊(例如,鑑 別憑證)。在552,本地0P 506可使用與0PSF 512共用 的共用機密或會話密論K (例如,Krp )和在重定向參數 中接收的關聯控制碼A來計算簽名密鑰S (例如,Kasc) 。在554,簽名密鑰S (例如,Kasc)可用於計算用於簽 署身份聲明的簽名。在556 ,所述簽名可包括在重定向消 息(例如,HTTP重定向消息)中作為參數。所述簽名可 用于向網路指示所述用戶已經由本地0P 506本地鑑別過 。所述重定向消息可在558被發送給流覽器504 ’並可包 括參數,所述參數包括簽名。 在558,重定向消息可將流覽器重定向到RP 508。在558 的重定向消息可以是本地0P 506與RP 508通信的一種方 式。在5 6 0,流覽器5 0 4可向R P 5 6 0發送消息(例如, HTTP GET消息)’所述消息包括從本地0P 506接收的參 1013091673-0 1()()13373^單編號 A0101 第 22 頁 / 共 100 頁 201225697 數。具體地,參數可包括指示用戶已經由本地OP 506本 地鑑別的簽名。RP 508可在562使用存儲的關聯控制碼A 來驗證簽名。在564,RP 508可識別用戶502,並允許用 戶502經由RP 508接入服務。RP 508可向用戶502發送 指示,指示用戶502在RP 508登錄。例如’在566,RP 506可在流覽器504顯示頁面(例如,HTTP頁面),其在 568向用戶502指示用戶502已經登錄。在登錄到RP 508 之後,用戶502可經由RP 508接入服務。 第6A和6B圖示出了使用本地鑑別的協定流的另一個示例 〇 性實施方式。如第6A和6B圖所示,可通過卸載到本地設 備的訊務來減少空中網路訊務。例如,用戶602、流覽器 604和/或本地〇p 606之間的鑑別訊務可以是本地的,並 且不增加空中網路或網路服務的負擔。另外,RP 608、 網路OP-agg 610和/或OpenID IdP伺服器(0PSF) 612 之間的發現和/或關聯訊務可不經由空中網路發生,並且 可在其他基礎設施上發生,例如固定線路公共網際網路 Q 。第6A和6B圖中所示的其他訊務可例如在空中網路上發 生。 第6A和6B圖中所示的實體包括用戶602、流覽器6〇4、本J can also calculate the signature key S (for example, 'Kasc). The signing key s (e.g., Kasc) may be the same key that was calculated by network 0P 308 at 316 and/or stored by RP 306 at 320. The signature secret S can be calculated based on the long-term shared secret or session key K (eg, Krp, K_(ext/int)_NAF, or another key stored in the smart card) and the associated control code A (eg, Kasc) ). The long-term shared secret or session secret record K (for example, Krp, K_(exVint)-NAF, or another secret record stored in the smart card) may be a secret record shared with the network 0P 308. The session secret record 1011091673-0 can be executed from the network between the network and the wireless device associated with the local 0P and/or the local device 100100373#·single number A01〇l page 15/100 pages 201225697 Exported in the road identification. The associated control code A may be a control code generated by the network OP during the association. The signing key S (e.g., Kasc) may be used by the OC 304 at 334 to calculate a signature, which may be included in an identity claim indicating that the local 〇p has locally verified the authentication information from the user/browser 3〇2. At 336, the local OP 304 can send a redirect message to the user/viewer 302. The redirect message may include an associated control code A and/or a signed parameter using the signature calculated at 334. The request can be sent to rp 306 at 338 'user/viewer 3〇2. The request may include a signed identity claim message from the local OP 304. The RP 306 can verify the signature on the identity claim message at 340. For example, rp 306 can use the signature key S (e.g., Kasc) received by network OP 308 at 316 and received by RP 306 at 318 to verify the signature on the identity claim message. If the signature is properly verified at 340, the RP 306 may allow the user/browser 302 to access the service over the network. At 342, the RP 306 can indicate that the user/viewer 302 can access the service by transmitting a 'logged in' page to the user/browser 302. Figure 4 illustrates another exemplary embodiment of a protocol flow using local authentication. As shown in Figure 4, air traffic can be reduced by offloading traffic to the local device. For example, the authentication traffic between the user 4, the browser 404, and/or the local OP 406 can be performed locally without burdening the air network or network service. In addition, discovery and/or associated traffic between RP 408 and network OP 410 may occur not over the air network and may occur on other infrastructure, such as a fixed line public internet. Other services shown in Figure 4 can occur, for example, on the air network. The entities shown in FIG. 4 include a user 4〇2, a browser 404, a local OP 406, an RP 408, and a network 〇p 41〇. User 402 can include a wireless device 10013373#single number A0101 page 16 / total 1 page 1013091673-0 201225697 For example, a WTRU, a user associated with a wireless device, and/or an application executing on a wireless device. The browser 404 can include a web page browser or other application being executed on a wireless device. The local OP 406 may be an entity that resides locally on the wireless device, acting as a proxy for an OP (e.g., network OP 410) residing outside of the wireless device. The local OP 406 can be associated with SCWS residing on the wireless device. Network OP 410 may be an OP located external to the wireless device on which local 〇P 406 resides and/or associated. For example, network OP 410 can be an OP associated with an MNO. As shown in FIG. 4, the user 40 2 may attempt to access the service via the browser 404. For example, at 412, user 402 can access a website associated with RP 408. The user 402 can also provide a user identification word (e.g., OpenlD identification word) to the browser 404 at 412'. At 414, the browser 404 can send a request message (eg, an HTTP message) to the RP 408. The request message may include, for example, OpenID Identity URL ° RP 408 and Network 0P 410 executable 0P server discovery. For example, RP 408 can send a request message (eg, an HTTP GET identity page message) to network OP 410 at 416. The RP 408 can receive a response from the network OP 410 at 418. The response may include, for example, an OpenID 0P server address. At 420, RP 408 can send an association request to network 〇p 410. For example, the association request may include an HTTP post to the network 410p 410. Network 〇p 410 can generate a random, unique associated control code A at 422. At 424, network OP 410 can calculate a signature key s (e.g., Kasc) that is a shared secret with RP 408. The signature key S can be calculated using the associated control code A generated at 422 and a long-term secret or session key κ (e.g., Krp) shared between the network op 41Q and the local OP 406, for example. The session key can be derived from authentication performed between the network and the no-numbering line device (e.g., local 〇p). At 426 A0101 page/100 pages 1013091673-0 201225697, the network OP 410 can send an association response to Rp 4〇8. For example, the associated response may include an HTTP p〇ste associated response at 426 that may include an associated control code eight generated at 422 and/or a signed key 5 (e.g., Kasc) calculated at 424. The RP 408 can generate a temporary flag (n〇nce) and/or a session identifier at 428. At 430, RP 408 can store a signature key S (e.g., Kasc) and/or associated control code A. At 432, RP 408 can include an associated control code a in the message to be sent to browser 404. For example, the associated control code A can be included in a redirect message configured to be sent to the browser 4 〇 4. At 434, the associated control code a can be sent to the browser 4〇4. For example, a redirect message (e.g., an HTTP redirect message) containing the associated control code A can be sent to the browser 404. User 402, browser 404, and/or local 〇p 406 can perform local authentication on devices (e.g., wireless devices) that can communicate with the network. At 436, the browser can perform a local DNS lookup. For example, the DNS lookup can be used to find a local 0P 406. Using the DNS lookup, browser 404 can request a web page URL (e.g., 'opened provider, com'). Using the DNS lookup, the URL can be converted to an IP address. The browser 404 can perform a lookup on a fixed map in the form described in the local list or host. If it does not include a mapping for the requested URL, the device can perform a lookup using the remote Domain Name Server (DNS). At 436, the browser 404 can access the local IP address (e.g., the IP address of the web server associated with the local 0P 406) when the browser 404 requests the page from the OP URL, the OP URL can be The user provides the part as a user identity (eg, Open ID identity). The IP address of the local 0P 406 may be private or local. Therefore, the web server associated with the local 0P can be obtained from the wireless device associated with the local 0P or the number of the single number should be 01 page 18 / total 100 pages 1013091673-0 201225697. The browser 404 can send a message to the local 0P 406 at 438. The message may include parameters that the browser 404 receives from the RP 408. The local OP 406 can send an authentication page to the browser 404 at 440, which can be displayed to the user 40 2 . At 444, the user 402 can enter authentication information (e.g., authentication credentials), and at 446, authentication information (e.g., authentication credentials) can be sent to the browser 404. The local OP 406 can receive authentication information (e.g., authentication credentials) from the browser 404 at 448 and verify the authentication greed (e.g., authentication credentials) at 450. At 452, the local OP 406 can use the session key K (e.g., Krp) shared with the network OP 410 and the associated control code A received at 438 in the redirect parameter to sign the secret S (e.g., 'Kasc). The session secret wheel K (e.g., 'Krp) may be derived from the authentication between the network and the wireless device associated with the local port 406. At 454, the signature secret S (eg, Kasc) can be used to calculate the signature for the identity claim. For example, the signature can be used to indicate that the local OP 406 has verified the authentication information locally. The signature calculated at 454 can be included in the message for browser 404 at 456. For example, the signature can be included as a parameter in the HTTp redirect message. At 458, the redirect message can be sent to the browser 404. The redirect message at 458 can include the associated control code pill and/or can be signed using a signature calculated by using the signing key S (e.g., Kasc). The browser 404 can send a message to the RP 408 at 460 indicating that the user 4〇2 has been properly identified. For example, browser 404 may send an HTTP GET message with an authentication parameter from local 〇p 406, such as a signature and associated control code A ° RP 408 calculated from signature key S (eg, Kasc). The signature can be verified at 462 and stored as a key associated with the associated control code eight 1001337##^ A0101 page 19/100 page 1013091673-0 201225697. User 402 can be identified at 464, and RP 408 can display a page (e.g., an HTTP page) indicating that the user is logged into browser 404 at 466. At 468, the browser 404 can indicate to the user 402 that the user has logged in at the RP 408. Figures 5A and 5B illustrate another exemplary embodiment of a protocol flow using local authentication. As shown in Figure 5, air traffic can be reduced by traffic carried to local devices. For example, the authentication traffic between the user 502, the browser 504, and/or the local OP 506 can be local and does not burden the air network or network services. Additionally, discovery and/or associated traffic between RP 508, network OP-agg 510, and/or OpenID IdP Server (OPSF) 512 may occur not over the air network and may occur on other infrastructure, such as fixed Line public internet. Other traffic as shown in Figures 5A and 5B can occur, for example, over an air network. The entities shown in Figures 5A and 5B include user 502, browser 504, local 0P 506, RP 508, network OP-agg 510, and OpenID IdP Server (OPSF) 512. User 502 can include a wireless device (e.g., a WTRU)' a user associated with the wireless device, and/or an application executing on the wireless device. The browser 504 can include a web page browser or other application being executed on a wireless device. The local port 506 may be an entity that resides locally on the wireless device' which acts as a proxy for the OP (e.g., network OP-agg 510) residing on the network in communication with the wireless device. The local 0P 506 can be associated with a local web server (eg, sews) on the wireless device. The network port P-agg 510 may be an OP located outside the local device and/or associated wireless device. For example, network 0p_agg 510 may be 〇p associated with Dragon 0, such as 网页0 hosted (h〇st) web server °0pSF 512 may also be associated with MN0, such as MN0 related services. 1013091673-0 10013373#Single Number A〇101 Page 20 of 1 As shown in Figures 5A and 5B, at 514, the user 502 can use the browser 504 to access the website associated with the RP 508. At 516, browser 504 can send a message to RP 508. The message at 516 may contain an OpenID identity URL. The message may be, for example, an HTTP message RP 508 may send a discovery message (e.g., an HTTP GET identity page message) to network OP-agg 510 at 518. In response, RP 508 can receive the 0PSF address from network OP-agg 510 at 520. The RP 508 can send an association message (e.g., POST (Post) message) at 522 to the 0PSF 512. Communication between the RP 508 and the 0PSF 512 can occur, for example, via HTTP and/or public internet communication. 〇psf 512 can generate a random 'unique association control code a' at 524. At 526, the 0PSF 512 can calculate the signature key s (eg, Kasc). The signature secret s (e.g., Kasc) can be calculated using the association control code A and the secret or session key K (e.g., Krp) shared with the local 〇p 506. The session secret record K (e.g., 'Krp) can be derived from network authentication performed between the network and the wireless device associated with the local device. The associated control code A and the calculated signature key s (e.g., Kasc) are sent to the RP 508 at 528, 0?8?512. Associations can be established once in a given time period, such as each RP and/or each identity. The RP 508 can include a signature key and/or an associated control code in future communications. A temporary flag and/or session identification word ^ rP 508 may be generated at 530 ' RP 508 to store a signature key δ (e.g., Kasc) and/or associated control code A at 532. At 534, 508? 508 may include an associated control code A in the redirect message for browser 504 and a redirect message at 536. The redirect message may be an HTTP redirect message including parameters' according to embodiments. The parameter includes an associated control code A. A0101 1013091673-0 Page 21 of 1 201225697 User 502, browser 504, and local OP 506 can perform local authentication of user 502 at a wireless device (e.g., a WTRU) capable of communicating with the network. At 538, browser 504 can perform a local DNS lookup. For example, a DNS lookup can be used to find local OP 506. For example, a DNS lookup can be performed as described herein. The browser 504 can send a message (e.g., an HTTP GET message) to the local OP 506 at 540, the message including parameters received from the RP 508. In particular, local OP 506 can receive associated control code A from browser 504. At 542, the local OP 506 can send an authentication page to the browser 504, which can be displayed to the user 502. User 502 can enter authentication information (e.g., authentication credentials) at 544, and browser 504 can receive authentication information (e.g., authentication credentials) from user 502 at 546. The browser 504 can send user authentication information (e.g., authentication credentials) to the local 0P at 548. At 550, the local 0P 506 can verify the authentication information (e.g., authentication credentials). At 552, the local 0P 506 can calculate the signature key S (e.g., Kasc) using the shared secret or session secret K (e.g., Krp) shared with the 0PSF 512 and the associated control code A received in the redirection parameter. At 554, the signature key S (e.g., Kasc) can be used to calculate a signature for signing the identity claim. At 556, the signature can be included as a parameter in a redirect message (e.g., an HTTP redirect message). The signature can be used to indicate to the network that the user has been locally authenticated by the local 0P 506. The redirect message can be sent 558 to the browser 504' and can include parameters, the parameters including the signature. At 558, the redirect message redirects the browser to the RP 508. The redirect message at 558 can be a way for the local 0P 506 to communicate with the RP 508. At 5 6 0, the browser 504 can send a message (eg, an HTTP GET message) to the RP 560. The message includes the parameter 1013091673-0 1()() 13373^ single number received from the local 0P 506. A0101 Page 22 of 100 201225697 number. In particular, the parameters may include a signature indicating that the user has been authenticated locally by the local OP 506. The RP 508 can verify the signature at 562 using the stored associated control code A. At 564, RP 508 can identify user 502 and allow user 502 to access the service via RP 508. The RP 508 can send an indication to the user 502 indicating that the user 502 is logged in at the RP 508. For example, at 566, RP 506 can display a page (e.g., an HTTP page) at browser 504, which indicates to user 502 at 568 that user 502 has logged in. After logging in to the RP 508, the user 502 can access the service via the RP 508. Figures 6A and 6B illustrate another example implementation of a protocol flow using local authentication. As shown in Figures 6A and 6B, air traffic can be reduced by offloading traffic to local devices. For example, the authentication traffic between the user 602, the browser 604, and/or the local 〇p 606 can be local and does not burden the air network or network service. Additionally, discovery and/or associated traffic between RP 608, network OP-agg 610, and/or OpenID IdP server (0PSF) 612 may occur not over the air network and may occur on other infrastructure, such as fixed Line Public Internet Q. Other services shown in Figures 6A and 6B may occur, for example, over the air network. The entities shown in Figures 6A and 6B include user 602, browser 6〇4, and this
地0P 606、RP 608、網路OP-agg 610和OpenID IdP 飼服器(OPSF) 612。用戶602可包括無線設備(例如 WTRU),與無線設備相關聯的用戶,和/或在無線設備上 執行的應用。流覽器604可包括網頁流覽器或正在無線設 備上執行的其他應用。本地〇p 606可以是本地駐留在無 線設備上的實體,其充當駐留在無線設備通信外部的〇p 的代理例如網路〇P-agg 610。本地〇P 606可與駐留在 10013373#單編號 A0101 第23頁/共1〇〇頁 1013091673-0 201225697 無線設備上的SCWS相關聯。網路〇P-agg 610是位於本地 所駐留的無線設備外部的〇p。例如’網路OP-agg 61 0 可以是與MN0相關聯的OP,例如ΜΝ0主辦的網頁伺服器。 ()pSF612還可與MN0相關聯,例如與MN0相關服務。 如第6A和6B圖所示,在614,用戶602可使用流覽器604 訪問與RP 608相關聯的網站。在616,流覽器604可發送 消息給RP 608,所述消息包含身份(例如’ OpenlD身份 URL)。所述消息可以是例如HTTP消息。RP 608可在 618發送發現消息(例如,HTTP GET身份頁面消息)給 網路〇P-agg 610。作為回應,RP 608可在620接收0PSF 位址。在622,RP 608可生成臨聘標誌和/或會話識別字 。RP 608可在624發送重定向消息(例如,HTTP重定向 消息)給流覽器604。在624的的重定向消息可包括參數 ’所述參數包括在622生成的臨時標誌和/或會話識別字 用戶602、流覽器604和本地0P 606可在能夠與網路通信 的無線設備(例如WTRU)執行本地鑑別。在626,流覽器 604可執行本地DNS查找。例如,DNS查找可用於找到本Ground 0P 606, RP 608, Network OP-agg 610 and OpenID IdP Feeder (OPSF) 612. User 602 can include a wireless device (e.g., a WTRU), a user associated with the wireless device, and/or an application executing on the wireless device. The browser 604 can include a web page browser or other application being executed on a wireless device. The local 〇p 606 may be an entity residing locally on the wireless device that acts as a proxy for the 〇p that resides outside of the wireless device communication, such as the network 〇P-agg 610. The local 〇P 606 can be associated with SCWS residing on the 10013373#single number A0101 page 23/total 1 page 1013091673-0 201225697 wireless device. The network 〇P-agg 610 is located outside the wireless device where the local device resides. For example, 'network OP-agg 61 0 may be an OP associated with MN0, such as a web server hosted by ΜΝ0. The ()pSF 612 may also be associated with MN0, such as a service associated with MN0. As shown in FIGS. 6A and 6B, at 614, the user 602 can access the website associated with the RP 608 using the browser 604. At 616, browser 604 can send a message to RP 608, which contains the identity (e.g., 'OpenlD Identity URL). The message can be, for example, an HTTP message. The RP 608 can send a discovery message (e.g., an HTTP GET identity page message) to the network 〇P-agg 610 at 618. In response, RP 608 can receive the 0PSF address at 620. At 622, the RP 608 can generate a predecessor flag and/or a session identification word. The RP 608 can send a redirect message (e.g., an HTTP redirect message) to the browser 604 at 624. The redirect message at 624 can include a parameter 'The parameter includes the temporary flag generated at 622 and/or the session identifier user 602, the browser 604, and the local OP 606 can be in a wireless device capable of communicating with the network (eg, The WTRU) performs local authentication. At 626, the browser 604 can perform a local DNS lookup. For example, DNS lookup can be used to find this
地0P 606。例如,可如這裏所述執行DNS查找。流覽器 604可在628發送消息(例如,HTTP GET消息)給本地 0P 606,所述消息包括從RP 608中接收的參數集。在 630,本地〇p 606可發送鑑別頁面給流覽器604,所述頁 面可被顯示給用戶602。用戶602可在632輸入鑑別資訊 (例如,鑑別憑證),並且流覽器604可在634接收鑑別 資訊(例如,鑑別憑證)。流覽器604可在636向本地0P 606發送鑑別資訊(例如,鑑別憑證)。在638,本地0P 10013373# 單編號 A0101 第24頁/共100頁 1013091673-0 201225697 606可驗證所述鑑別資訊(例如,鑑別憑證)。在“〇, 本地OP 606可生成唯一的、隨機的關聯控制碼Α。函數f 可以是簡單函數,因為s可能不能與RP 6〇6或用戶6〇2共 用。在642,本地0P 606可基於關聯控制碼A的函數和與 0PSF 61 2關聯的長期共用機密或會話密鑰κ (例如, )來計算簽名密鑰S (例如,Kasc)。對於關聯控制碼a 和/或簽名密鑰S的認識可能不能暴露會話密鑰本地〇p 606可在644使用簽名密鑰s (例如,Kasc)來計算簽名 。所述簽名也可在644被包含在身份聲明上。本地〇pGround 0P 606. For example, a DNS lookup can be performed as described herein. The browser 604 can send a message (e.g., an HTTP GET message) to the local 0P 606 at 628, the message including the set of parameters received from the RP 608. At 630, the local 〇p 606 can send an authentication page to the browser 604, which can be displayed to the user 602. User 602 can enter authentication information (e.g., authentication credentials) at 632, and browser 604 can receive authentication information (e.g., authentication credentials) at 634. The browser 604 can send authentication information (e.g., authentication credentials) to the local 0P 606 at 636. At 638, local 0P 10013373# single number A0101 page 24/100 pages 1013091673-0 201225697 606 can verify the authentication information (eg, authentication credentials). In "〇, the local OP 606 can generate a unique, random association control code. The function f can be a simple function, since s may not be shared with RP 6〇6 or user 6〇2. At 642, the local 0P 606 can be based on The function of the associated control code A and the long-term shared secret or session key κ (eg, ) associated with the 0PSF 61 2 are used to calculate the signature key S (eg, Kasc). For the associated control code a and/or the signature key S The recognition may not expose the session key local 〇p 606 may use a signature key s (e.g., Kasc) to calculate the signature at 644. The signature may also be included in the identity statement at 644. Local 〇p
J 606可在646發送重定向消息(例如,http重定向消息) 到流覽器604。所述重定向消息可包括參數,所述參數包 括在644由本地0P 606計算的簽名和/或身份聲明。 流覽器604可在648向RP 608發送消息(例如,HTTP GET消息)’所述消息可以包括從本地op 606中接收的 參數。例如,所述參數可包括由本地0P 606計算的簽名 和/或身份聲明。RP 608可直接與0PSF 612通信。例如 ,RP 608可在650向OPSF 612發送關聯消息(例如, POST消息)。在650的消息可例如經由HTTP和/或公共網 際網路被發送。關聯消息還可包括參數,所述參數包括 由本地0P 606計算的簽名。0PSF 612可在652從參數中 提取關聯控制碼A,並計算簽名密鑰S (例如,Kasc )。 在654, 0PSF 612可使用計算出的簽名密鑰S(例如,J 606 can send a redirect message (e.g., an http redirect message) to browser 604 at 646. The redirect message may include parameters including a signature and/or an identity claim computed at 644 by the local 0P 606. The browser 604 can send a message (e.g., an HTTP GET message) to the RP 608 at 648. The message can include parameters received from the local op 606. For example, the parameters may include signatures and/or identity claims calculated by local 0P 606. The RP 608 can communicate directly with the 0PSF 612. For example, RP 608 can send an association message (e.g., a POST message) to OPSF 612 at 650. The message at 650 can be sent, for example, via HTTP and/or a public internet. The associated message may also include parameters including the signature computed by the local 0P 606. The 0PSF 612 may extract the associated control code A from the parameters at 652 and calculate the signature key S (e.g., Kasc). At 654, the 0PSF 612 can use the calculated signature key S (eg,
Kasc)來驗證由本地〇P 606計算的簽名。在656,0PSF 612可向RP 608指示所述簽名是有效的。RP 608可在 658確定用戶602的身份是有效的,並在660在流覽器604 上顯示頁面(例如’ HTML頁面)。在662,流覽器604可 10013373#單編號 A〇101 第 25 頁 / 共 1〇〇 頁 1013091673-0 201225697 向用戶602指示該用戶在Rp 608登錄。 在一個示例性實施方式中,在這裏所述的供應階段和/或 鑑別階段中生成的密錄可被綁定到網路鐘別。例如,在 供應階段和/或鑑別階段生成的密鑰可從網路鑑別密鑰中 導出。根據一個實施方式,本地OP提供的本地身份聲明 可被擴展為融入到鑑別和密鑰協議協定中。例如,Kasc) to verify the signature calculated by the local 〇P 606. At 656, the 0PSF 612 can indicate to the RP 608 that the signature is valid. The RP 608 can determine 658 that the identity of the user 602 is valid and display the page (e.g., an ' HTML page) on the browser 604 at 660. At 662, the browser 604 can be 10013373#single number A〇101 page 25 / total 1 page 1013091673-0 201225697 indicates to the user 602 that the user is logged in at Rp 608. In an exemplary embodiment, the cc records generated in the provisioning phase and/or the authentication phase described herein may be bound to a network clock. For example, keys generated during the provisioning phase and/or the authentication phase can be derived from the network authentication key. According to one embodiment, the local identity assertion provided by the local OP can be extended to incorporate into the authentication and key agreement protocol. E.g,
Open ID/GBA可用於供應階段,以在—個協定實施方式中 建立長期機密。在另一個示例性實施方式中,協定可以 與其他鑑別協定整合,所述其他鑑別協定可使得在設備 (或安全模組’例如智慧卡)和網路中建立密餘,從而 其可由本地0P使用(例如,在安全模組和/或設備上)。 這可以是來自初始鑑別或密鑰協議協定的密鑰或從這些 密鑰中導出的密鑰。這些協定可包括例如AKA、基於IMS 的鑑別’和/或其他鑑別和密鑰協議協定。 鑑別和密鑰協議協定可在安全模組中發生,例如UICC, USIM或基於智慧卡和/或基於ME八終端的環境。協定流可 包括初始供應階段和/或鑑別階段,其中所述提供可在給 定的時間週期内發生一次,而在從提供階段導出的密鑰 有效時,鑑別階段可用於後來的每個鑑別。 在一個示例性實施方式中,消息流可在用戶登錄到砂時 (例如用戶第一次登錄到RP上時)作為供應階段被執行 。例如,流覽器代理(BA)可發送用戶提供的識別字給 RP。所述用戶提供的識別字可被標準化。例如,用戶提 供的識別字可如Open ID規範(TR 33. 924 )的附錄a. 1 中所描述的那樣進行標準化。RP可獲取OpenlD提供方( 10013373^^'^ 0P)的位址,並執行終端用戶希望使用的用於鑑別的〇p A0101 第26頁/共1〇〇頁 1013091673-0 201225697 端點URL的發現(基於用戶提供的識別字)°RP和網路OP 可建立共用機密(例如,關聯)。根據一個示例,可使 用迪菲-赫爾曼(Diffie-Hellman)密鑰交換協定來建 立所述共用機密。例如’該共用機密可使網路0P能夠保 護和/或驗證隨後的消息。 RP可使用OpenID鑑別請求將BA重定向到0P,該鑑別請求 可以例如是在OpenlD規範的第九章中所描述的Open II)鑑 別請求。在重定向後,BA可發送請求(例如,HTTP GET 請求)到網路0P/NAF。所述請求(例如,HTTP GET請求 )可包含本地聲明的指示。這可完成來用於例如向網路 0P/NAF指示本地身份聲明能得到支持。在另一個示例性 實施方式中,在0P/NAF基於用戶提供的識別字決定使用 本地身份聲明時,BA可避免發送請求(例如,HTTP GET 請求)。 NAF可發起UE鑑別,並用質詢(challenge)進行回應來 請求UE使用具有GBA的摘要鑑別。例如,NAF可發起UE鑑 ^ 別,並用HTTPS回應碼401 “未授權”進行回應,所述Open ID/GBA can be used in the provisioning phase to establish long-term confidentiality in a negotiated implementation. In another exemplary embodiment, the agreement may be integrated with other authentication protocols that may enable the establishment of a secret in the device (or security module 'eg smart card) and the network so that it can be used by the local 0P (for example, on a security module and/or device). This can be a key from an initial authentication or key agreement agreement or a key derived from these keys. These agreements may include, for example, AKA, IMS based authentication' and/or other authentication and key agreement protocols. Authentication and key agreement agreements can occur in security modules, such as UICC, USIM or smart card based and/or ME eight terminal based environments. The protocol flow may include an initial provisioning phase and/or an authentication phase, wherein the provisioning may occur once within a given time period, and the authentication phase may be used for each subsequent authentication when the key derived from the provisioning phase is valid. In an exemplary embodiment, the message flow may be performed as a provisioning phase when the user logs into the sand (e.g., when the user first logs into the RP). For example, a browser agent (BA) can send a user-provided identification word to the RP. The user-provided identification word can be standardized. For example, the user-provided identification word can be standardized as described in Appendix A.1 of the Open ID specification (TR 33.924). The RP can obtain the address of the OpenlD provider (10013373^^'^0P) and execute the discovery of the endpoint URL that the end user wishes to use for authentication 〇p A0101 Page 26/Total 1 page 1013091673-0 201225697 (Based on the user-provided identification word) °RP and network OP can establish a shared secret (for example, association). According to one example, the Diffie-Hellman key exchange protocol can be used to establish the shared secret. For example, the shared secret enables the network OP to protect and/or verify subsequent messages. The RP may redirect the BA to OP using an OpenID authentication request, which may for example be an Open II) authentication request as described in Chapter 9 of the OpenlD specification. After the redirect, the BA can send a request (eg, an HTTP GET request) to the network OP/NAF. The request (eg, an HTTP GET request) may include an indication of a local claim. This can be done to indicate support for local identity claims, for example, to the network 0P/NAF. In another exemplary embodiment, the BA may avoid sending a request (e.g., an HTTP GET request) when the OP/NAF decides to use the local identity assertion based on the user-provided identifier. The NAF may initiate UE authentication and respond with a challenge requesting the UE to use digest authentication with GBA. For example, the NAF may initiate a UE authentication and respond with an HTTPS response code 401 "Unauthorized",
Q HTTPS回應碼可包含攜帶請求UE使用具有GBA的摘要鑑別 的質詢的報頭(例如,WWW鑑別報頭)。在一個示例性實 施方式中,具有GBA的摘要鑑別可如具有伺服器端證書的 TS 33. 222中所指定的那樣發生。如果沒有有效的Ks是 可用的,那麼UE可用BSF進行引導,其會造成UE佔有有效 網路密鑰Ks。從上述過程,UE可導出特定應用,例如特 定OpenID,臨時密錄(例如,Ks_(ext/int)_NAF密鑰 )。在一個示例性實施方式中,UE可如TS 33. 220中所 描述的用BSF進行引導。 10013373#單編號 A0101 第27頁/共100頁 1013091673-0 201225697 如果沒有有效的RP特定會話密餘(例如,κ…是可 ,賴崎料密W,Ks」ext/int)N_ 鑰)中導出會話密鑰(例 1如’Krp) ’這會導致肫對有效 RP特定會話密錄(例如The Q HTTPS response code may contain a header (e.g., a WWW authentication header) carrying a challenge requesting the UE to use digest authentication with GBA. In an exemplary embodiment, digest authentication with GBA may occur as specified in TS 33.222 with a server-side certificate. If no valid Ks is available, the UE can boot with the BSF, which causes the UE to occupy a valid network key Ks. From the above process, the UE can derive a specific application, such as a specific OpenID, a temporary secret record (for example, Ks_(ext/int)_NAF key). In an exemplary embodiment, the UE may be booted with the BSF as described in TS 33.220. 10013373#单号A0101 Page 27 of 100 1013091673-0 201225697 If there is no valid RP specific session allowance (for example, κ... is OK, Lai Saki W, Ks "ext/int) N_ key) is derived Session key (example 1 such as 'Krp) 'This will result in a specific session secret for a valid RP (eg
Rrp)的佔有。在一個示例性實 施方式中,臨時密鑰(你n τ, 、 J如,Ks_(ext/int)_NAF密鑰 )可以是OpenID特定臨時密鑰(例如,The possession of Rrp). In an exemplary embodiment, the temporary key (your n τ, J, Ks_(ext/int)_NAF key) may be an OpenID specific temporary key (eg,
Ks_(ext/lnt)_JAF密輪)。所導出的會話密錄(例如 ,κΓΡ)可以是臨界安全(security心㈣)的, 以及密錄導出過程。例如,如果某人從簽名密矯(例如 _巾‘不能導出’會話密输(例如,Krp),那麼鑑 別方案會因為該特別的0P_UE信任關係而被破壞。因此, 可實施安全條款,例如導出的會話密輪(例如,的)可 以不產生關於其從中導的所用的Ks的任何資訊之條款。 此外’隱含的實現可用于在安全執行環境(SEE)(例如 UICC或TrE)中保持和使用會話密鑰(例如,κ…。 UE可生成至NAF的請求(例如,HTTp GET請求)。所述 請求可攜帶包含從BSF接收的引導事務識別字(B TID) 的鑑別報頭。在-個示例性實施方式中,如果使用了 push (推送),則不能從BSF接收到B_TID,但是Gpi的 可包含代替B-TID的可被使用的p_tid ^通過使用 B-TID和NAF_ID,NAF可獲取共用的應用特定NAF密鑰以 及可選地來自BSF在基於網頁服務的zn參考點上的uss ( 如果GBA—ϋ即臨時密鑰(例如,Ks_(ext/int)—NAF)被 使用,那麼可支援GUSS)。在一個示例性實施方式中, 這可根據關於通用鑑別結構(GAA)和基於Diameter協 定的Zh和Zn介面的TS 29. 1 09來執行。此外,NAF可存 1013091673-0 10013373#單編號A〇101 第28頁/共1〇〇頁 201225697 儲B-TID、加密密錄和用戶提供的識別字來允許匹配 OpenID用戶會話和GBA會話。根據一個示例性實施方式 ,由於OpenID可以是基於HTTP的,對於交互情形中基於 網頁服務的Zn參考點的NAF/OpenID伺服器支援可如TS 29. 1 09中所指定的那樣。例如,它可支持Zn參考點的基 於Diameter的實現。如果沒有有效的RP特定會話密鑰( 例如,Krp)可用,則NAF可從OpenID特定臨時密餘(例 如,Ks_(ext/int)_NAF密鑰)中導出會話密鑰(例如 ,Krp) ’這會造成NAF佔有如這裏所述的由UE佔有的相 同的有效RP特定會話密錄(例如,Krp)。對KDF的相同 實現可如這裏所述一樣適用。 NAF/ΟΡ可針對OpenID鑑別用戶。所述NAF可將流覽器重 定向到返回的OpenID位址。例如,0P可將ME的流覽器重 定向回RP,該RP有鑑別被批准的聲明或鑑別失敗的消息 。回應報頭可包含多個定義鑑別聲明的攔位,所述鑑別 聲明可由0P和RP之間的共用機密來保護》能得到保護的 條件可以是0P和RP沒有都駐留在相同〇網路中^ NAF可 用2 0 0 0K消息進行回應。在一個示例性實施方式中, NAF/ΟΡ可使用關於通用鐘別結構(gAA)和使用https的 網路應用功能接入的TS 33 222第5 3節來鑑別用戶。 RP可確認所述聲明。例如,Rp可檢查所述鑑別是否被批 准。已鑑別的用戶身份可在回應消息中提供給Rp。如果 如這裏所述,共用機密(關聯)被建立,那麼它可用於 驗證來自0P的消息。如果對聲明的確認和消息的驗證( 如果使用了共用密錄)是成功的,那S用戶可登錄到RP 的服務中。 1013091673-0 10_一單编號删1 第29頁/共咖頁 201225697 在一個示例性實施方式中’當操作者部署GBA push,而 不是GBA時’ ΜΝ0希望建立共用機密。例如,這裏描述的 實施方式可以由GBA憑證push消息代替,並且協定可如這 裏所述繼續進行。在一個示例性實施方式中,可如2 〇】j 年2月9日申凊的名稱為Method and Apparatus f〇r Trusted Federated Identity的美國非臨時中請N0 13/023, 985號中描述的那樣建立共用密鑰。 第7圖示出了用於具有本地身份聲明的鑑別階段的操作流 的示例性實施方式。在一個示例性實施方式中,第7圖中 示出的消息流可在用戶登錄到RP上時被執行,例如在用 戶首次登錄時。第7圖中示出的實體包括BSF 702,UE 704,網路0P/NAF 706和RP 708 °ϋΕ 704可包括流覽 器代理(ΒΑ)和/或能夠與RP 708通信的其他應用。 如第7圖所示,UE 704可在710向RP 708發送用戶提供 的識別字。所述用戶提供的識別字可被標準化。在一個 示例性實施方式中,用戶提供的識別字可如OpenlD規範 的附錄A. 1中描述的那樣進行標準化。在712,RP 708可 獲取OpenlD提供方(0P) 706的位址。RP 708還可基於 用戶提供的識別字執行0P端點URL的發現,所述終端用戶 希望使用所述0P端點URL來用於鑑別。在714,RP 708和 0P/NAF 706可建立關聯。例如,可如OpenlD規範的第8 章所述的那樣建立所述關聯。所述關聯可由唯一的關聯 控制碼和0P/NAF 706生成的共用會話密鑰來識別。 0P/NAF 706可從會話密鑰(例如,Krp)和關聯控制碼 中導出共用的簽名密鑰(例如,Kasc)。簽名密鑰(例 如,Kasc)可遵循一個規範。例如,簽名密鑰可遵循用 10關73产單編號廳01 第30頁/共100頁 1013091673-0 201225697 於OpenID MAC簽名密錄的規範。例如,Kasc可以是用於 HMAC-SHA1或HMAC-SHA256的有效密錄(如在關於智慧 卡和CAT應用的傳輸協定的ETSI TS 1 02 127的第6章中 所指定的那樣)。所述密錄簽名密錄(例如,Kasc)和 關聯控制碼可在714被傳遞給RP 708。 在使用OpenID時,關聯可用於為簽名和簽名驗證過程在 0P/NAF 706和RP 708之間建立共用的機密簽名密餘。 該共用的機密簽名密錄可以是例如在OpenID中所指定的 用於HMAC-SHA1或HMAC-SHA256的有效密餘。在—個示 例性實施方式中,迪菲-赫爾曼密鑰交換協定之外的協定 可用于建立機密。例如,所述機密可依賴於迪菲-赫爾曼 密餘交換協定之外的協定’並可從迪菲-赫爾曼密錄交換 之外的協定中導出。在迪菲-赫爾曼過程中建立的密錄可 用於加密共用的機密(在其從0P/NAF 706傳遞到Rp 7〇8 時)。例如,共用的機密可在0P/NAF 706生成共用機密 時使用迪菲-赫爾曼過程進行加密。.在另一個示例性實施 方式中,在RP 708和0P/NAF 706之間的TLS保護通信時 ,共用的機密可以純文本(plain text)進行發送。 簽名密鑰(例如,Kasc )可被建立作為共用機密,並可 從關聯控制碼和會話密鑰(例如,Krp)中導出◊這可以 使用本領域已知的任何適當演算法實現。此外,0P/NAF 706可生成關聯控制碼並選擇唯一和隨機的關聯控制碼。 導出的簽名密餘(例如,Kasc)和密論導出過程可以是 臨界安全的。例如,如果某人從簽名密鑰(例如Kasc ) 中‘不能導出’會話密鑰(例如,Krp),那麼鑑別方案 會因為該特別的UE-RP信任關係而被破壞。因此,可實施 1(m3373#單編號A0101 第31頁/共100頁 1013091673-0 201225697 安全條款,例如導出的簽名密鑰(例如,Kasc)可不產 生關於使用的會話密餘(例如,Krp)(其從中導出)的任 何資訊之條款。 RP 708可用鑑別請求(例如,〇peniD鑑別請求 )將卯704重定向到0P/NAF 7〇6。例如,Rp 7〇8可使 PenID規範第9章中定義的〇penII)鑑別請求。在 704可導出與在714在〇p/naf 706和RP 708之間 所建立的相同的關聯特定簽名密錄(例如,Kasc)。關 聯特疋簽名歸(例如,Kase)可從會話密錄(例如, Krp)和包含在鑑別請求中的關聯控制碼中導出。在一個 示例性實施方式中,可隱含實施來保持和使用安全實體 中的簽名密錄(例如,Kasc),例如SEE、UICC或TrE。 對於簽名密餘(例如,Kasc)的安全風險比對於會話密 鑰(例如,Krp)的低,因為簽名密錄(例如,可 例如用於一次鑑別。 在720,IIE 704可隨鑑別被批准的聲明將流覽器重定向 到RP 708處的返回位址(例如,〇penID位址)。回應可 包括定義可由共用機密簽名密鍮(例如,Kasc)保護的 鑑別聲明的參數。例如,響應報頭可包含定義可由共用 機密簽名密鍮(例如,Kasc)保護的鑑別聲明的多個欄 位。RP 708可使用簽名密鑰(例如,Kasc)在722確認 身份聲明有效。例如,RP 708可通過檢查聲明消息的對 應欄位中的簽名來檢查所述鑑別是否被批准。已鑑別的 用戶身份可在回應消息中被提供給Rp 7〇8。如果聲明的 確5忍和消息的驗證是成功的,那麼用戶可登錄到Rp 7〇8 的服務。 1013091673-0 10013373#單編號A〇101 第32頁/共100頁 201225697 如這裏所述,在某些示例性實施方式中,本地身份聲明 提供方,例如本地op ’可與不同的密鑰協議和鑑別協定 整合。 第8圖示出了用於供應階段的操作流的示例性實施方式。 在一個示例性實施方式中,供應階段可在給定的時間週 期内執行一次,而在從供應階段導出的密鑰有效時,鑑 別階段可用於後來的每個本地鑑別。在供應階段被發起 之前,沒有共用機密(例如,用於OpenlD)可在網路和 本地0P之間被建立。在供應階段之後,本地〇P和網路( 例如,0PSF)可以擁有長期共用機密,例如表示為Rp特 定會話密錄(例如,Krp)的機密。 如第8圖所示,在802,設備和網路可具有用於設備和網 路之間的鑑別和密鑰協議協定的共用機密密鑰K 808。如 804所示,設備處的本地〇p和網路處的op”可能沒有用 於OpenlD的共用機密。在806,設備和網路可使用共用 機选K 808參與鑑別和密錄協議協定。在成功的協定運行 之後,網路和設備可在810中擁有臨時密鑰Ktmp 816 ( 例如,Ks一NAF,CK/IK等)。在812,設備讦執行生成 RP特定會話密鑰(例如’ Krp) 818的内部密鍮導出函數 。在814,網路(例如,0PSF)密鑰導出函數還可生成 RP特定會話密鑰(例如,Krp) 818。所述會詁密鑰(例 如’ Krp) 818可例如基於臨時密鑰(例如,Ktmp) 816 在設備和網路兩者處被生成。 第9圖示出了用於鑑別階段的操作流的另一個示例性實施 方式。在一個示例性實施方式中,如果機密會話密鑰( 例如,Krp)已經在網路和設備之間建立,則町執行所述 1013091673-0 10013373#單編號删1 第33頁/共100頁 201225697 鑑別階段。基於在網路 的RP特定機密會話密鑰 特定機密或密鑰(例如 來簽署身份聲明。 (例如’ 0PSF)和設備之間共用 (例如,Krp),簽名和/或關聯 lasc)可由本地0P生成和/或用 可作為密鑰協議協定的輪出的任何臨時密 mp (例如’ Ks_(lnt/ext)—NAF)可用於導出密鑰 ’例如可用於鑑別(例如,—Π)鑑別)的會話密錄( 例如,Krp)和簽名密錄(例如,—c)。 斯乐y圖所示 如第9圖所不’在9Q2,設備和網路已經建立了 RP特定共 用會話讀(例如,Krp),例如如第8圖中所示的。在 9〇4,叩和網路可參與關聯建立(例如,〇__聯建 其了由唯的關聯控制碼和網路和/或網路〇p生成 的共用密賴別。網路和/或網路Gp可在91G使用密錄導 出函數來導出可用於鑑別的簽名密鑰(例如,Kasc) 912 例如,搶鑰導出函數可使用會話密鑰(例如,Krp ) 9〇6和關聯控制碼9〇8來導出簽名密鑰(例如, 912。 簽名密鑰(例如’ Kasc)可在914用於Rp和網路之間的 關聯機密交換。RP可在916發送關聯控制碼9〇8和鑑別請 求給設備上的本地OP。所述本地OP可在918從使用會話密 鑰(例如,Krp) 906和關聯控制碼908的功能中導出簽 名密鑰(例如,Kasc) 912。在920,本地〇p可使用簽名 密鑰(例如,Kasc) 912來簽署身份聲明。所述簽署的身 份聲明可以是(例如經由流覽器)從用戶接收的身份聲 明。RP可在922使用由網路和/或網路〇p導出的簽名密鑰 (例如,Kasc) 912來驗證由本地〇p用簽名密鑰(例如 1013091673-0 10013373#單編號A0101 第34頁/共1〇〇頁 201225697 ,Kasc)簽署的身份聲明。在924,用戶可在RP登錄到 服務。 在一個示例性實施方式中,在AKA運行成功之後,可通過 使用在設備(和/或智慧卡)和網路中建立的CK/IK來整 合AKA。可通過使用適當的密鑰導出函數從CK/IK中導出 會話密鑰(例如,Krp)來將建立的AKA密鑰提供給設備 上的本地0P (例如,在設備的安全模組或智慧卡上)。 所述CK/IK可輸入給密鑰導出函數(類似於第8圖示出的臨 時密錄Ktmp (例如,Ks_(ext/int)_NAF))。這會造成 網路(例如,0PSF)和設備(例如,本地OP)擁有用於 RP的相同會話密鑰(例如,Krp)。一旦建立了會話密鑰 ,則其可如第9圖所示那樣被使用。此外,可使用其他協 定,例如基於IMS的鑑別方法或其他鑑別和密鑰協議協定 這裏使用的術語智慧卡(SC)或安全模組描述了設備上 任何可信任環境,例如積體電路卡(ICC)或USIM,其可 提供一組安全操作設施。根據一個實施方式,UICC可以 是SC用於保持移動設備中使用的網路鑑別憑證(例如, GSM/UMTS)的位置。智慧卡網頁伺服器(SCWS)應用可 以是由例如開放移動聯盟(0ΜΑ)定義的SCWS。所述 SCWS不限制為在UICC中使用,且依賴于卡發行方的喜好 可用于任何其他智慧卡。駐留在安全元件内部的0P實體 的使用OpenID的本地用戶鑑別可擴展到任何其他SC,例 如通用SC。 此外,可提供類似介面和/或用於臨界安全的實施方式的 受保護執行的任何其他安全環境可以是用於這裏所述的 1013091673-0 1()()13373#單編號 A0101 第 35 頁 / 共 100 頁 201225697 實施方式的實施目標。 基於對使用sews和因此用戶鑑別的實施方式可使則似 的評估,可制料彳⑷目關者(stakehGlder)模式 的另外的實施方式。 在示例性實施方式巾,_可充當完全的身份提供方。 ΜΝ0可主辦(host)作為網頁服務的卯_邱§、卯讣發現 和/或關聯點實體。此外,麵還可職應用隨用戶身份 一起提供給UICC。 在示例性實施方式中’用戶可具有註冊到第三方〇p的現 有OpenID識別字,例如myopenid c〇m。MN〇不再充當面 向用戶的服務提供方。ΜΝ0可傳輪資料,並允許第三方〇p 在uicc上安裝op應用和/或將其#scws應用相關聯。第 二方0P可建立與ΜΝ0的業務關係。mn〇還可授權第三方〇p 达端管理0P應用的權利。ΜN0可針對所述服務向第三方〇p 收費,並形成收益。 在另一個示例性實施方式中,這裏將進一步描述,第三 方0P和/或ΜΝ0可與全球平臺(GP)相容智慧卡交互作用 在示例性實施方式中,這畏描述的概念可在非移動情形 中實現,例如由銀行簽發的SC。所述SC可由〇peniD身份 提供方使用來安裝0P應用。例如,銀行卡可主辦NFC訂票 應用和/或OpenID鑑別〇P應用。在這種非移動情形中, 可以沒有關於SC可通信的設備類型的已有知識》可能經 由本地鏈路、SC讀卡器、NFC通信介面等等在SC的USB連 接上建立TCP/IP。所述SC可配備有可例如由外部終端獲 得的SCWS。 1013091673-0 單編號删1 第36頁/共100頁 201225697 根據一個實施方式,設備可包含主辦SCWS的sc。想要接 入RP網站的0P應用可能不在相同的設備上。根據該實施 方式,SC可用作外部鑑別權杖。這些拆分的終端的情況 可與這裏描述的不同利益相關者模式相結合。 Ο 在一個示例性實施方式中,用戶可擁有移動設備,其配 備有安裝了 sews和本地0P的UICC。用戶可使用可能是不 同於移動設備的設備的流覽器代理(BA)來接入在RP處 的期望頁面。在BA訪問RP並提交識別字(例如,本地 (^61111)識別字)來登錄時,1^可將5人重定向到本地0?。 例如,RP可將BA重定向到本地〇p的URL。如這裏所述, Ο 從RP到BA的重定向消息(例如,HTTP重定向消息)可包 含用於本地0P應用計算聲明消息上的簽名的資訊。該消 息的内容可被轉達到移動設備和/或SC上的本地0P。本地 0P可在移動設備上將鑑別頁面顯示給用戶,並且用戶可 授權和/或鑑別該登錄。本地0P可簽署身份聲明消息。簽 署的身份聲明消息可發送回RP,其可替換地可由BA完成 。所述RP可驗證簽名,且用戶/BA可在RP登錄。 在一個示例性實施方式中,BA可能建立到移動設備的本 地鏈結,例如經由藍芽或WLAN的鏈路,並將所述設備註 冊為主辦0P的設備。流覽器可經由可將重定向轉發到本 地0P和/或SCWS的本地鍵路將重定向發送到移動設備。本 地0P可向用戶要用戶憑證^所述用戶可使用移動設備面 向0P進行鑑別。用戶可使用例如密碼、PIN、生物識別( biometrics)和/或任何其他形式的鑑別來進行鑑別。 本地0P可簽署聲明消息和/或經由本地鏈路將聲明消息轉 發給BA。BA可使用該消息來面向RP進行鑑別。在該實施 10013373^·單編號 A0101 第37頁/共1〇〇頁 1013091673-0 201225697 方式中’ BA可充當例如rp和移動設備之間的MITM。由於 用戶知道用戶發起了該〇penID會話’因此用戶能夠檢測 移動設備上的未授權的請求。 第1 0圖示出了用於拆分的終端情形的協定流的示例性實 施方式。如第1〇圖所示,本地〇p 1〇〇2、用戶/移動設備 1 004和/或用戶/BA 1〇〇6之間的通信可經由本地鏈路發 生。 第10圖中示出的實體包括本地〇P 1〇〇2、用戶/移動設備 1 004、用戶/BA 1 006、RP 1008和網路0P 1〇1〇。本地 0P 1002和用戶/移動設備1〇〇4可被包括在相同的無線設 備中和/或與所述相同的無線設備相關聯,例如WTRU。本 地0P 1002可以疋本地駐留在無線設備上或與無線設備本 地關聯的實體,而該無線設備充當駐留在無線設備之外 的網路0P (例如網路0P 1010)的代理。本地0P 可與駐留在無線設備上的SCWS相關聯。網路〇p 1〇1〇可 以疋在6又備外部的0P,本地0P 1002駐留在所述設備上 或與其本地關聯。例如,網路1 〇丨〇可以是與相關 聯的0P。 在1012,用戶/BA 1006可發送登錄請求給RP 1008。根 據一個實施方式’可使用〇penID來做出登錄請求。在 1014,RP 1〇〇8和網路〇p 1〇1〇可執行網路上的〇p飼服 器的發現。所述發現可例如基於〇penlD身份被執行。Rp 1008可在1016發送關聯請求到網路〇p Rp 可在1018從網路〇p 1 〇 1 〇中接收關聯回應。所述關聯回 應可包括關聯控制碼A和/或簽名密鑰S (例如,Kasc)。 在1 020’RP 1〇〇8可發送重定向消息到用戶/BA 10013373#單編號A〇101 第38頁/共100頁 1 006 〇 1013091673-0 201225697 重定向消息可被配置為重定向設備上的流覽器到本地op 1 002。重定向消息具有包含關聯控制碼A的參數。 在1 022 ,用戶/移動設備1 004可與用戶/BA 1006建立本 地鏈路。用戶/BA 1 006可在1024發送對鑑別的本地請求 到本地0P 1 002。在1 026,本地鑑別可在本地0P 1002 和用戶/移動設備1 004之間被執行。例如,本地鑑別可如 這裏所述的那樣被執行。在1028,本地0P 1 002可發送 重定向消息到用戶/BA 1 006。重定向消息可重定向流覽 器到用戶/BA 1006。重定向消息可包括關聯控制碼A和/ 或簽署的參數。在1030 ’用戶/BA 1 006可發送請求到RP 1008。所述請求可以是對RP 1 008處的服務的請求。所 述請求可包括來自本地0P 1002的簽署的聲明。基於來自 本地0P 1 002的簽署的聲明消息,RP 1008可指示用戶登 錄到RP 1008。例如,RP 1008可在1032顯示登錄的頁 面。 在一個示例性實施方式中,非移動SC可被使用和/或分發 給基於網頁的0P或另一個第三方,例如銀行。在非移動 SC被使用和/或分發時,可應用這裏所述的類似實施。例 如,非移動SC可類似於這裏所述的移動拆分終端的實施 方式的實施而被實施。例如,本地鏈路的建立可以是經 由外部智慧卡讀卡器和/或附著到電腦上的NFC (近場通 信)終端。介面可支援可發送到在SC上實施的〇p/scWS 的HTTP消息。 在一個示例性實施方式中,0P應用可在任何全球平臺( GP)相容SC上執行’例如GSM和/或UMTS網路中的uiCC ’並可容納不同的利益相關者模式。某些SC可以是GP使 1013091673-0 10013373#單編號A〇m 第39頁/共1〇〇頁 201225697 =,但是這裏描述的GPSC實施可映射到用於其他實施 方式的實施選擇,例如Java卡上的實於 GPSC可主辦一個或多個安全網域(sd),由此每㈣ 都可代表利益相關者和/或能夠存儲密餘 或為該利益相關者使應用個性化。 似用才 主SD可以是屬於卡發 3的發行.可按層次組織I财具有不同特權 内的内容。發行方如可具有授權管理⑽ =,並且能夠對卡進行自發控制,以及能夠術 二=1 或刪_。其他SD可被給,如果它們駐留 2別層次中。如果SD處於相同的層次則仙可 獲付=管理⑽)特權,其可以允許SD管理其亞層次 (―咖hy)中的卡内容。該仰執行的所有行動 2由發行方通過職進行授權,所賴杖可細沾提 供給發行方SDUSD),並可由ISD檢查。 可駐留在巾的Gp财的勒㈣使科信路徑( TP)的概念崎通信。TP相是分配給仙並允許它們 經由GP Open奶交換命令的特權。否則應用在Gp % 上被分開。 =11圖示出了安全_ (SD)層切利·實施方式。 文全網域層次包括發行方安全網域(ISD) 11G2、補充安 全網域⑽)11G4、SSD 和應用(Apps) 11〇8、 1110、1112和1114。ISD 1102可具有AM特權並且可 控制SD層次中的其他實體。ISD⑽可控制應用⑴味 1114 ’ 而 ISD 1102可將μ特權給SSD 1104#〇SSD 11〇6 。例如’SSD 11〇4可控制應用11〇8和111〇。 10013373#單編號 A0101 第12圖示出了安全網域(SD)層次的另 —個示例。SD層 第40頁/共1〇〇頁 1013091673-0 201225697 次具有基於權杖的網域管理。IDS 1102可驗證來自SSj) 1104和/或SSD 1106的權杖。該基於權杖的管理可使 SSD 1106能夠使用ISD 1102驗證的權杖來載入其自己 的應用1202。權杖驗證可使用這裏所述的基於權杖和/或 密鑰的驗證實施方式或類似的實施方式來執行。 依據在SC上如何執行SCWS,可應用不同的選擇而啟用不 同的利益相關者模式。 第13圖示出了使用網頁词服器(例如智慧卡網頁飼服器 (SCWS) 1310)而作為全球平臺(GP)應用的網域層次 的示例性實施方式。如第13圖所示,SCWS 131〇可被實 施為擁有的SD中的應用,例如由SC發行方擁有的iso 1302。ISD 1302可具有授權管理(AM)特權,並可自發 控制第13圖中示出的層次。應用提供方(例如,第三方 OP) SD (APSD) 1304可以是用於應用1308的汕,並且 具有管理OP應用1308的委託管理(⑽)特權。scws管理 代理SD (SSD) 1 306可以是用於SCWS 131〇的汕,並且 具有管理SCWS 1310的DM特權。 SCWS 1310可被實施為用於GP 1312的GP應用。MNO模式 、第二方OP模式和/或非MNO模式可得到支援^ 〇p的應用 邏輯可駐留在不同的SD中’例如APSD 1304。應用1308 可由APSD 1304擁有和/或管理,所述APSD 1304可以是 不同于擁有SCWS應用1310和網域的SSD 1306的實體。 應用1308和SCWS 1310可使用信任路徑能力進行通信 第二方和卡發行方必須同意執行該實施的業務關係。例 如,第三方和卡發行方必須授予SD和應用適當的特權。Ks_(ext/lnt)_JAF secret wheel). The derived session secret (eg, κΓΡ) can be critical security (security heart (4)), and the secret record export process. For example, if someone is not able to derive a session secret (eg, Krp) from a signature, then the authentication scheme will be corrupted due to the particular OP_UE trust relationship. Therefore, security terms can be enforced, such as export The session secret (for example) may not produce any information about any information about the Ks used by it. Furthermore, the implicit implementation may be used to maintain and in a Secure Execution Environment (SEE) such as UICC or TrE. A session key is used (eg, κ.... The UE may generate a request to the NAF (eg, an HTTp GET request). The request may carry an authentication header containing a Boot Transaction Identifier (B TID) received from the BSF. In an exemplary embodiment, if push is used, the B_TID cannot be received from the BSF, but the Gpi can include the p_tid that can be used instead of the B-TID. By using the B-TID and the NAF_ID, the NAF can acquire the share. Application-specific NAF key and optionally uss from the BSF at the web service-based zn reference point (if GBA—ϋ temporary key (eg, Ks_(ext/int)—NAF) is used, then support GU SS). In an exemplary embodiment, this may be performed according to the general authentication structure (GAA) and the TS 29.1 09 based on the Diameter protocol-based Zh and Zn interfaces. In addition, the NAF may store 1013091673-0 10013373# No. A 〇 101 Page 28 / Total 1 page 201225697 Store B-TID, encrypted secret and user-provided identification words to allow matching OpenID user sessions and GBA sessions. According to an exemplary embodiment, since OpenID can be based on HTTP, NAF/OpenID server support for web service-based Zn reference points in interactive scenarios can be as specified in TS 29.1 09. For example, it can support Diameter-based implementation of Zn reference points. A valid RP-specific session key (eg, Krp) is available, and the NAF can derive the session key (eg, Krp) from the OpenID specific temporary secret (eg, Ks_(ext/int)_NAF key) 'This will cause the NAF The same valid RP-specific session secret record (eg, Krp) occupied by the UE as described herein is occupied. The same implementation of KDF can be applied as described herein. NAF/ΟΡ can authenticate users for OpenID. The browser redirects to the returned OpenID address. For example, 0P can redirect the ME's browser back to the RP, which has a message identifying the approved claim or authentication failure. The response header can contain multiple definitions that define the authentication statement. Bit, the authentication statement can be protected by the shared secret between the 0P and the RP. The condition that can be protected can be that both the 0P and the RP do not reside in the same network. ^ NAF can respond with a 2K 0K message. In an exemplary embodiment, NAF/ΟΡ may authenticate the user using TS 33 222 section 53 on the Universal Clock Architecture (gAA) and the Network Application Function Access using https. The RP can confirm the statement. For example, Rp can check if the authentication is approved. The authenticated user identity can be provided to Rp in the response message. If a shared secret (association) is established as described herein, it can be used to verify messages from the OC. If the confirmation of the claim and the verification of the message (if a shared secret is used) is successful, the S user can log in to the service of the RP. 1013091673-0 10_A single number deletion 1 page 29 / common coffee page 201225697 In an exemplary embodiment 'When an operator deploys a GBA push instead of a GBA' ΜΝ 0 wishes to establish a shared secret. For example, the embodiments described herein may be replaced by a GBA voucher push message, and the agreement may proceed as described herein. In an exemplary embodiment, as described in the US Non-Provisional No. N0 13/023, No. 985, which is filed on February 9, 1999, is called Method and Apparatus f〇r Trusted Federated Identity. Establish a common key. Figure 7 shows an exemplary embodiment of an operational flow for an authentication phase with a local identity assertion. In an exemplary embodiment, the message flow shown in Figure 7 can be executed when the user logs in to the RP, such as when the user first logs in. The entities shown in Figure 7 include BSF 702, UE 704, Network OP/NAF 706 and RP 708 704 may include a browser agent (ΒΑ) and/or other applications capable of communicating with RP 708. As shown in FIG. 7, UE 704 can transmit a user-provided identification word to RP 708 at 710. The user-provided identification word can be standardized. In an exemplary embodiment, the user-provided identification word may be standardized as described in Appendix A.1 of the OpenlD specification. At 712, RP 708 can obtain the address of OpenlD Provider (0P) 706. The RP 708 can also perform discovery of the OPP endpoint URL based on the user-provided identification word that the end user wishes to use for authentication. At 714, RP 708 and 0P/NAF 706 can establish an association. For example, the association can be established as described in Chapter 8 of the OpenlD specification. The association may be identified by a unique associated control code and a shared session key generated by the OP/NAF 706. The 0P/NAF 706 can derive a common signature key (e.g., Kasc) from the session key (e.g., Krp) and the associated control code. A signature key (for example, Kasc) can follow a specification. For example, the signing key can follow the specification of the OpenID MAC signature in 10 levels 73, 73 numbering hall 01 page 30/100 pages 1013091673-0 201225697. For example, Kasc may be a valid cipher for HMAC-SHA1 or HMAC-SHA256 (as specified in Chapter 6 of ETSI TS 01 22 127 on the transport protocol for smart cards and CAT applications). The secret signature secret record (e.g., Kasc) and associated control code may be passed to the RP 708 at 714. When using OpenID, the association can be used to establish a shared secret signature secret between 0P/NAF 706 and RP 708 for the signature and signature verification process. The shared secret signature secret record may be, for example, an effective secret for HMAC-SHA1 or HMAC-SHA256 specified in OpenID. In an exemplary embodiment, an agreement other than the Diffie-Hellman key exchange protocol can be used to establish a secret. For example, the secret may depend on an agreement other than the Diffie-Hellman exchange agreement' and may be derived from an agreement other than the Diffie-Hellman secret exchange. A secret record created during the Diffie-Hellman process can be used to encrypt a shared secret (when it is passed from 0P/NAF 706 to Rp 7〇8). For example, the shared secret can be encrypted using the Diffie-Hellman process when the 0P/NAF 706 generates a shared secret. In another exemplary embodiment, when TLS protection communication between RP 708 and OP/NAF 706, the shared secret can be sent in plain text. The signing key (e.g., Kasc) can be established as a shared secret and can be derived from the associated control code and session key (e.g., Krp), which can be implemented using any suitable algorithm known in the art. In addition, OP/NAF 706 can generate an associated control code and select a unique and random associated control code. The derived signature secret (eg, Kasc) and secret export process can be critically secure. For example, if someone 'can't export' a session key (e.g., Krp) from a signing key (e.g., Kasc), the authentication scheme will be compromised due to the particular UE-RP trust relationship. Therefore, a security clause of 1 (m3373#single number A0101, page 31/100 pages 1013091673-0 201225697, such as an exported signature key (eg, Kasc) may be implemented without generating a session secret (eg, Krp) regarding usage (eg, Krp) The terms of any information from which it is derived. The RP 708 can redirect the 卯 704 to 0P/NAF 7〇6 using an authentication request (eg, 〇peniD authentication request). For example, Rp 7〇8 can be used in Chapter 9 of the PenID Specification. Defined 〇penII) authentication request. The same associated specific signature secret (e.g., Kasc) established at 714 between 〇p/naf 706 and RP 708 can be derived 704. The associated signature signature (e.g., Kase) can be derived from the session secret record (e.g., Krp) and the associated control code contained in the authentication request. In an exemplary embodiment, implicit implementation may be implemented to maintain and use signature secrets (e.g., Kasc) in a secure entity, such as SEE, UICC, or TrE. The security risk for signature secrets (eg, Kasc) is lower than for session keys (eg, Krp) because signatures are secretly recorded (eg, can be used, for example, for one authentication. At 720, IIE 704 can be approved with authentication) The statement redirects the browser to a return address at RP 708 (eg, a 〇penID address). The response may include defining parameters of an authentication statement that may be protected by a shared secret signature key (eg, Kasc). For example, the response header may Contains a plurality of fields that define an authentication statement that can be protected by a shared secret signature key (eg, Kasc). The RP 708 can validate the identity claim at 722 using a signing key (eg, Kasc). For example, the RP 708 can pass the check statement The signature in the corresponding field of the message is checked to see if the authentication is approved. The authenticated user identity can be provided to Rp 7〇8 in the response message. If the claim is true and the verification of the message is successful, then the user You can log in to the service of Rp 7〇 8. 1013091673-0 10013373#单单A〇101 Page 32 of 100201225697 As described herein, in some exemplary embodiments, local A claim provider, such as a local op', can be integrated with different key protocols and authentication protocols. Figure 8 shows an exemplary implementation of an operational flow for the provisioning phase. In an exemplary embodiment, the provisioning phase It can be executed once in a given time period, and when the key derived from the provisioning phase is valid, the authentication phase can be used for each subsequent local authentication. There is no shared secret before the provisioning phase is initiated (for example, for OpenlD) ) can be established between the network and the local 0P. After the provisioning phase, the local 〇P and the network (for example, 0PSF) can have long-term shared secrets, such as those expressed as Rp specific session secrets (for example, Krp). As shown in Figure 8, at 802, the device and network may have a shared secret key K 808 for authentication and key agreement between the device and the network. As shown at 804, the local device at the device p and the op at the network may not have a shared secret for OpenlD. At 806, the device and the network may use the shared machine K 808 to participate in the authentication and secret protocol agreement. After the successful agreement is run The network and device may have a temporary key Ktmp 816 (e.g., Ks-NAF, CK/IK, etc.) in 810. At 812, the device performs an internal key export that generates an RP-specific session key (e.g., 'Krp) 818. Function. At 814, a network (e.g., 0PSF) key derivation function may also generate an RP specific session key (e.g., Krp) 818. The conference key (e.g., 'Krp) 818 may be based, for example, on a temporary key ( For example, Ktmp) 816 is generated at both the device and the network. Figure 9 illustrates another exemplary embodiment of an operational flow for the authentication phase. In an exemplary embodiment, if a confidential session key (eg, Krp) has been established between the network and the device, then the town executes the 10113091673-0 10013373# single number deletion 1 page 33 / total 100 page 201225697 Identification stage. Based on the RP specific secret session key specific secret or key in the network (for example to sign an identity claim. (eg '0PSF) and device sharing (eg Krp), signature and / or association lasc) can be generated by local 0P And/or any temporary secret mp (eg, 'Ks_(lnt/ext)-NAF) that can be used as a key agreement agreement can be used to derive a key, such as a session that can be used to authenticate (eg, -) authentication) A secret record (for example, Krp) and a signature secret (for example, -c). As shown in Fig. 9, at 9Q2, the device and the network have established an RP-specific shared session read (e.g., Krp), as shown, for example, in FIG. At 9〇4, the network and the network can participate in association establishment (for example, 〇__ is concatenated with its shared association control code and network and/or network 〇p generated shared security. Network and / Or the network Gp may use a secret record export function to derive a signature key (eg, Kasc) available for authentication at 91G. For example, the secret key derivation function may use a session key (eg, Krp) 9〇6 and associated control code. 9〇8 to derive the signature key (eg, 912. The signature key (eg, 'Kasc) may be used at 914 for the associated secret exchange between Rp and the network. The RP may send the associated control code 9〇8 and the authentication at 916. Requesting to a local OP on the device. The local OP may derive a signing key (e.g., Kasc) 912 from the function of using session key (e.g., Krp) 906 and associated control code 908 at 918. At 920, local 〇 p may sign the identity claim using a signing key (eg, Kasc) 912. The signed identity claim may be an identity claim received from the user (eg, via a browser). The RP may be used at 922 by the network and/or The network 〇p exports the signature key (for example, Kasc) 912 to verify by local 〇 p is an identity statement signed with a signature key (eg, 1013091673-0 10013373#single number A0101, page 34/total page 201225697, Kasc). At 924, the user can log in to the service at the RP. In an exemplary embodiment In the AKA operation, the AKA can be integrated by using the CK/IK established in the device (and/or smart card) and the network. The session secret can be derived from the CK/IK by using the appropriate key derivation function. A key (eg, Krp) is provided to the established AKA key to the local 0P on the device (eg, on the security module or smart card of the device). The CK/IK can be input to the key derivation function (similar Figure 8 shows the temporary secret record Ktmp (for example, Ks_(ext/int)_NAF). This causes the network (for example, 0PSF) and the device (for example, the local OP) to have the same session key for the RP ( For example, Krp) Once the session key is established, it can be used as shown in Figure 9. In addition, other protocols can be used, such as IMS-based authentication methods or other authentication and key agreement protocols. Smart Card (SC) or Security Module describes the design Any trusted environment, such as an integrated circuit card (ICC) or USIM, may provide a set of secure operating facilities. According to one embodiment, the UICC may be a network authentication credential used by the SC to maintain usage in the mobile device (eg, The location of the GSM/UMTS). The Smart Card Web Server (SCWS) application may be an SCWS defined by, for example, the Open Mobile Alliance (0). The SCWS is not restricted to use in the UICC and depends on the preferences of the card issuer. For any other smart card. The local user authentication using OpenID, which resides inside the secure element, can be extended to any other SC, such as a general purpose SC. Moreover, any other security environment that can provide a similar interface and/or protected execution for a critically secure implementation can be used for the 1013091673-0 1()() 13373# single number A0101 page 35/ A total of 100 pages 201225697 implementation goals of the implementation. Based on an implementation of the use of sews and thus user authentication, a similar implementation can be made of the 彳(4)stakehGlder mode. In an exemplary embodiment, _ can act as a full identity provider. ΜΝ0 can host (host) as a web service, qiu §, 卯讣 discovery and/or associated point entities. In addition, the face-to-face application is provided to the UICC along with the user's identity. In an exemplary embodiment, a user may have an existing OpenID identification word registered to a third party, such as myopenid c〇m. MN〇 no longer acts as a service provider to the user. ΜΝ0 can transmit data and allow third parties to install op applications on uicc and/or associate their #scws applications. The second party 0P can establish a business relationship with ΜΝ0. Mn〇 can also authorize third parties to manage the rights of 0P applications. ΜN0 may charge the third party 针对p for the service and form a revenue. In another exemplary embodiment, as will be further described herein, the third party OP and/or 可0 may interact with a global platform (GP) compatible smart card in an exemplary embodiment, the concept described may be non-mobile Implemented in the situation, such as an SC issued by a bank. The SC can be used by the 〇peniD identity provider to install the OP application. For example, a bank card can host an NFC booking application and/or an OpenID authentication 〇P application. In this non-mobile scenario, there may be no prior knowledge of the types of devices that the SC can communicate with. TCP/IP may be established over the USB connection of the SC via a local link, SC card reader, NFC communication interface, and the like. The SC may be equipped with an SCWS that may be obtained, for example, by an external terminal. 1013091673-0 Single Number Delete 1 Page 36 / Total 100 Page 201225697 According to one embodiment, the device may include an sc that hosts the SCWS. The 0P application that wants to access the RP website may not be on the same device. According to this embodiment, the SC can be used as an external authentication token. The situation of these split terminals can be combined with the different stakeholder modes described herein. Ο In an exemplary embodiment, a user may own a mobile device that is equipped with a UICC with sews and local 0P installed. The user can access the desired page at the RP using a browser agent (BA) that may be a different device than the mobile device. When the BA accesses the RP and submits an identification word (for example, a local (^61111) identification word) to log in, 1^ can redirect 5 people to the local 0?. For example, the RP can redirect the BA to the URL of the local 〇p. As described herein, a redirect message (e.g., an HTTP redirect message) from the RP to the BA may contain information for the signature on the local 0P application calculation claim message. The content of the message can be transferred to the local device on the mobile device and/or SC. The local 0P can display the authentication page to the user on the mobile device, and the user can authorize and/or authenticate the login. The local 0P can sign an identity claim message. The signed identity claim message can be sent back to the RP, which can alternatively be done by the BA. The RP can verify the signature and the user/BA can log in at the RP. In an exemplary embodiment, the BA may establish a local link to the mobile device, such as via a Bluetooth or WLAN link, and register the device as a device hosting the OP. The browser can send the redirect to the mobile device via a local key that can forward the redirect to the local OP and/or SCWS. The local 0P can authenticate the user to the user credentials ^ the user can use the mobile device to face the 0P. The user can authenticate using, for example, a password, a PIN, biometrics, and/or any other form of authentication. The local 0P may sign the claim message and/or forward the claim message to the BA via the local link. The BA can use this message to authenticate to the RP. In the implementation 10013373^.single number A0101 page 37/total 1 page 1013091673-0 201225697 mode 'BA can act as MITM between, for example, rp and mobile devices. Since the user knows that the user initiated the 〇penID session', the user is able to detect unauthorized requests on the mobile device. Figure 10 shows an exemplary implementation of a protocol flow for a split terminal scenario. As shown in Figure 1, communication between local 〇p 1〇〇2, user/mobile device 1 004 and/or user/BA 1〇〇6 can occur via the local link. The entities shown in FIG. 10 include local 〇P1〇〇2, user/mobile device 1 004, user/BA 1 006, RP 1008, and network 0P 1〇1〇. Local 0P 1002 and user/mobile device 1〇〇4 may be included in and/or associated with the same wireless device, such as a WTRU. The local 0P 1002 can be an entity that resides locally on or associated with the wireless device, and the wireless device acts as a proxy for a network OP (e.g., network 0P 1010) that resides outside of the wireless device. The local 0P can be associated with the SCWS residing on the wireless device. The network 〇p 1〇1〇 can be used as an external 0P, and the local 0P 1002 resides on the device or is locally associated with it. For example, Network 1 can be associated with an OP. At 1012, the user/BA 1006 can send a login request to the RP 1008. A login request can be made using 〇penID according to one embodiment. At 1014, RP 1〇〇8 and the network 〇p 1〇1〇 can perform the discovery of the 饲p feeder on the network. The discovery can be performed, for example, based on the 〇penlD identity. The Rp 1008 can send an association request to the network at 1016. The Rp can receive an association response from the network 〇p 1 〇 1 10 at 1018. The association response may include an association control code A and/or a signature key S (e.g., Kasc). At 1 020'RP 1〇〇8, a redirect message can be sent to the user/BA 10013373#single number A〇101 page 38/total 100 page 1 006 〇1013091673-0 201225697 The redirect message can be configured to be redirected on the device The browser goes to the local op 1 002. The redirect message has a parameter containing the associated control code A. At 1 022, the user/mobile device 1 004 can establish a local link with the user/BA 1006. User/BA 1 006 can send a local request for authentication to local 0P 1 002 at 1024. At 1 026, local authentication can be performed between local 0P 1002 and user/mobile device 1 004. For example, local authentication can be performed as described herein. At 1028, local 0P 1 002 can send a redirect message to the user /BA 1 006. The redirect message redirects the browser to the user /BA 1006. The redirect message may include an associated control code A and/or signed parameters. A request can be sent to RP 1008 at 1030 'user/BA 1 006. The request may be a request for a service at RP 1 008. The request may include a signed statement from the local 0P 1002. Based on the signed announcement message from the local 0P 1 002, the RP 1008 can instruct the user to log in to the RP 1008. For example, RP 1008 can display the logged in page at 1032. In an exemplary embodiment, a non-mobile SC may be used and/or distributed to a web-based OP or another third party, such as a bank. Similar implementations described herein may be applied when a non-mobile SC is used and/or distributed. For example, a non-mobile SC can be implemented similar to the implementation of the mobile split terminal implementation described herein. For example, the establishment of a local link may be via an external smart card reader and/or an NFC (Near Field Communication) terminal attached to the computer. The interface supports HTTP messages that can be sent to 〇p/scWS implemented on the SC. In an exemplary embodiment, the OP application can execute on a Global System (GP) compatible SC, e.g., uiCC in a GSM and/or UMTS network, and can accommodate different stakeholder modes. Some SCs may be GPs 1013091673-0 10013373#single number A〇m page 39/total 1 page 201225697 =, but the GPSC implementations described herein may be mapped to implementation choices for other embodiments, such as Java cards The actual GPSC can host one or more secure domains (sd), whereby each (four) can represent a stakeholder and/or can store a secret or personalize the application for that stakeholder. It seems that the main SD can be a release of the card issue 3. It can organize the contents of the I have different privilege according to the hierarchy. The issuer can have authorization management (10) = and can perform spontaneous control on the card, as well as the ability to perform two = 1 or delete _. Other SD can be given if they reside in 2 different levels. If the SD is at the same level, the privilege = Manage (10) privilege, which allows the SD to manage the card content in its sub-layer ("hy). All the actions performed by the appetiser 2 are authorized by the issuer, and the stick can be carefully supplied to the issuer SDUSD) and can be checked by the ISD. The Gp Cai Le (four) that can reside in the towel makes the Cosmos Path (TP) concept of the Saki communication. The TP phase is a privilege assigned to the sin and allows them to exchange commands via the GP Open milk. Otherwise the application is split on Gp %. The =11 diagram shows the Secure_(SD) layer clipping implementation. The full domain level includes Issuer Security Domain (ISD) 11G2, Supplemental Security Domain (10), 11G4, SSD, and Applications (Apps) 11〇8, 1110, 1112, and 1114. The ISD 1102 can have AM privileges and can control other entities in the SD hierarchy. The ISD (10) can control the application (1) taste 1114 ’ while the ISD 1102 can grant the μ privilege to the SSD 1104#〇SSD 11〇6. For example, 'SSD 11〇4 can control applications 11〇8 and 111〇. 10013373#Single Number A0101 Figure 12 shows another example of the Secure Domain (SD) hierarchy. SD layer Page 40 of 1 Page 1013091673-0 201225697 Times with scepter-based domain management. The IDS 1102 can verify the tokens from SSj) 1104 and/or SSD 1106. This token-based management enables the SSD 1106 to load its own application 1202 using the ISD 1102 verified token. Scepter verification may be performed using a token and/or key based verification implementation described herein or a similar implementation. Depending on how SCWS is implemented on the SC, different options can be applied to enable different stakeholder modes. Figure 13 shows an exemplary embodiment of a domain level as a global platform (GP) application using a web page word server (e.g., smart card web server (SCWS) 1310). As shown in Fig. 13, SCWS 131 can be implemented as an application in the owned SD, such as iso 1302 owned by the SC issuer. The ISD 1302 may have Authorization Management (AM) privileges and may spontaneously control the hierarchy shown in Figure 13. An application provider (e.g., a third party OP) SD (APSD) 1304 may be a UI for the application 1308 and has a delegation management ((10)) privilege to manage the OP application 1308. The scws management agent SD (SSD) 1 306 can be used for SCWS 131 and has DM privileges to manage SCWS 1310. The SCWS 1310 can be implemented as a GP application for the GP 1312. The MNO mode, the second party OP mode, and/or the non-MNO mode can be used to support the application of 〇p. The logic can reside in different SDs, such as APSD 1304. Application 1308 may be owned and/or managed by APSD 1304, which may be an entity different from SSD 1306 having SCWS application 1310 and a domain. Application 1308 and SCWS 1310 can communicate using trust path capabilities The second party and card issuer must agree to perform the business relationship for the implementation. For example, third parties and card issuers must grant SD and apply appropriate privileges.
SCWS管理可經由SSD 1306由卡發行方執行,所述SSD 1013091673-0 10013373#單編號A01〇l 第41頁/共100頁 201225697 1306可支援OTA管理能力,例如HTTP上的RAM。如果 APSD 1 304還支援SCP80協定,則應用和内容可以是使用 DM權杖由第三方管理的〇τA。 第14圖示出了 SCWS可在卡的運行時間環境(RTE)中實 現的示例性實施方式。如果SCWS在卡的運行時間環境( RTE)中實現,例如通過SC製造商,則沒有用於第三方應 用與SCWS通信的方式,因為對SCWS的接入不能通過GP架 構對外公開。因此,第三方0P的利益相關者模式得不到 支援。然而,可支援MN0和非移動模式。 如第14圖所示,應用1306和SCWS 1402之間沒有0TA通 信’但是GP API和/或GP OPEN可以不指定與下層RTE元 件的通信,例如RTE 1404和/或SCWS 1402。如果APSD 1304支援SCP80協定,則應用和内容可以是使用μ權杖 由第三方管理的0TA。 第15A和15B圖示出了供應階段的協定流的示例性實施方 式。所述供應階段可用於例如SS0協定。第15A和15B圖 中示出的供應可使用GBA來執行以導出安全模組1 504和 0P/NAF 1510之間的共用機密會話密錄(例如,κΓρ)。 安全模組1 504可包括智慧卡、USIM、UICC、Java卡、 智能卡網頁伺服器(SCWS)使能的智慧卡或WTRU上的其 他信任實體。根據示例性實施方式,安全模組15〇4可包 括本地〇p和/或本地網頁伺服器,例如這裏所述的scws。 如第15A圖所示,在1514,ME/BA 1 508可用0P識別字登 錄到RP 1512。RP 1512可在1516執行發現,並在1518 建立與網路〇P/NAF K10的關聯。在152〇,rp 1512可 重定向 ME/BA 1 508 到網路 〇p/NAF 151〇βΜΕ/Μ 15〇8 10013373^^'^^ Α0101 第42頁/共10〇頁 1013091673-0 201225697 可在1522與安全模組1504 —起執行詳細的查找和決定程 序。在1524,ME/BA 1 508可建立與OP/NAF 1510的TLS 隧道。在1524 ’ OP/NAF 1510可以是此時在協定中被鑑 別的網路實體。在1526,ME/BA 1 508可向網路OP/NAF 1510發送對鑑別頁面的請求(例如,HTTP GET請求)。 OP/NAF 1510可在1 528發送鑑別請求到ME/BA 1508。 在1 530,ME/BA 1 508可針對應用特定GAA密鑰發送請求 到ME/GBA模組1 506。ME/GBA模組1 506可在1 532發送 IMSI請求到安全模組1504。 在1 534,安全模組1 504可檢查有效的臨時密鑰Ks。所述 檢查可例如在1 532在IMSI請求之後被執行。在1536安全 模組1504確定有效的臨時密錄Ks是否存在。如果有效的 臨時密鑰Ks存在,那麼不執行引導,且消息流跳到步驟 1580 (在第15B圖)以從臨時密鑰Ks中導出會話密鑰( 例如,Krp)。如果有效的臨時密鑰Ks不存在,那麼如這 裏所述執行引導以生成有效的臨時密鑰。 Ο 根據一個實施方式,引導可如第15A和15B圖的步驟1538 到1 579所示的那樣執行。所述引導可被執行以鑑別(例 如,用戶鑑別)並導出臨時密鑰(例如,The SCWS management can be performed by the card issuer via the SSD 1306, the SSD 1013091673-0 10013373# single number A01〇l page 41/100 pages 201225697 1306 can support OTA management capabilities, such as RAM over HTTP. If APSD 1 304 also supports the SCP80 protocol, the application and content may be 〇τA managed by a third party using a DM token. Figure 14 shows an exemplary implementation that SCWS can implement in a card's runtime environment (RTE). If the SCWS is implemented in the card's runtime environment (RTE), for example by the SC manufacturer, there is no way for third party applications to communicate with the SCWS, as access to the SCWS cannot be made public through the GP architecture. Therefore, the stakeholder model of the third party 0P is not supported. However, MN0 and non-mobile modes are supported. As shown in Figure 14, there is no 0TA communication between application 1306 and SCWS 1402' but the GP API and/or GP OPEN may not specify communication with the underlying RTE elements, such as RTE 1404 and/or SCWS 1402. If the APSD 1304 supports the SCP80 protocol, the application and content may be an OT managed by a third party using a μ scepter. 15A and 15B illustrate an exemplary implementation of a contract flow for the provisioning phase. The provisioning phase can be used, for example, for the SSO protocol. The provision shown in Figures 15A and 15B can be performed using GBA to derive a shared secret session secret (e.g., κ Γ ρ) between security modules 1 504 and 0P/NAF 1510. The security module 1 504 can include a smart card, USIM, UICC, Java card, smart card web server (SCWS) enabled smart card or other trusted entity on the WTRU. According to an exemplary embodiment, the security module 15〇4 may include a local device and/or a local web server, such as the scws described herein. As shown in Fig. 15A, at 1514, ME/BA 1 508 can be logged to RP 1512 with the 0P identification word. The RP 1512 can perform discovery at 1516 and establish an association with the network 〇P/NAF K10 at 1518. At 152 〇, rp 1512 can redirect ME/BA 1 508 to the network 〇p/NAF 151〇βΜΕ/Μ 15〇8 10013373^^'^^ Α0101 Page 42 of 10 Page 1013091673-0 201225697 Available in The 1522 performs a detailed lookup and decision process with the security module 1504. At 1524, ME/BA 1 508 can establish a TLS tunnel with OP/NAF 1510. The 1524 ’ OP/NAF 1510 may be the network entity that was identified in the agreement at this time. At 1526, the ME/BA 1 508 can send a request for an authentication page (eg, an HTTP GET request) to the network OP/NAF 1510. The OP/NAF 1510 can send an authentication request to the ME/BA 1508 at 1 528. At 1 530, the ME/BA 1 508 can send a request to the ME/GBA module 1 506 for the application specific GAA key. The ME/GBA module 1 506 can send an IMSI request to the security module 1504 at 1 532. At 1 534, the security module 1 504 can check for a valid temporary key Ks. The check may be performed, for example, at 1 532 after the IMSI request. At 1536, the security module 1504 determines if a valid temporary secret record Ks exists. If a valid temporary key Ks exists, no booting is performed and the message flow jumps to step 1580 (in Figure 15B) to derive the session key (e.g., Krp) from the temporary key Ks. If the valid temporary key Ks does not exist, then the boot is performed as described herein to generate a valid temporary key. Ο According to one embodiment, the booting can be performed as shown in steps 1538 through 1 579 of Figures 15A and 15B. The booting can be performed to authenticate (e. g., user authentication) and derive a temporary key (e.g.,
Ks_(exl7int)_NAF)來用於執行本地鑑別。雖然在第 15A和15B圖的步驟1538到1579示出引導協定的一個實施 方式,但是根據本領域技術人員已知的實施方式,可執 行其他引導和/或鑑別協定來用於鑑別和/或生成臨時密 餘。 10_产單編號 如第15B圖所示,使用第15A和15B圖的步驟1538到1579 執行的引導程序,安全模組I504可在1578導出臨時密鑰 A0101 第 43 頁 / 共 1〇0 頁 1013091673-0 201225697 (例如’ Ks_(ext/int)_NAF)。所述導出使用依賴於 Ks和/或協定中使用的其他已知參數的密鑰導出函數。安 全模組1 504可在1579發送臨時密鑰(例如, Ks-extJAF)的外部拷貝給ME/GBA模組1 506。在1580 ’安全模組1504可導出RP特定會話密鑰(例如,Krp) 來用於1^1512的鑑別。1^特定會話密鑰(例如,1^?) 和臨時密錄(例如,Ks_int_NAF)的内部拷貝可在1581 存儲在安全模組1504中。臨時密鑰(例如,Ks_ext_NAF )的有效期和與臨時密錄(例如,Ks_ext_NAF)相關聯 的引導事務識別字(B-TID)可在1582從ME/GBA模組 1506發送到ME/BA 1 508。在1583,包含NAF_ID的請求 (例如,HTTP請求)可從ME/BA 1508發送到ME/GBA 1506。在1584,ME/GBA模組1 506可向安全模組1504發 送命令,以使用作為密碼的内部臨時密鑰(例如, Ks_int_NAF)來計算摘要(digest)。來自ME/GBA的通 信還可包括完全合格網域名稱(FQDM)。安全模組1504 可在1585驗證FQDM,並在1586計算摘要。在1587 ,安 全模組1 504可發送具有作為密碼的臨時密鑰(例如, Ks_int_NAF)的&十具後的摘要。在1588 * ME/GBA模組 1 506可發送摘要和B-TID給ME/BA 1508。ME/BA 1508 可在1 589發送包含B-TID的請求(例如,HTTP請求)給 網路OP/NAF 1510 ° 如果OP/NAF 1510具有有效的臨時密鑰(例如, Ks_int_NAF),那麼OP/NAF 1510可使用所述有效的臨 時密鑰。所述有效的臨時密鑰可匹配存儲在無線設備處 的安全模組中的對應密鑰’並可使用作用於相同或類似 HHH337#單編號删1 第44頁/共1〇〇頁 1013091673-0 201225697 的參數集的相同或類似的密鑰導出函數被導出。否則, 0P/NAF 1510可從BSF/HSS 1502中獲取有效的臨時密鑰 ’如第15B圖的步驟1590到1592中所示。例如,網路 OP/NAF 1510可在1590發送對密鑰和用戶安全設置( USS)的請求到BSF/HSS 1502。所述,請求還可包括 NAF_ID和B-TID。在 1591,BSF/HSS 1502可導出臨時 密鑰(例如,Ks_(ext/int)_NAF)並取得 GBA USS ( GUSS)。在 1592,BSF/HSS 1502可向網路OP/NAF 1510發送臨時密錄(例如,Ks_(ext/int)_NAF)、 GUSS和用於臨時密鑰的密鑰有效期。 在1 593,網路OP/NAF 1510可使用有效的臨時密鑰(例 如,Ks_int_NAF)來驗證密碼屬性。網路OP/NAF 1510 可在1594從臨時密錄(例如,Ks_int_NAF)中導出Rp 特定會話密鑰(例如,Krp)。聲明消息可在1596用通過 關聯建立的密鑰來簽署。在1 595,網路OP/NAF 1510可 發送重定向消息到ME/BA 1 508來將ME/BA 1508重定向 到RP 1512。重定向消息可包括鑑別聲明。ME/BA 1508 可在1597發送鑑別聲明到RP 1512,並且RP 1512可在 1598確認鑑別聲明有效。 第16A和16B圖示出了鑑別階段協定流的示例性實施方式 。例如,鑑別階段可整合SS0協定(例如移動本地 OpenlD)與GBA。 如第16A圖所示,ME/BA 1608可在1614發送登錄請求給 RP 1612。登錄請求可包括識別字,例如0P識別字。在 1616,RP 1612可執行0P發現。在 1618,網路OP/NAF 1610可從會話密鑰(例如,Krp)和關聯控制碼中導出簽 1013091673-0 10013373#單編號A01〇l 第45頁/共i〇〇頁 201225697 名密鑰(例如’Kasc)。網路Op/NAF 1610和RP 1612 可在1 620建立共用的機密簽名密鑰(例如,Kasc)。在 1 622 ’RP 1612可將ME/BA 1608重定向到安全模組 1604上的本地0P。重定向消息可包括關聯控制碼。安全 模組1604和ME/BA 1 608可在1 624執行詳細的查找和決 定程序。在1626,安全模組1604可從會話密錄(例如,Ks_(exl7int)_NAF) is used to perform local authentication. Although one embodiment of the bootstrap protocol is illustrated at steps 1538 through 1579 of the 15A and 15B diagrams, other guidance and/or authentication protocols may be performed for authentication and/or generation, according to embodiments known to those skilled in the art. Temporary secrets. 10_Production Number As shown in Figure 15B, using the boot procedure performed by steps 1538 through 1579 of Figures 15A and 15B, the security module I504 can derive the temporary key A0101 at 1578. Page 43 / Total 1〇0 Page 1013091673 -0 201225697 (eg ' Ks_(ext/int)_NAF). The derivation uses a key derivation function that depends on Ks and/or other known parameters used in the contract. The security module 1 504 can send an external copy of the temporary key (e.g., Ks-extJAF) to the ME/GBA module 1 506 at 1579. An RP-specific session key (e.g., Krp) can be derived at 1580' security module 1504 for authentication of 1^1512. An internal copy of a particular session key (eg, 1^?) and a temporary secret record (eg, Ks_int_NAF) may be stored in security module 1504 at 1581. The validity period of the temporary key (e.g., Ks_ext_NAF) and the boot transaction identifier (B-TID) associated with the temporary secret record (e.g., Ks_ext_NAF) may be sent from the ME/GBA module 1506 to the ME/BA 1 508 at 1582. At 1583, a request containing a NAF_ID (e.g., an HTTP request) can be sent from ME/BA 1508 to ME/GBA 1506. At 1584, ME/GBA module 1 506 can send a command to security module 1504 to calculate a digest using an internal temporary key (e.g., Ks_int_NAF) as a password. Communication from the ME/GBA may also include a fully qualified domain name (FQDM). The security module 1504 can verify the FQDM at 1585 and calculate the digest at 1586. At 1587, the security module 1 504 can send a "after a summary with a temporary key as a password (e.g., Ks_int_NAF). The 1588 * ME/GBA module 1 506 can send a digest and a B-TID to the ME/BA 1508. The ME/BA 1508 can send a request containing a B-TID (eg, an HTTP request) to the network OP/NAF 1510 at 1 589. If the OP/NAF 1510 has a valid temporary key (for example, Ks_int_NAF), then the OP/NAF The valid temporary key can be used by 1510. The valid temporary key may match the corresponding key stored in the security module at the wireless device' and may be used to apply the same or similar HHH337# single number deletion 1 page 44 / total 1 page 1013091673-0 The same or similar key derivation functions for the 201225697 parameter set are exported. Otherwise, the 0P/NAF 1510 can obtain a valid temporary key from the BSF/HSS 1502 as shown in steps 1590 through 1592 of Figure 15B. For example, the network OP/NAF 1510 may send a request for a key and user security setting (USS) to the BSF/HSS 1502 at 1590. The request may also include a NAF_ID and a B-TID. At 1591, the BSF/HSS 1502 can derive a temporary key (for example, Ks_(ext/int)_NAF) and obtain GBA USS (GUSS). At 1592, the BSF/HSS 1502 can send a temporary secret record (e.g., Ks_(ext/int)_NAF), GUSS, and a key validity period for the temporary key to the network OP/NAF 1510. At 1 593, the network OP/NAF 1510 can validate the password attribute using a valid temporary key (e.g., Ks_int_NAF). The network OP/NAF 1510 may derive an Rp specific session key (eg, Krp) from the temporary secret record (eg, Ks_int_NAF) at 1594. The claim message can be signed at 1596 with a key established by the association. At 1 595, the network OP/NAF 1510 can send a redirect message to the ME/BA 1 508 to redirect the ME/BA 1508 to the RP 1512. The redirect message can include an authentication statement. The ME/BA 1508 can send an authentication statement to the RP 1512 at 1597, and the RP 1512 can confirm that the authentication statement is valid at 1598. 16A and 16B illustrate an exemplary embodiment of an authentication phase agreement flow. For example, the authentication phase can integrate the SSO protocol (eg, mobile local OpenlD) with the GBA. As shown in Figure 16A, the ME/BA 1608 can send a login request to the RP 1612 at 1614. The login request may include an identification word, such as a 0P identification word. At 1616, the RP 1612 can perform OP discovery. At 1618, the network OP/NAF 1610 can derive a token from the session key (eg, Krp) and the associated control code. 1013091673-0 10013373#single number A01〇l page 45/total page 201225697 name key ( For example 'Kasc). The network Op/NAF 1610 and RP 1612 can establish a shared secret signature key (e.g., Kasc) at 1 620. The ME/BA 1608 can be redirected to the local OP on the security module 1604 at 1 622 'RP 1612. The redirect message can include an associated control code. The security module 1604 and ME/BA 1 608 can perform detailed lookup and decision procedures at 1 624. At 1626, the security module 1604 can be logged from the session (eg,
Krp )和關聯控制碼中導出簽名密鑰(例如,Kasc )。安 全模組1604可在1628用簽名密鑰(例如,Kasc)簽署身 份聲明消息’並在1630發送簽署的聲明到ME/BA 1608。 如第16A圖所示,簽署的聲明消息可經由με/GBA模組 1 606被發送到ME/BA 1608。在1632,簽署的聲明消息 可從ME/BA 1 608被發送到RP 1612,並且在1634,RP 161 2可使用簽名密鑰(例如,Kasc )來驗證身份聲明。 在RP 1612驗證了身份聲明之後,用戶能夠例如經由 ME/BA 1 608接入服務。 第1 6B圖示出了鑑別階段協定流的另一個示例性實施方式 。第16B圖中示出的協定流類似於第16A圖中示出的協定 流,但是第16B圖中示出的協定流顯示了 RP和設備之間的 安全通道。第16B圖中示出的協定流可用於例如執行用於 整合具有GBA的移動本地OpenlD和臨時標諸供應的鑑別 階段,所述臨時標誌供應可針為隨後的通信用於支援RP 和設備之間安全通道的建立。 如第16B圖所示,在1622a,RP 1612可包括在ME/BA 1608的重定向消息中的臨時標諸'(例如,Noncerp)。 安全通道密繪Kut可從會話密鑰(例如,Krp)、關聯控 制碼和臨時標誌(例如,Noncerp)中導出。在1628a, 10013373#單編號 A0101 第 46 頁 / 共 100 頁 1013091673-0 201225697 安全模組1604可用簽名密鑰和安全通道密鑰Kut簽署身份 聲明消息。在1 634a,RP 1612可驗證具有簽名密錄和安 全通道密鑰Kut的身份聲明消息。安全通道密鑰Kut的使 用可支援RP和安全模組和/或與安全模組相關聯的設備之 間的安全通道的建立和使用。 在GBA中,Ks GAA主會話密鑰可由GBA模組(即诎中的一 個軟體)導出。Ks可以是由被發送給⑽^的 AUTHENTICATE命令所返回的CK和IK的串聯。 在GBA一ME的情況中,其中UICC不支援GBA特定特徵,The signature key (eg, Kasc ) is derived from Krp and the associated control code. The security module 1604 can sign the identity claim message at 1628 with a signing key (e.g., Kasc) and send the signed claim to the ME/BA 1608 at 1630. As shown in FIG. 16A, the signed announcement message can be sent to the ME/BA 1608 via the με/GBA module 1 606. At 1632, the signed claim message can be sent from the ME/BA 1 608 to the RP 1612, and at 1634, the RP 161 2 can use the signing key (e.g., Kasc) to verify the identity claim. After the RP 1612 verifies the identity claim, the user can access the service, for example via ME/BA 1 608. Figure 16B illustrates another exemplary embodiment of an authentication phase agreement flow. The contract flow shown in Fig. 16B is similar to the contract flow shown in Fig. 16A, but the contract flow shown in Fig. 16B shows a secure channel between the RP and the device. The protocol flow shown in Figure 16B can be used, for example, to perform an authentication phase for integrating Mobile Local OpenlD with GBA and provisional provisioning, which can be used for subsequent communications to support RP and device The establishment of a secure channel. As shown in FIG. 16B, at 1622a, the RP 1612 may include a temporary label '(eg, Nonerrp) in the redirect message of the ME/BA 1608. The secure channel mapping Kut can be derived from session keys (eg, Krp), associated control codes, and temporary flags (eg, Nonerrp). At 1628a, 10013373#single number A0101 page 46 of 100 1013091673-0 201225697 The security module 1604 can sign an identity claim message with the signing key and the secure channel key Kut. At 1 634a, the RP 1612 can verify the identity claim message with the signature secret record and the secure channel key Kut. The use of the secure channel key Kut supports the establishment and use of a secure channel between the RP and the security module and/or the device associated with the security module. In GBA, the Ks GAA master session key can be derived from the GBA module (ie, a software in 诎). Ks can be a concatenation of CK and IK returned by the AUTHENTICATE command sent to (10)^. In the case of GBA-ME, where UICC does not support GBA specific features,
GBA模組可駐留在設備本身上,並從NAF_Ir^〇Ks (和 RAND ’ IMPI )中導出NAF特定臨時密鑰(例如,Ks_MF )° 臨時密鑰(例如,Ks_NAF)然後可以在被請求用於NAF 的鑑別時被給予應用(例如,流覽器)。雖然保留在Gba 模組内可以保證密論的安全性,但是臨時密鑰(例如, Ks_NAF)的安全性是應用的責任。 在GBA_ME (標準GBA)中,臨時密鑰可存儲在設備中, 因而潛在地被設備所有者知曉。為了安全敏感操作,變 數GBA_U可在UICC中存儲GBA臨時密鑰。 在GBA_U*,臨時密鑰Ks可保留在智慧卡中,且可以使用 兩種不同的方法來導出兩個密鑰。臨時密鑰(例如, Ks_ext_NAF)然後可被給予應用。 為了指示GBA_im使用,GUSS可包含來自XRES的LSB必 須進行位元翻轉(bit-flipped)的資訊。 在GBA_Ut,安全模組可在‘GBA導出’模組中運行。 GBA模組可運行UMTS AUTHENTICATE命令,這造成臨時 10013373^^^^ A〇101 第47頁/共100頁 1013091673-0 201225697 岔錄Ks的内部生成和臨時密餘!^的内部存儲。USiM可將 RES (與翻轉的LSB)返回到GBA模組。 為了實際的鑑別’ GBA模組可向USIM發送NAF-ID,且因 此接收到可由應用使用的臨時密鑰(例如,Ks_ext_NAF )。所述臨時密餘(例如’ Ks_ext_NAF)可由應用使用 ,並具有與GBA_ME中的臨時密鑰(例如,Ks_NAF) 一樣 的安全特性。 進一步的機密密鑰可從臨時密鑰(例如,GBA_ME實施時 的Ks_NAF )或另一個臨時密鑰(例如,GBA_u實施時的 Ks_int_NAF )導出。 第17圖示出了用於使用DNS查找作為繞過引導功能的手段 的協定流程的示例性實施方式。這可以例如在ss〇協定的 供應階段期間執行,例如第15A和15B圖中示出的 OpenID/GBA協定。 第17圖中示出的實體包括HSS 1 708、安全模組(例如, UICC)1704、ME 1706、OP/NAF 1718和RP 1720。安 全模組1 704可與無線設備相關聯,例如WTRl],並包括 USIM 1710和本地〇p 1712。ME 1 706可包括BA 1714和 TCP/IP用戶端 1716。0P/NAF 1718和HSS 1708可以是 網路的部分,例如MN0網路1 702。 如第17圖所示,RP 1720可在1722發送重定向消息給BA 1714而將BA 1714重定向到本地0P 1712。重定向消息 可包括鑑別請求。在1724,BA 1714可從TCP/IP用戶端 1716中請求(例如,HTTPS GET請求)本地0P完全合格 網域名稱(FQDN)。TCP/IP用戶端171 6在1 726執行查 找’以確定來自OP FQDN的本地OP IP,並(可選地)在 10013373^^^ A〇101 第48頁/共100頁 1013091673-0 201225697 1728與本地〇P 1712建立HTTPS隧道。在 1 730,TCP/IP 用戶端1716請求(例如’經由HTTPS GET消息)本地OP 識別字。本地OP 1712在1732確定會話密餘(例如,Krp )是否存在,且如果會話密鑰存在,則本地0P 1712在 1734如這裏所述的繼續進行身份鑑別。如果會話密錄不 存在’那麼本地0P 1712在1736發送重定向消息給ba 1714而將BA 1714重定向到0P/NAF 1718。重定向消息 可包括鑑別請求。在1738,BA 1714可從TCP/1P用戶端 171 6中請求0P/NAF 1718位址。在一個示例性實施方式 中,0P/NAF 1718位址可以是SCWS中的固定ip,或具有 / 由TCP/IP用戶端1716解決的0P/NAF 1718的特殊埠的0P FQDN。在1740,0P/NAF 1718可如這裏所述建立TLS隧 道和/或在網路處執行鑑別。 如第17圖所示,協定流可使用本地DNS查找作為繞過GBA 模組的手段。RP 1 720可使用0P/NAF 1718的URL (例如 ’ http: //opsf. org)將BA 1714重定向到服務。根據 一個示例,3GPP TR 33. 924可描述整合了〇peniD提供 方(0P)和3GPP網路應用功能(NAF)功能的基於網路 的功能’且還可以提供示例性0PSF功能。本地DNS查找可 將0P/NAF 1718的URL映射到本地0P 1712的已知IP位址 (例如’ 127.0.0.1)中。因而’BA 1714不是被重定 向到0P/NAF 1718,而是經由本地DNS查找被欺騙( trick)而直接進入本地〇p 1712,如第17圖中從1722 到1 730所示。 BA 1714可進入到按照本地DNS查找的安全模組上的本地 0P 1712。然後本地〇p可檢查以確定有效的會話密鑰( 1013091673-0 10013373#單編號A〇1〇l 第49頁/共100頁 201225697 例如,Krp)是否存在。如果存在,那麼過程可進入到鑑 別階段,例如第16A和16B圖中所示的鑑別階段。如果不 存在有效的會話密鑰(例如,Krp),則本地〇p可將μ 1714重定向到0P/NAF 1718的真實IP位址。BA 1714然 後可使用網路側的0P/NAF 1718繼續進行鑑別。 會話密錄(例如,Krp)、簽名密餘(例如,Kasc)和/ 或應用特定GBA臨時密錄(例如,Ks_int_NAF)之間的 密碼關聯可經由至少兩個實施方式實現。根據實施方式 ,若使用適當的密鑰導出函數(KDF),可從臨時密鑰( 例如,Ks_int_JAF)中導出會話密鑰(例如,Krp), 即,Krp=KDF(Ks-int_NAF) ’其中這種導出可例如由安 全模組或USIM完成。根據另一個實施方式,散列(hash )可用於從由本地0P保留的機密Kop以及USIM計算的AKA 參數RES中導出會話密鑰(例如,Krp),即 Krp=HMAC(Kop*,RES),這可以由本地〇p單獨完成。該 實施方式可通過以間接方式關聯到臨時密鑰1(_ i n t__NAF 而具有些微不同的語義(semantics)。並且,該實施 方式會對部署提出附加要求,以確保語義:本地0P真正 位於與安全模組或USIM相同ICC中;然而,安全模組或 USIM部分可能如這裏所述和GBA模組保持不改變。根據__ 個典型的實施方式,安全模組或USIM能夠執行直接流。 直接流的一個示例在關於身份管理和3GPP安全互連的 3GPP TR 33. 924 中被描述。 會話密錄(例如,Krp)可基於0P/NAF和本地0P已知的 憑證/機密被建立’因為所述會話密鑰(例如,Krp)之 1013091673-0 後可用於導出機密密鑰,例如簽名密鑰(例如,Kasc) 1()()13373#單編號 A0101 第 50 頁 / 共 1〇〇 頁 201225697 ,以簽署聲明消息。會話密鑰(例如,Krp)憑證的生成 可綁定到先前的鑑別過程,例如GBA或AKA,以在本地0P 和/或0P/NAF中實現機密會話密鑰(例如,Krp)的建立 。作為本地0P的部分,駐留在安全模組或智慧卡上的KDF 可直接訪問和/或讀取來自之前鑑別的密鑰材料。 在一個示例性實施方式中,在GBA的情況中,本地0P可讀 取來自安全模組或USIM的臨時密錄(例如,Ks_int_NAF ),並使用具有臨時密鑰(例如,Ks_int_NAF)的自己 的邏輯來執行密鑰導出,所述臨時密鑰作為產生會話密The GBA module can reside on the device itself and derive a NAF-specific temporary key (eg, Ks_MF) from NAF_Ir^〇Ks (and RAND 'IMPI) ° Temporary key (eg, Ks_NAF) can then be used on request The identification of NAF is given to the application (for example, a browser). Although the security of the secret is guaranteed to remain within the Gba module, the security of the temporary key (eg, Ks_NAF) is the responsibility of the application. In GBA_ME (Standard GBA), the temporary key can be stored in the device and thus potentially known by the device owner. For security-sensitive operations, the variable GBA_U can store the GBA temporary key in the UICC. In GBA_U*, the temporary key Ks can be kept in the smart card, and two different methods can be used to derive the two keys. A temporary key (eg, Ks_ext_NAF) can then be given to the application. In order to indicate the use of GBA_im, the GUSS may contain information from the XRES of the LRES that must be bit-flipped. In GBA_Ut, the security module can be run in the 'GBA Export' module. The GBA module can run the UMTS AUTHENTICATE command, which causes the temporary 10013373^^^^ A〇101 page 47/100 pages 1013091673-0 201225697 The internal generation of the Ks and the temporary storage! USiM can return RES (and inverted LSB) to the GBA module. For actual authentication, the GBA module can send a NAF-ID to the USIM and thus receive a temporary key (e.g., Ks_ext_NAF) that can be used by the application. The temporary secret (e.g., 'Ks_ext_NAF) can be used by the application and has the same security features as the temporary key (e.g., Ks_NAF) in the GBA_ME. Further secret keys may be derived from a temporary key (e.g., Ks_NAF when GBA_ME is implemented) or another temporary key (e.g., Ks_int_NAF when GBA_u is implemented). Figure 17 shows an exemplary embodiment of a protocol flow for using DNS lookup as a means of bypassing the boot function. This can be performed, for example, during the provisioning phase of the ss〇 agreement, such as the OpenID/GBA protocol shown in Figures 15A and 15B. The entities shown in FIG. 17 include HSS 1 708, security modules (eg, UICC) 1704, ME 1706, OP/NAF 1718, and RP 1720. The security module 1 704 can be associated with a wireless device, such as WTR1], and includes a USIM 1710 and a local 〇p 1712. ME 1 706 may include BA 1714 and TCP/IP client 1716. OP/NAF 1718 and HSS 1708 may be part of a network, such as MN0 Network 1 702. As shown in FIG. 17, RP 1720 can send a redirect message to BA 1714 at 1722 and a BA 1714 to local 0P 1712. The redirect message can include an authentication request. At 1724, the BA 1714 may request (e.g., an HTTPS GET request) a local 0P fully qualified domain name (FQDN) from the TCP/IP client 1716. The TCP/IP client 171 6 performs a lookup at 1 726 to determine the local OP IP from the OP FQDN, and (optionally) at 10013373^^^ A〇101 page 48/100 pages 1091091673-0 201225697 1728 with Local 〇P 1712 establishes an HTTPS tunnel. At 1 730, the TCP/IP client 1716 requests (e.g., 'via an HTTPS GET message) the local OP identification word. The local OP 1712 determines at 1732 whether a session secret (e.g., Krp) exists, and if the session key exists, the local OP 1712 continues identity authentication as described herein at 1734. If the session secret record does not exist then the local 0P 1712 sends a redirect message to the bus 1714 at 1736 and the BA 1714 to the 0P/NAF 1718. The redirect message can include an authentication request. At 1738, the BA 1714 can request the 0P/NAF 1718 address from the TCP/1P client 171 6 . In an exemplary embodiment, the OP/NAF 1718 address may be a fixed ip in the SCWS, or a special 埠 0P FQDN of the OP/NAF 1718 with / resolved by the TCP/IP client 1716. At 1740, the OP/NAF 1718 can establish a TLS tunnel as described herein and/or perform authentication at the network. As shown in Figure 17, the protocol flow can use local DNS lookups as a means of bypassing the GBA module. RP 1 720 can redirect BA 1714 to the service using a URL of 0P/NAF 1718 (eg, ' http: //opsf. org). According to one example, 3GPP TR 33.924 may describe a network-based function that integrates the 〇peniD provider (OP) and 3GPP Network Application Function (NAF) functions' and may also provide exemplary OFDM functionality. The local DNS lookup maps the URL of the 0P/NAF 1718 to a known IP address of the local 0P 1712 (e.g., '127.0.0.1). Thus, 'BA 1714 is not redirected to 0P/NAF 1718, but is instead spoofed via local DNS lookup and directly into local 〇p 1712, as shown in Figure 17 from 1722 to 1 730. The BA 1714 can access the local 0P 1712 on the security module that is looked up by the local DNS. Then local 〇p can check to determine if a valid session key (1013091673-0 10013373#single number A〇1〇l page 49/100 pages 201225697 for example, Krp) exists. If so, the process can proceed to the authentication phase, such as the identification phase shown in Figures 16A and 16B. If there is no valid session key (eg, Krp), then local 〇p can redirect μ 1714 to the real IP address of 0P/NAF 1718. The BA 1714 can then continue to authenticate using the network side 0P/NAF 1718. The cryptographic association between session secret (e.g., Krp), signature secret (e.g., Kasc), and/or application specific GBA temporary secret (e.g., Ks_int_NAF) may be implemented via at least two implementations. According to an embodiment, if an appropriate key derivation function (KDF) is used, a session key (eg, Krp) may be derived from a temporary key (eg, Ks_int_JAF), ie, Krp=KDF(Ks-int_NAF) 'where The export can be done, for example, by a security module or USIM. According to another embodiment, a hash can be used to derive a session key (eg, Krp) from the secret Kop reserved by the local 0P and the AKA parameter RES calculated by the USIM, ie Krp=HMAC(Kop*, RES), This can be done by local 〇p alone. This embodiment can have slightly different semantics by indirectly linking to the temporary key 1 (_in t__NAF). Moreover, this implementation imposes additional requirements on the deployment to ensure semantics: local 0P is truly located and secure. The module or USIM is in the same ICC; however, the security module or USIM portion may remain unchanged as described herein and in the GBA module. According to the __ typical implementation, the security module or USIM can perform direct flow. An example of this is described in 3GPP TR 33.924 regarding identity management and 3GPP secure interconnection. Session secrets (eg, Krp) can be established based on 0P/NAF and local 0P known credentials/confidences' because of the The session key (eg, Krp) of 1013091673-0 can then be used to derive a secret key, such as a signature key (eg, Kasc) 1()() 13373#single number A0101 page 50 / total 1 page 201225697, To sign a claim message. The generation of a session key (eg, Krp) credential can be bound to a previous authentication process, such as GBA or AKA, to implement a secret session key in local OP and/or OP/NAF (eg, Krp) ) Established as part of the local 0P, the KDF residing on the security module or smart card can directly access and/or read the key material from the previous authentication. In an exemplary embodiment, in the case of GBA, local 0P can read a temporary secret record from the security module or USIM (eg, Ks_int_NAF) and perform key derivation using its own logic with a temporary key (eg, Ks_int_NAF), which acts as a session secret
D ^ 錄(例如,Krp)的KDF的輸入參數。在另一個實施方式 中,本地0P可要求安全模組或USIM (例如經由將指定的 介面或呼叫)使用0P/NAF也已知的安全密鑰或USIM内部 KDF來導出會話密鑰(例如,Krp)。本地0P可得到KDF 的結果並將其使用/存儲會話密錄(例如,Krp )。在這 兩種情況中’ OP/NAF可從BSF (例如,通過Zn介面,像 是TS 33.220所示的Zn介面)導出臨時密鑰(例如, 0 Ks_int_NAF) ’並對其應用相同的KDF,以獲取會話密 餘(例如,Krp )。 1013091673-0 由於本地0P駐留在安全模組或%中,因此它可由mn〇供應 (例如’使用OTA機制’或在被個性化時安 裝在SC上)。在任一情况下,本地〇p應用本身都可以配 備有機密(例如,存儲為十上的Java卡物件)。然後該 .機密對於本地OP和MN0是已知的(以及因此對於由MN〇操 作的0P/NAF是已知的該機密在這裏可稱作κ〇ρ“會 話密输(例如,Krp)的導出可從安全模組(例如, USIM/UICC)能力中分離,以及僅僅可使用來自網路鑑 10_7#單編號A〇101 第51頁/共咖頁 201225697 別(例如,GBA或AKA運行)的輸出,例如來自USIM的 RES。RES可包含關於用於鑑別的USIM機密的隱含資訊。 本地0P可應用KDF到RES和Kop*來產生會話密鑰(例如, Krp)。根據一個實施方式,即使RES是公共的,也沒有 0P/NAF (以及例如丽0)之外的實體可導出相同的會話 密錄(例如,Krp) ° 0P/NAF可比較RES和XRES,如果 它們匹配,則從相同的種子材料中導出會話密鑰(例如 ,Krp )來產生相同的會話密餘(例如,Krp )。 上述實施方式可在本地OpenlD/GBA試著以‘多因素’方 式使用本地OpenID時被使用。這是指試著結合SS0協定 (例如,OpenID)和某些其他鑑別、簽署、密碼庫 (crypto vault)或UICC上或UE中別處的任何機密功能 的任何實施。 需要的是針對0P/NAF來保護例如第15-16圖中的RP和設 備(UE)之間的後續通信。在這方面,可在兩個實體之 間使用分別和獨立的相互鑑別程序。這裏描述了實現通 道安全的若干方法。然而,某些實施方式可以不實現 0P/NAF 獨立。 在示例性實施方式中,可執行第16B圖中所示的詳細協定 流的鑑別階段的變形。在第16B圖的1 622a,臨時標誌可 從RP發送到UE。該臨時標誌用作密鑰導出函數的附加輸 入。在1626b,Kut可從會話密錄(例如,Krp)、在 0P/NAF和RP之間建立的關聯控制碼和NonceRP導出。這 可得到期望的安全通道。然而,這會改變初始的OpenID 協定,因為它會實施對RP (例如,用於臨時標誌的會話 控制碼,等等)的改變。在安全性方面,存在最小利益 1337#單編號應01 第52頁/共100頁 1013091673-0 201225697 ;因為NonceRP可能不受保護,所以它(原則上)也可以 由0P/NAF讀取,且然後0P/NAF可生成相同的聲明消息。 因而,不能實現從0P/NAF的隔離。 在另一個示例性實施方式中,UE和RP可在協定的初始階 段(在發現之前)交換臨時標誌(來自ϋΕ的n〇ncel和來 自RP的nonce2 )。例如’這可以在第16B圖中的1614和 /或1616執行。這會被認為是關鍵的’因為0P/NAF不是 初始通信的一部分,因此被假定為看不到臨時標誌交換 。這可以給從所述實體的隔離提供前提條件。一旦 O OpenID完成,兩端可共用簽名密鑰(例如,Kasc),例 如迪菲-赫爾曼密鑰協議程序可用于建立可用於保護通道 的機密密鑰。也就是說,UE可發送下述消息給Rp : ax,Enc Kasc {SHA-X(ax,nonce2)}(其中X是UE選 擇的亂數,以及 Enc Kasc {SHA-X(ax,nonce2)}表示 A的加密簽名(由簽名密鑰Kasc簽署),其中A為{ax, nonce2}); 以及RP可發送下述消息給UE : ay,Enc Kasc {SHA-X(ay,noncel)},(其中y是 由RP選擇的臨時標誌,以及Enc Kasc {SHA-X(ay, noncel)}表示B的加密簽名(由簽名密鑰Kasc簽署),其 中B為{ay, noncel})); 該協定依賴於離散對數。計算可在乘法群Zp* (從攔位Zp 中導出)中發生,其中P是大質數,且值“a”是大質數順 序子組(Zp*的)的生成元素(generator)。a和p都是 公知的,且因此可由兩側計算axy m〇d p,從而保護通 道。UE可以知道X,RP"5!*以知道y。例如,知道ay的UE具 1刪373#單编號A0101 第53頁/共100頁 1013091673-0 201225697 有足夠的資訊來計算axy mod p°RP能夠執行使用ay的 類似計算。由於簽名A和B可分別由R P和U E驗證,因此過 程涉及互相鑑別,以及假定OpenID/NAF沒有涉及初始通 信,則可避免中間的人為攻擊。也可能通過在上述兩種 簽名中僅使用一個臨時標誌、(例如,nonce 1 )來得到類 似的結果。 共用簽名密鑰(Kasc)可用於提供支援迪菲-赫爾曼協定 的經鑑別版本的簽名。該先驗密鑰共用可以允許不使用 迪菲-赫爾曼的安全通道建立。 在另一個示例性實施方式中,作為對於上述協定的修正 ,可使用TLS隧道初始建立安全通道。若使用證書授權( CA),可經由證書將RP公共密鑰發送給UE。所述UE可生 成亂數(nonce),並將其(使用RP公共密鑰而被加密) 臨時標誌發送給RP。兩側都可使用所述臨時標誌生成共 用的對稱密鑰。0P/NAF可在回路之外,因為假設用戶發 起通信。現在可以建立安全傳輸層通道,其中單程RP鑑 別已經發生。一旦OpenlD完成,兩側可使用臨時標誌和 簽名密鍮(例如,Kasc )生成Kut。此外,其可生成期望 的安全通道而建立對0/NAF的獨立性。 0P/NAF好像理論上會劫持會話(如果其(而不是UE)在 初始階段發送臨時標誌給RP),但是在本文中不會。 0P/NAF在發現之前不知道通信,且即使知道,它也不是 歹徒。 下面描述的實施方式概述了 OpenlD (以及本地0P)和 AKA的整合變形。 第1 8圖示出了用於鑑別和密鑰協議(AKA )的協定流的示 10013373^^'^^ A0101 第54頁/共100頁 1013091673-0 201225697 例性實施方式。這裏描述的實施方式可使用AKA和CK/ΐκ 實施。例如,可使用在無線設備和/或安全模組中和成功 的AKA運行之後在網路上建立的CK/IK來執行鑑別◊建立 的AKA密鑰可提供給本地〇p 1 802,例如在安全模組1804 上’或在用戶設備1808的移動設備(ME) 1806上。可通 過使用密鑰導出函數從CK/IK中導出會話密鑰(例如,D ^ Record (for example, Krp) the input parameters of KDF. In another embodiment, the local OP may request the security module or USIM (eg, via a designated interface or call) to derive the session key using a security key also known as OP/NAF or USIM internal KDF (eg, Krp) ). Local 0P can get the result of KDF and use / store session secret (for example, Krp). In both cases, 'OP/NAF can derive a temporary key (eg, 0 Ks_int_NAF) from the BSF (eg, via the Zn interface, such as the Zn interface shown in TS 33.220) and apply the same KDF to it. Get the session secret (for example, Krp ). 1013091673-0 Since the local 0P resides in the security module or %, it can be supplied by mn〇 (eg 'using the OTA mechanism' or when installed on the SC when personalized). In either case, the local 〇p application itself can be configured to be confidential (for example, stored as a Java Card object). The secret is then known to the local OP and MN0 (and thus to the OP/NAF operated by the MN〇 is known, the secret may be referred to herein as a κ〇ρ "convenient secret (eg, Krp) derivation) Can be separated from the security module (for example, USIM/UICC) capabilities, and can only be used from the network 10_7# single number A 〇 101 page 51 / total coffee page 201225697 (for example, GBA or AKA operation) output For example, RES from USIM. RES may contain implicit information about the USIM secret used for authentication. Local 0P may apply KDF to RES and Kop* to generate a session key (eg, Krp). According to one embodiment, even RES It is public, and entities other than 0P/NAF (and, for example, MN0) can export the same session secret (for example, Krp) ° 0P/NAF can compare RES and XRES, if they match, then from the same seed The session key (eg, Krp) is derived from the material to produce the same session secret (eg, Krp). The above embodiment can be used when the local OpenlD/GBA tries to use the local OpenID in a 'multi-factor' manner. Means trying to combine the SS0 agreement (for example, O penID) and any other implementation of authentication, signature, crypto vault or any confidential function on the UICC or elsewhere in the UE. It is desirable to protect the RP and, for example, Figure 15-16 for 0P/NAF Subsequent communication between devices (UEs). In this regard, separate and independent mutual authentication procedures can be used between the two entities. Several methods of implementing channel security are described herein. However, some implementations may not implement 0P. /NAF independence. In an exemplary embodiment, a modification of the authentication phase of the detailed protocol flow shown in Fig. 16B may be performed. At 1 622a of Fig. 16B, the temporary flag may be transmitted from the RP to the UE. As an additional input to the key derivation function, at 1626b, Kut can be derived from the session secret record (eg, Krp), the associated control code established between 0P/NAF and RP, and NonceRP. This provides the desired secure channel. This will change the initial OpenID contract because it will implement changes to the RP (for example, session control code for temporary flags, etc.). In terms of security, there is a minimum benefit 1337#单号应01第5 2 pages / total 100 pages 1013091673-0 201225697; because NonceRP may not be protected, it can (in principle) be read by 0P/NAF, and then 0P/NAF can generate the same declaration message. Isolation of 0P/NAF. In another exemplary embodiment, the UE and the RP may exchange temporary flags (n〇ncel from ϋΕ and nonce2 from RP) in the initial phase of the agreement (before discovery). For example, 'this can be performed at 1614 and/or 1616 in Figure 16B. This would be considered critical. 'Because 0P/NAF is not part of the initial communication, it is assumed that the temporary flag exchange is not visible. This can provide a prerequisite for isolation from the entity. Once O OpenID is complete, both ends can share a signature key (e.g., Kasc), for example, the Diffie-Hellman key agreement procedure can be used to establish a secret key that can be used to protect the channel. That is, the UE may send the following message to Rp: ax, Enc Kasc {SHA-X(ax, nonce2)} (where X is the random number selected by the UE, and Enc Kasc {SHA-X(ax, nonce2)} Indicates the cryptographic signature of A (signed by the signature key Kasc), where A is {ax, nonce2}); and the RP can send the following message to the UE: ay, Enc Kasc {SHA-X(ay,noncel)},( Where y is the temporary flag selected by the RP, and Enc Kasc {SHA-X(ay, noncel)} represents the cryptographic signature of B (signed by the signature key Kasc), where B is {ay, noncel}); Depends on discrete logarithms. The calculation can occur in the multiplicative group Zp* (derived from the intercept Zp), where P is a large prime and the value "a" is the generator of the large prime order subgroup (Zp*). Both a and p are well known, and therefore axy m〇d p can be calculated from both sides, thereby protecting the channel. The UE can know X, RP "5!* to know y. For example, knowing ay's UE has 1 delete 373# single number A0101 page 53 / 100 pages 1013091673-0 201225697 There is enough information to calculate axy mod p°RP can perform similar calculations using ay. Since signatures A and B can be verified by R P and U E respectively, the process involves mutual authentication, and assuming that OpenID/NAF does not involve initial communication, intermediate human attacks can be avoided. It is also possible to obtain a similar result by using only one temporary flag (for example, nonce 1 ) in the above two signatures. The Shared Signature Key (Kasc) can be used to provide signatures that support the authenticated version of the Diffie-Hellman Agreement. This a priori key sharing allows for the establishment of a secure channel without the use of Diffie Hermann. In another exemplary embodiment, as a modification to the above agreement, a secure channel may be initially established using a TLS tunnel. If a certificate authority (CA) is used, the RP public key can be sent to the UE via the certificate. The UE may generate a nonce and send it (encrypted using the RP public key) a temporary flag to the RP. The temporary flag can be used on both sides to generate a common symmetric key. 0P/NAF can be outside the loop because it is assumed that the user initiates communication. It is now possible to establish a secure transport layer channel in which one-way RP discrimination has taken place. Once OpenlD is complete, both sides can use the temporary flag and signature key (for example, Kasc) to generate the Kut. In addition, it can generate the desired secure channel and establish independence from 0/NAF. 0P/NAF seems to theoretically hijack the session (if it (not the UE) sends a temporary flag to the RP in the initial phase), but not in this article. 0P/NAF does not know the communication before it is discovered, and even if it is known, it is not a gangster. The embodiments described below outline the integrated variants of OpenlD (and local 0P) and AKA. Figure 18 shows a protocol flow for authentication and key agreement (AKA). 10013373^^'^^ A0101 Page 54 of 100 1013091673-0 201225697 An exemplary embodiment. The embodiments described herein can be implemented using AKA and CK/ΐκ. For example, the AKA key that can be authenticated using the CK/IK established on the network after successful AKA operation in the wireless device and/or security module can be provided to the local 〇p 1 802, for example in a security mode. Group 1804 is on 'or on mobile device (ME) 1806 of user equipment 1808. The session key can be derived from CK/IK by using a key derivation function (for example,
Krp) 1810來將AKA密鑰提供給本地OP 1 802 eCK/IK可 輸入到密鑰推導功能中,這類似於這裏描述的臨時密鑰 Ktmp °這會造成網路(例如,OPSF )和設備(例如,本 % 地OP)擁有用於RP的相同會話密鑰(例如,Krp) 1810 。在建立會話密鑰之後,可將其如這裏所述使用所述會 話密鑰。雖然這裏描述的是AKA,也可使用其他協定’例 如基於IMS的鑑別或其他鑑別和密鑰協議協定。 在一個示例性實施方式中,用於用戶鑑別的AV數量會減 少。AV可使用對HSS的接入,以及對HSS的查詢會滅少。 在一個示例性實施方式中,不是使用用於每個用戶登錄 的新AV,而是給AKA機制結合密碼(或例如密碼的散列) 〇 ,其可在用戶和OP之間建立。OP可實施為網頁服務’其 具有用以獲得AV之HSS的介面,以及用以與UE/流覽器通 信之HTTP介面。 用戶密碼可與OP安全地共用。關於用戶密碼這裏描述了 兩種不同的流:註冊流和鑑別流。註冊流可用於鑑別和/ 或共用密碼,其例如在首次登錄到RP期間發生。鑑別流 可用於後來的鑑別。例如,在建立了密碼時,可發生鑑 別流。如果設備(WTRU)重啟’ AKA密鑰會變為無效’並 被網路鑑別程序取代° 10013373#單編號 A〇1〇l 第 55 頁 / 共 100 頁 1013091673-0 201225697 這裏描述了註冊流的示例性實施方式。在註冊流中’用 戶可能想要在RP登錄。用戶被重定向到本地0P。本地〇P 可從HSS (例如,基於IMSI )中取得AV。本地0P可質詢 UE以進行鑑別(其可經由HTTP摘要AKA執行,因為 OpenID使用HTTP協定,並且通信在流覽器和本地〇P之間 發生)。流覽器可從請求中提取AV,並根據HTTP摘要 AKA過程繼續進行。本地0P可驗證回應,並且在發佈簽署 的聲明重定向消息之前,可要求用戶選擇密碼。基於AKA AV的互相鑑別可在該階段實現,從而本地0P可知道用戶 。通信可基於CK, IK密鑰而安全。用戶可用本地0P設置 密碼,其中密碼或其散列(例如,如在HTTP摘要鑑別中 )可發送給本地0P。0P可存儲密碼(或散列)和AV,以 備將來使用。0P可發佈簽署的聲明消息重定向到0P。UE 可被重定向到RP,所述RP可驗證聲明,並且用戶登錄到 該RP。 1013091673-0 這裏描述了鑑別流的示例性實施方式。在鑑別流中,用 戶可能想要在RP登錄。用戶可被重定向到本地〇P。本地 0P可能不能從HSS取得新的AV,但是可基於IMSI使用存 儲的AV。本地0P可質詢UE以進行鑑別,例如使用修改的 HTTP摘要AKA過程。本地0P可指示用戶密碼存在,以及 流覽器必須能夠理解標記(f 1 ag )。流覽器可從請求中 提取AV,並根據HTTP摘要AKA過程繼續進行。在流覽器 從安全模組或USIM中接收到res時,流覽器可向用戶要求 密碼(如在HTTP摘要鑑別中),然後使用適當的加密實 現(例如,通過計算rsp = f( rES | f (密碼)))將 RES與密碼結合起來,其中f是散列函數(例如,SHA】) 10013373#單編號A01〇l 第56頁/共100頁 201225697 ,而Ί ‘表示級聯。結果rsp可用作對本地肝的鏗別回 應中的密碼。本地OP可執行相同的計算(例如,如果密 碼的散列已知,則本地OP可計算xrsp = f( XRES丨散 列密碼))’以及驗證來自流覽H的回應rsp匹配xrsp。 本地OP可發佈簽署的聲明消息重定向到Rp,可被重定 向到RP,所緩可驗證聲明,且用戶可登錄到所述Rp。 如果沒有使用附加的加密,則註冊和鑑別流中執行的 HTTP摘要AKA可在HTTPS随道中執行,以保護鑑別資訊( 例如’鑑別憑證’例如用戶秘密)。當肝在註冊或鑑別 流中向無線設備發佈鑑別質詢時,臨時標誌可以是質詢 消息的一部分。在這種實施中,鑑別回應可計算散列 f(RES丨f(密碼)| nonce)和/或將其發送到〇p,其中 臨時標誌的存在可給計算提供新穎(freshness)品質 Ο 。回應消息中提供的散列可使用密鑰來通過簽名提供附 加的真實性測量。如果0P具有鑑別資訊(例如,用戶密 碼)而不是其散列,則散列回應可以是f(RES丨密碼! nonce),其中沒有密碼的内部散列。 在一個不例性實施方式中,散列鏈可用於從在首次鑑 別期間生成的初始RES中導出η個不同的一次性( one-time)密碼。流覽器可提取…”,並與USIM執行 AKA演算法。流覽器可生成種子值s以及根據該種子值可 通過隨後應用散列函數而計算散列鍵,其中散列鏈中的 第1 個值V1 = hi(s),hi(s) = h(h(h(…h(s)) [i次 ]。流覽器可使用hn(s)上的ικ來請求簽名,並將RES與 hn(S)和簽名一起發送給本地0P。如果RES=XRES,則本 地0P可存儲散列鏈承諾(commitment) hn(s)。 *單編號 10013373» 酬1 第57頁/共⑽頁 1013〇91673-〇 201225697 在進一步的鑑別中,本地OP可在HTTP摘要鏗別請求中質 詢流覽器’以提供下一個(即,最後鑑別中使用的索引 之前的值)散列值(即,在註冊和散列鏈承諾之後的第 一個鑑別中,流覽器可計算hn_1(s)並將其發送給本地 0P)。本地0P現在可以計算h ( hn-l(s) ) = hn (S) ’並將其與接收的散列鍵承諾相比較◊由於散列函數的 單程性質’因此即便有可能,根據hn (s)猜測hn-1(s) 也是很難的。 散列鏈的種子值s也可由用戶密碼或PIN碼提供,所述pin 碼可在每次用戶鑑別時被請求。 類似於關於與本地Open ID綁定的〇pen ID/GBA之在第 16-1 7圖中描述的實施方式,本地實體可用於簽署聲明消 息’而不需要每次登錄使用AV。AV可在OpenID關聯控制 碼中被直接傳送(即,網路側的〇P-agg/〇PSF可以從HSS 中得到AV,並且可將RAND和AUTN整合到關聯控制碼中, 所述關聯控制碼可通過流覽器被傳送給本地0P)。本地 〇P (或流覽器)可提取欄位,以及本地0P可用USIM執行 AKA,並用結果的IK簽署聲明。如果IK對本地0P不可用 ,或本地0P不使用USIM來簽署聲明,則可從IK (像GBA 的)中導出密鑰,從而將其使用來簽署聲明。散列鏈方 法可用於在每次AKA運行時增加可能鑑別的數量。 在一個示例性實施方式中,本地0P不能自己簽署聲明消 息,但是可提供網頁介面和應用邏輯。例如,本地0P可 構建聲明消息,但是沒有簽名。然後本地0P可以使用安 全模組(例如,USIM/UICC)功能來生成和/或計算簽名 ’所述簽名然後可被包括在經由用戶流覽器被發送回Rp 10013373#單編號 A01CU 第 58 頁 / 共 100 頁 1013091673-0 201225697 的最終消息中。本地op可在為實際用戶鑑別提供本地聲 明和節省網路訊務時為Open ID協定構建流覽器和安全模 組(例如,USIM/UICC)之間的中間層。 第19A圖是執行一個或多個公開的實施方式的示例性通信 系統1 900的示意圖。通信系統1 900可以是多重接入系統 ,其向多個無線用戶提供内容,例如語音、資料、視頻 、消息發送、廣播等等。通信系統1 900可以使多無線用 戶通過系統資源的共用訪問所述内容,所述系統資源包 括無線頻寬。例如,通信系統1 900可使用一個或多個通 道接入方法,例如分碼多重存取(CDMA)、分時多重存 取(TDMA)、分頻多重存取(FDMA)、正交FDMA( 0FDMA)、單載波FDMA (SC-FDMA)等等。 如第19A圖所示,通信系統1900包括無線發射/接收單元 (WTRU) 1 902a、1 902b、1 902c、1 902d,無線電接入 網路(RAN) 1904,核心網路1 906,公共交換電話網路 (PSTN) 1908,網際網路191G和其他網路1912,不過 應該理解的是公開的實施方式考慮到了任何數量的WTRU 、基站、網路和/或網路元件。WTRU 1 902a、1 902b、 1 902c、1902d中任一個可以是配置為在無線環境中進行 操作和/或通信的任何類型設備。作為示例,WTRU 1902a、1 902b、1 902c、1902d可以配置為發送和/或接 收無線信號,並且可以包括用戶設備(UE)、移動站、 固定或移動用戶單元、傳呼器、行動電話、個人數位助 理(PDA)、智慧手機、筆記本、上網本、個人電腦、無 線感測器、消費性電子產品等等。 通信系統1 900還可以包括基站1914a和基站1914b。基站 1〇〇1337#單編號 A0101 第59頁/共100頁 1013091673-0 201225697 1914a、191 4b中任一個可以是配置為對WTRU 1902a、 1902b、1902c、1902d中至少一個提供無線介面的任何 類型設備,以促進接入一個或多個通信網路,例如核心 網路1906、網際網路1910和/或網路1912。作為示例, 基站1914a、1914b可以是基站收發台(BTS)、節點b、 e節點B、家庭節點B、家庭e節點B、站點控制器、接入點 (AP)、無線路由器等等。雖然基站1914a、1914b被描 述為單獨的元件,但是應該理解的是基站1914a、i914b 可以包括任何數量互連的基站和/或網路元件。 基站1914a可以是RAN 1904的一部分,所述RAN 1904還 可包括其他基站和/或網路元件(未示出),例如基站控 制器(BSC)、無線電網路控制器、中繼節點等 專。基站1914a和/或基站1914b可配置成在特別地理區 域内發送和/或接收無線信號,所述特定地理區域可被稱 作社區(未示出)。所述社區可進一步劃分為杜區磁區 。例如’與基站l914a相關聯的社區可劃分為三個磁區。 因而’在一個實施方式中,基站1914a可包括三個收發器 ,即社區的每個磁區使用一個收發器。在另一個實施方 式中,基站1914a可使用多輸入多輸出(MIM0)技術, 並且因此可使用用於社區的每個磁區的多個收發器。 基站1914a、1914b可通過空中介面1916與WTRU 1902a 、1902b、1902c、1902d中一個或多個進行通信,所述 空中介面1916可以是任何適當的無線通信鏈路(例如, 射頻(RF ),微波,紅外線(I r ),紫外線(u v ),可 見光等等)。空中介面1916可使用任何適當的無線接入 技術(RAT)來建立。 1013091673-0 10013373#單蝙號A01〇l 第60頁/共100頁 201225697 更具體地說,如上所述,通信系統1 900可以是多重接入 系統,並且可以使用一個或多個通道接入方案,例如 CDMA、TDMA、FDMA、OFDMA、SC-FDMA等等。例如’ RAN 1904 中的基站 1914a和WTRU 1902a、1902b、 19 0 2 c可以實施無線電技術,例如通用移動電信系統( UMTS)陸地無線電接入(UTRA),其可以使用寬頻CDMA (WCDMA)建立空中介面1916。WCDMA可以包括通信協定 ’例如高速分組接入(HSPA)和/或演進的肪以(HSPA + )° HSPA可以包括高速下行鏈路分組接入(HSDpA)和/ 或高速上行鏈路分組接入(HSUPA)。 在另一個實施方式中,基站1914a*WTRU 19〇2a、 1902b、1 902c可實施無線電技術,例如演進型UMTS陸地 無線電接入(E-UTRA),其可以使用長期演進(LTE) 和/或LTE向級(LTE-A)技術建立空中介面1916。 在另一個實施方式中,基站1914a和WTRU 1 902a、 1902b、1 902c可實施無線電技術,例如IEEE 802. 16 ( 即’全球互通微波存取(WiMAX) )、CDMA2〇〇〇、 CDMA2000 1X、CDMA2〇〇〇 EV_D〇、臨時標準2〇〇〇( IS 2000)、臨時標準95 (IS-95)、臨時標準856 ( IS_856 )、全球移動通信系統(GSM) 'GSM演進的增強 型資料速率(EDGE)、GSM EDGE (GERAN)等等。 第19A圖中的基站1914b可以是無線路由器、家庭節點b 豕庭esg點β或接入點,例如,並且可以使用任何適當 的RAT來促進局部區域中的無線連接,例如商業處所、住 七車輛、校園等等。在一個實施方式中,基站l914b和 WTRU 麵3373#單編號删1 1013091673-0 l9〇2c、i9〇2d可以實現無線電技術,例如IEEE 第61頁/共1〇〇頁 201225697 802.11’來建立無線區域網路(WLAN)。在另一個實施 方式中,基站1914b和WTRU 1902c、1 902d可以實現無 線電技術(例如IEEE 802. 15)來實現無線個人區域網路 (WPAN)。在又另一個實施方式中,基站l9Ub*WTRU 1902c、1 902d可以使用基於胞元的RAT (例如, WCDMA,CDMA2000, GSM,LTE,LTE-A等)來建立微微社區 或毫微微社區。如第19A圖所不,基站1914b可以且有到 網際網路1910的直接連接。因此,基站1914b可以不必 經由核心網路19 0 6接入到網際網路191 〇。 RAN 1904可以與核心網路1906通信,所述核心網路 1906可以是配置為向WTRU 1 902a、1 902b、1 902c、 1 902d中一個或多個提供語音、資料、應用和/或網際網 路協定語音(VoIP)服務的任何類型網路。例如,核心 網路1 906可以提供呼叫控制、計費服務、基於移動位置 的服務、預付費呼叫、網際網路連接、視頻分配等,和/ 或執行高級別的安全功能,例如用戶鑑別。雖然第19A圖 中未示出,應該理解的是RAN 1904和/或核心網路1906 可以與使用和RAN 1 904相同的RAT或不同RAT的其他RAN 進行直接或間接的通信。例如,除了連接到RAN 1904上 之外(所述RAN 1 904可能正在使用E-UTRA無線技術), 核心網路1 906還可以與使用GSM無線技術的另一個RAN ( 未示出)通信。 核心網路1 906還可以充當WTRU 1 902a、1 902b、1902c 、1902d接入到PSTN 1908、網際網路1910和/或其他網 路1912的閘道。PSTN 1 908可以包括提供普通老式電話 服務(POTS)的電路交換電話網路。網際網路1910可以 10013373^^'^ A〇101 第62頁/共100頁 1013091673-0 201225697 包括使用公共通信協定的全球互聯電腦網路系統和設備 ’所述協定例如有TCP/IP網際協定族中的傳輸控制協定 (TCP)、用戶資料報協定(UDP)和網際網路協定(ip )。網路1912可以包括被其他服務提供方擁有和/或操作 的有線或無線的通信網路。例如,網路1912可以包括連 接到一個或多個RAN中的另一個核心網路,所述RAN可以 使用和RAN 1904相同的RAT或不同的RAT。 通信系統1 900 中的WTRU 1 902a、1902b、1902c、 1 902d的某些或所有可以包括多模式的性能,即WTRU 1 90 2a、1 90 2b、1 902c、1 902d可以包括在不同無線鏈 路上與不同無線網路進行通信的多個收發器。例如,第 19A圖中示出的WTRU 1902c可配置為與基站1914a通信( 所述基站1914a可以使用基於胞元的無線技術),以及與 基站1914b通信,所述基站1914b可以使用IEEE 802無 線技術。 第19B圖是示例性的WTRU 1902的系統圖。如第19B圖所 示,WTRU 1902可以包括處理器1918、收發器1 920、發 射/接收元件1922、揚聲器/麥克風1924、數字鍵盤1926 、顯示器/觸摸板1928、不可移動記憶體1 930、可移動 記憶體1932,電源1934、全球定位系統(GPS)晶片組 1 936和其他週邊設備1938。應該理解的是WTRU 1902可 以在保持與實施方式一致時,包括前述元件的任何子組 合。 處理器1918可以是通用處理器、專用處理器、常規處理 器、數位信號處理器(DSP)、多個微處理器、一個或多 個與DSP核心相關聯的微處理器、控制器、微控制器、專 10〇麵产單編號A〇101 第63頁/共100頁 1013091673-0 201225697 用積體電路(ASIC)、場可編程閘陣列(FPGA)電路、 任何其他類型的積體電路(1C)、狀態機等等。處理器 1918可執行信號編碼、資料處理、功率控制、輸入/輸出 處理和/或使WTRU 1 902能夠在無線環境中進行操作的任 何其他功能。處理器1918可以耦合到收發器1920,所述 收發器1 920可耦合到發射/接收元件1 922。雖然第19B圖 示出了處理器1918和收發器1 920是分別的部件,但是應 該理解的是處理器1918和收發器1 920可以在電子封裝或 晶片中整合在一起。 發射/接收元件1922可以配置為在空中介面191 6上將信 號發送到’或接收信號自基站(例如,基站1914 a)。例 如’在一個實施方式中,發射/接收元件1922可以是配置 為發送和/或接收RF信號的天線。在另一個實施方式中, 發射/接收元件1 922可以是配置為發送和/或接收例如IR 、UV或可見光信號的發射器/檢測器。在又另一個實施方 式中’發射/接收元件1922可以配置為發送和接收RF和光 信號兩者。應該理解的是發射/接收元件1 922可以配置為 發射和/或接收無線信號的任何組合。 此外,雖然發射/接收元件1 922在第19B圖中示出為單獨 的元件’但是WTRU 1 902可以包括許多發射/接收元件 1922。更具體地說,WTRU 1 902可以使用ΜΙΜΟ技術。因 此,在一個實施方式中,WTRU 1902可以包括在空中介 面1916上發送和接收無線信號的兩個或多個發射/接收元 件19 2 2 (例如,多個天線)。 1013091673-0 收發器1920可以配置為調製要由發射/接收元件1922發 送的信號,和解調由發射/接收元件1 922接收的信號。如 1〇〇1337#單編號崖01 201225697 上所述,WTRU 1902可以具有多模式性能。因此,收發 器1 920可以包括使WTRU 1902能夠經由多個RAT通信的 多個收發器,所述多個RAT例如有UTRA、E-UTRA和IEEE 802. 1 卜 WTRU 1902的處理器1918可以搞合到,以及接收育戶輸 入資料自揚聲器/麥克風1924、數字鍵盤1926和/或顯示 器/觸摸板1928 (例如,液晶顯示器(lcd)顯示單元或 有機發光二極體(OLED)顯示單元)。處理器i9i8還可 ^ 以輸出用戶資料到揚聲器/麥克風1924、鍵盤1926和/或 顯示/觸摸板19託。此外,處理器1918可以存取資訊自 ,以及儲存資料到任何類型的適當的記憶體,例如不可 移動記憶體1930和/或可移動記憶體1932 ^不可移動記 憶體1930可以包括隨機存取記憶體(RAM)、唯讀記憶體 (ROM)、硬碟或任何其他類型的儲存設備。可移動記憶 體1 932可以包括用戶身分模組(SIM)卡、記憶棒、安全 數位(SD)記憶卡料。在其他的實施方式巾,處理器 Q 1918可以存取資訊自,及儲存資料職理上沒有位於 WTRU 1902上(例如在飼服器或家用電腦(未示出)上 )的記憶體。 處理器1918可以從電源1934中接收能量,並且可以配置 為分配和/或控制到WTRU 1 902中的其他部件的電力。電 源1934可以是給WTRU 19〇2供電的任何適當的設傷。例 如電源1 934可以包括一個或多個乾電池(例如,錄鎘 (NiCd)、鎳鋅(NiZn)、鎳金屬氫化物(ημη)、鋰 離子(Li~10n),等等),太陽能電池,燃料電池等等 1〇麵#單編號A0101 第65頁/共100頁 1013091673-0 201225697 處理器1918還可以耦合到gps晶片組1 936,所述GPS晶片 組1 936可以配置為提供關於WTRU 19〇2當前位置的位置 資訊(例如’經度和緯度)^WTRU 1 902可以在空中介 面191 6上從基站(例如,基站1914a、1914b)中接收加 上或取代GPS晶片組1936資訊之位置資訊,和/或基於從 兩個或多個鄰近基站接收的信號定時來確定其位置。應 該理解的是WTRU 1902在保持實施方式的一致性時,可 以通過任何適當的位置確定方法獲得位置資訊。 處理器1918進一步耦合到其他週邊設備1 938,所述週邊 設備1 938可以包括一個或多個提供附加特性、功能和/或 有線或無線連接的軟體和/或硬體模組。例如,週邊設備 1 938可以包括加速計、電子羅盤、衛星收發器、數位相 機(用於照片或視頻)、通用串列匯流排(USB)埠、振 動設備、電視收發器、免持耳機、藍芽®模組、調頻(FM )無線電單元、數位音樂播放器、媒體播放器、視頻遊 戲播放器單元、網際網路流覽器等等。 第19C圖是根據實施方式的RAN 19 04和核心網路1 906的 系統圖。如上所述,RAN 1904可在空中介面1916上使用 E-UTRA無線電技術與WTRU 1 902a、1 902b、1 902c通信 。RAN 1904還可以與核心網路1 906通信。 RAN 1904可包括1 940a、1 940b、1 940c,但是 應理解的是在保持與實施方式的一致時,RAN 1904可包 括任意數量的6節點3。所述e節點B 1 940a、1 940b、 1940c每個可包括一個或多個收發器來用於在空中介面 191 6上與WTRU 1 902a、1902b、1 902c通信。在一個實 施方式中 10013373# 單編號 A0101 ,e節點B 1940a、1 940b、1 940c可實施ΜΙΜΟ 第 66 頁 / 共 100 頁 1013091673-0 201225697 技術。因而’ e節點B 1940a,例如’可使用多個天線將 無線信號發送到WTRU 1 902a,並從WTRU 1902a中接收 無線信號。 每個e節點B 1940a、1940b、1940c可與特別社區(未 示出)相關聯,並配置為處理無線電資源管理決定,移 交決定’上行鏈路和/或下行鏈路中用戶的調度,等等。 如第19C圖所示’ e節點b 1940a、1940b、1940c可在X2 介面上彼此通信。 第19C圖中示出的核心網路1906可包括移動性管理閘道( 〇 MME) 1942 ’服務閘道1944,和分組資料網路(PDN)閘 道1 946。雖然前述的每個元件都被描述為核心網路19〇6 的一部分,但是應該理解的是這些元件中的任何一個都 可由除核心網路操作者之外的實體擁有和/或操作。 MME 1942可經由S1介面連接到RAN 1904中每一個e節點 B 1940a、1940b、1940c ’並充當控制節點。例如, MME 1 942可負責鑑別WTRU i9〇2a、19〇2b、19〇2c的用 .... 戶、承載啟動/去啟動、在WTRU 1 902a、1 902b、1 902c 的初始附著期間選擇特定服務閘道,等等。MME 1942還 可以提供控制平面功能來用於在RAN 19〇4和使用其他無 線電技術(例如,GSM或WCDMA)的其他ran (未示出) 之間進行切換。 服務閘道1944可經由S1介面連接到ran 19〇4中6節點b 1940a、1940b、1940c的每一個。服務閘道1944通常可 以路由和轉發用戶資料分組到/自WTRU l9〇2a ' 19〇2b 、1902<^服務閘道1944還可以執行其他功能,例如在6 節點B之間移交期間錨定用戶平面,在下行鏈路數據可用 1013091673-0 10013373产單編號A〇1〇l 第67頁/共100頁 201225697 於WTRU 1 902a、1 902b、1 902c時觸發傳呼、管理和存 儲WTRU 1 902a、1902b、1 902c的上下文、等等。 服務閘道1944還可以連接到PDN閘道1946,其可以給 WTRU 1 902a、1 902b、1 902c提供對分組交換網路(例 如網際網路1910)的接入,以促進WTRU 1902a、1 902b 、1902c和IP使能設備之間的通信。 核心網路1906可促進與其他網路間的通信。例如,核心 網路1906可給WTRU 1902a、1902b、1 902c提供對電路 交換網路(例如PSTN 1 908 )的接入,從而促進WTRU 1902a、1 902b、1 902c和傳統陸地線通信設備之間的通 信。例如,核心網路1 906可包括IP閘道(例如,ip多媒 體子系統(IMS)伺服器)或與該IP閘道通信,所述1?閘 道充當核心網路1906和PSTN 1908之間的介面。此外, 核心網路1 906可給WTRU 1 902a、1 902b、1 902c提供對 網路1912的接入,其可包括由其他服務提供方擁有和/或 操作的其他有線或無線網路。 即使上面以特定的組合描述了特徵和元件,但是本領域 普通技術人員可以理解,每個特徵或元件可以單獨的使 用或與其他的特徵和元件進行組合使用。此外,這裏描 述的方法可以用電腦程式、軟體或韌體實現其可包含 在由通用電腦或處理器執行的電腦可讀介質中。電腦可 讀介質的示例包括電子信號(在有線或無線連接上發送 )和電腦可讀存儲介質。電腦可讀存儲介質的示例包括 但不限制為’唯讀記憶體(_)、隨機存取記憶體( RAM)、暫存器、快取記憶體、半導體記憶體設備、磁性 介質,例如内部硬碟和可移動磁片,磁光介質和光介質 10013373^ 早編號 Αί)1()1 第 68 頁 / 共 1〇〇 頁 1013091673-0 201225697 ,例如CD-ROM碟片,和數位通用碟片(DVD)。與軟體 關聯的處理器用於實現射頻收發器,其用於WTRU、UE、 終端、基站、RNC或任何主電腦。 【圖式簡單說明】 [0005] 更詳細的理解可以從下述結合附圖給出的示例的描述中 得到,其中: 第1圖示出了用於OpenlD協定運行的協定流的示例性實施 方式;Krp) 1810 to provide the AKA key to the local OP 1 802 eCK/IK can be entered into the key derivation function, similar to the temporary key Ktmp ° described here which causes the network (eg, OPSF) and the device (eg , this % OP) has the same session key (for example, Krp) 1810 for the RP. After the session key is established, it can be used as described herein. Although AKA is described herein, other protocols can be used, such as IMS-based authentication or other authentication and key agreement protocols. In an exemplary embodiment, the number of AVs used for user authentication may be reduced. The AV can use the access to the HSS, and the query to the HSS will be reduced. In an exemplary embodiment, instead of using a new AV for each user login, the AKA mechanism is combined with a password (or a hash of a password, for example), which can be established between the user and the OP. The OP can be implemented as a web service' which has an interface for obtaining the HSS of the AV, and an HTTP interface for communicating with the UE/Browser. The user password can be securely shared with the OP. About User Passwords Two different streams are described here: the registration flow and the authentication flow. The registration flow can be used to authenticate and/or share a password, which occurs, for example, during the first login to the RP. The authentication stream can be used for subsequent authentication. For example, when a password is established, a authentication stream can occur. If the device (WTRU) reboots 'the AKA key becomes invalid' and is replaced by the network authentication procedure. 10013373#单号A〇1〇l Page 55 of 100 1013091673-0 201225697 Here is an example of a registration flow. Sexual implementation. In the registration stream, the user may want to log in at the RP. The user is redirected to the local 0P. Local 〇P can take AV from HSS (for example, based on IMSI). The local OP can challenge the UE for authentication (which can be performed via the HTTP digest AKA because OpenID uses the HTTP protocol and communication occurs between the browser and the local P). The browser can extract the AV from the request and proceed according to the HTTP digest AKA process. The local 0P can verify the response and can ask the user to choose a password before issuing the signed claim redirect message. Mutual authentication based on AKA AV can be implemented at this stage so that the local 0P can know the user. Communication can be secure based on CK, IK keys. The user can set the password with local 0P, where the password or its hash (eg, as in HTTP digest authentication) can be sent to the local 0P. 0P can store passwords (or hashes) and AV for future use. 0P can issue a signed statement message redirected to 0P. The UE can be redirected to the RP, the RP can verify the claim, and the user logs in to the RP. 1013091673-0 An exemplary embodiment of an authentication flow is described herein. In the authentication stream, the user may want to log in at the RP. Users can be redirected to the local 〇P. Local 0P may not be able to get a new AV from the HSS, but the stored AV can be used based on the IMSI. The local OP can challenge the UE for authentication, such as using a modified HTTP Summary AKA procedure. The local 0P indicates that the user password exists and the browser must be able to understand the flag (f 1 ag ). The browser can extract the AV from the request and proceed according to the HTTP summary AKA process. When the browser receives res from the security module or USIM, the browser can request a password from the user (as in HTTP digest authentication) and then use the appropriate encryption implementation (for example, by calculating rsp = f( rES | f (password))) Combine RES with a password, where f is a hash function (for example, SHA)) 10013373#single number A01〇l page 56/100 pages 201225697, and Ί ' indicates cascading. As a result, rsp can be used as a password in the screening response to the local liver. The local OP can perform the same calculation (e.g., if the hash of the password is known, the local OP can calculate xrsp = f(XRES丨 hash password))' and verify that the response rsp from the browse H matches xrsp. The local OP can issue a signed statement message redirected to Rp, can be redirected to the RP, the statement can be verified, and the user can log in to the Rp. If no additional encryption is used, the HTTP digest AKA performed in the registration and authentication stream can be performed in the HTTPS channel to protect the authentication information (e.g., 'authentication credentials' such as user secrets). The temporary flag may be part of the challenge message when the liver issues an authentication challenge to the wireless device in the registration or authentication flow. In such an implementation, the authentication response may compute a hash f(RES丨f(password)|nonce) and/or send it to 〇p, where the presence of the temporary flag may provide a freshness quality 计算 to the calculation. The hash provided in the response message can use the key to provide additional authenticity measurements by signature. If the OC has authentication information (e.g., user password) instead of its hash, the hash response can be f (RES 丨 password! nonce), where there is no internal hash of the password. In an exemplary embodiment, the hash chain can be used to derive n different one-time ciphers from the initial RES generated during the first authentication. The browser can extract..." and perform an AKA algorithm with the USIM. The browser can generate a seed value s and can calculate a hash key according to the seed value by subsequently applying a hash function, where the first of the hash chains Values V1 = hi(s), hi(s) = h(h(h(...h(s)) [i times]. The browser can use ικ on hn(s) to request signatures and RES It is sent to the local 0P along with the hn(S) and the signature. If RES=XRES, the local 0P can store the hash chain commitment hn(s). *Single number 10013373» Reward 1 Page 57 / Total (10) Page 1013 〇91673-〇201225697 In further authentication, the local OP may challenge the browser 'in the HTTP digest request' to provide the next (ie, the value before the index used in the last authentication) hash value (ie, at In the first authentication after registration and hash chain commitment, the browser can calculate hn_1(s) and send it to local 0P). Local 0P can now calculate h ( hn-l(s) ) = hn (S ) 'and compare it to the received hash key promise ◊ due to the one-way nature of the hash function' so it is difficult to guess hn-1(s) from hn (s), if possible. The seed value s of the chain can also be provided by a user password or PIN code, which can be requested each time the user authenticates. Similar to the 〇pen ID/GBA bound to the local Open ID at 16-1 7 In the embodiment described in the figure, the local entity can be used to sign the claim message 'without requiring AV to be used each time. The AV can be directly transmitted in the OpenID associated control code (ie, the network side 〇P-agg/〇PSF can be AV is obtained in the HSS, and RAND and AUTN can be integrated into the associated control code, which can be transmitted to the local 0P through the browser. The local 〇P (or browser) can extract the field, and Local 0P can perform AKA with USIM and sign the declaration with the result IK. If IK is not available for local 0P, or local 0P does not use USIM to sign the declaration, then the key can be derived from IK (like GBA) to use it To sign the statement, the hash chain method can be used to increase the number of possible authentications each time the AKA runs. In an exemplary embodiment, the local 0P cannot sign the claim message by itself, but can provide a web interface and application logic. For example, local 0P A claim message can be constructed, but without a signature. The local OP can then use the security module (eg, USIM/UICC) function to generate and/or calculate a signature. The signature can then be included in the Rp via the user browser. 10013373#Single number A01CU Page 58 of 100 Last page 1013091673-0 201225697 The final message. The local op can build an intermediate layer between the browser and the security model (eg, USIM/UICC) for the Open ID protocol when providing local claims for actual user authentication and saving network traffic. Figure 19A is a schematic diagram of an exemplary communication system 1 900 that implements one or more disclosed embodiments. Communication system 1 900 can be a multiple access system that provides content to multiple wireless users, such as voice, data, video, messaging, broadcast, and the like. Communication system 1 900 can enable multiple wireless users to access the content through the sharing of system resources, including wireless bandwidth. For example, communication system 1 900 can use one or more channel access methods, such as code division multiple access (CDMA), time division multiple access (TDMA), frequency division multiple access (FDMA), quadrature FDMA (0FDMA). ), single carrier FDMA (SC-FDMA), etc. As shown in FIG. 19A, communication system 1900 includes wireless transmit/receive units (WTRU) 1 902a, 1 902b, 1 902c, 1 902d, radio access network (RAN) 1904, core network 1 906, public switched telephone Network (PSTN) 1908, Internet 191G and other networks 1912, although it should be understood that the disclosed embodiments contemplate any number of WTRUs, base stations, networks, and/or network elements. Any of the WTRUs 1 902a, 1 902b, 1 902c, 1902d may be any type of device configured to operate and/or communicate in a wireless environment. By way of example, the WTRUs 1902a, 1 902b, 1 902c, 1902d may be configured to transmit and/or receive wireless signals and may include user equipment (UE), mobile stations, fixed or mobile subscriber units, pagers, mobile phones, personal digits Assistants (PDAs), smart phones, notebooks, netbooks, personal computers, wireless sensors, consumer electronics, and more. Communication system 1 900 can also include base station 1914a and base station 1914b. Base Station 1〇〇1337#单编号A0101 Page 59/100 Page 1013091673-0 201225697 1914a, 191 4b Any of the types of devices configured to provide a wireless interface to at least one of the WTRUs 1902a, 1902b, 1902c, 1902d To facilitate access to one or more communication networks, such as core network 1906, Internet 1910, and/or network 1912. By way of example, base stations 1914a, 1914b may be base transceiver stations (BTS), node b, eNodeB, home node B, home eNodeB, site controller, access point (AP), wireless router, and the like. While base stations 1914a, 1914b are depicted as separate elements, it should be understood that base stations 1914a, i914b may include any number of interconnected base stations and/or network elements. Base station 1914a may be part of RAN 1904, which may also include other base stations and/or network elements (not shown), such as base station controllers (BSCs), radio network controllers, relay nodes, and the like. Base station 1914a and/or base station 1914b can be configured to transmit and/or receive wireless signals within a particular geographic area, which can be referred to as a community (not shown). The community can be further divided into Du District magnetic regions. For example, the community associated with base station l914a can be divided into three magnetic regions. Thus, in one embodiment, base station 1914a may include three transceivers, i.e., one transceiver for each magnetic zone of the community. In another embodiment, base station 1914a may use multiple input multiple output (MIM0) technology, and thus multiple transceivers for each magnetic zone of the community may be used. Base stations 1914a, 1914b may communicate with one or more of WTRUs 1902a, 1902b, 1902c, 1902d via null intermediaries 1916, which may be any suitable wireless communication link (e.g., radio frequency (RF), microwave, Infrared (I r ), ultraviolet (uv), visible light, etc.). The null intermediaries 1916 can be established using any suitable radio access technology (RAT). 1013091673-0 10013373# Single bat number A01〇l Page 60 of 100 201225697 More specifically, as described above, communication system 1 900 can be a multiple access system and can use one or more channel access schemes For example, CDMA, TDMA, FDMA, OFDMA, SC-FDMA, and the like. For example, base station 1914a and WTRUs 1902a, 1902b, 190c in RAN 1904 may implement radio technologies, such as Universal Mobile Telecommunications System (UMTS) Terrestrial Radio Access (UTRA), which may establish null intermediaries using Wideband CDMA (WCDMA). 1916. WCDMA may include communication protocols such as High Speed Packet Access (HSPA) and/or Evolved Fat (HSPA+). HSPA may include High Speed Downlink Packet Access (HSDpA) and/or High Speed Uplink Packet Access ( HSUPA). In another embodiment, the base station 1914a*the WTRUs 19〇2a, 1902b, 1 902c may implement a radio technology, such as Evolved UMTS Terrestrial Radio Access (E-UTRA), which may use Long Term Evolution (LTE) and/or LTE An empty mediation plane 1916 is established for the LTE-A technology. In another embodiment, base station 1914a and WTRUs 1 902a, 1902b, 1 902c may implement radio technologies, such as IEEE 802.16 (ie, Worldwide Interoperability for Microwave Access (WiMAX)), CDMA2, CDMA2000 1X, CDMA2. 〇〇〇EV_D〇, Provisional Standard 2〇〇〇 (IS 2000), Provisional Standard 95 (IS-95), Provisional Standard 856 (IS_856), Global System for Mobile Communications (GSM) 'Enhanced Data Rate for GSM Evolution (EDGE) ), GSM EDGE (GERAN) and more. The base station 1914b in Figure 19A may be a wireless router, a home node, or an access point, for example, and any suitable RAT may be used to facilitate wireless connectivity in a local area, such as a commercial premises, a seven-vehicle vehicle , campus, etc. In one embodiment, the base station 1914b and the WTRU plane 3373# single number deletion 1 1013091673-0 l9〇2c, i9〇2d may implement a radio technology, such as IEEE page 61/1 page 201225697 802.11' to establish a wireless area. Network (WLAN). In another embodiment, base station 1914b and WTRUs 1902c, 1 902d may implement a radio technology (e.g., IEEE 802.15) to implement a wireless personal area network (WPAN). In yet another embodiment, the base station l9Ub*WTRUs 1902c, 1 902d may use a cell based RAT (e.g., WCDMA, CDMA2000, GSM, LTE, LTE-A, etc.) to establish a pico community or a femto community. As shown in Figure 19A, base station 1914b can have a direct connection to Internet 1910. Therefore, the base station 1914b does not have to access the Internet 191 via the core network 196. The RAN 1904 can be in communication with a core network 1906, which can be configured to provide voice, data, applications, and/or the Internet to one or more of the WTRUs 1 902a, 1 902b, 1 902c, 1 902d Any type of network for Voice over Voice (VoIP) services. For example, core network 1 906 can provide call control, billing services, mobile location based services, prepaid calling, internet connectivity, video distribution, etc., and/or perform high level security functions such as user authentication. Although not shown in FIG. 19A, it should be understood that RAN 1904 and/or core network 1906 can communicate directly or indirectly with other RANs that use the same RAT as RAN 1 904 or different RATs. For example, in addition to being connected to the RAN 1904 (the RAN 1 904 may be using E-UTRA wireless technology), the core network 1 906 may also be in communication with another RAN (not shown) that uses GSM wireless technology. Core network 1 906 may also serve as a gateway for WTRUs 1 902a, 1 902b, 1902c, 1902d to access PSTN 1908, Internet 1910, and/or other network 1912. The PSTN 1 908 may include a circuit switched telephone network that provides Plain Old Telephone Service (POTS). Internet 1910 can be 10013373^^'^ A〇101 Page 62 of 100 pages 1091091673-0 201225697 including global interconnected computer network systems and devices using public communication protocols, such as the TCP/IP Internet Protocol family Transmission Control Protocol (TCP), User Datagram Protocol (UDP), and Internet Protocol (ip). Network 1912 may include a wired or wireless communication network that is owned and/or operated by other service providers. For example, network 1912 can include another core network connected to one or more RANs that can use the same RAT as RAN 1904 or a different RAT. Some or all of WTRUs 1 902a, 1902b, 1902c, 1 902d in communication system 1 900 may include multi-mode capabilities, ie, WTRU 1 90 2a, 1 90 2b, 1 902c, 1 902d may be included on different wireless links Multiple transceivers that communicate with different wireless networks. For example, the WTRU 1902c shown in FIG. 19A can be configured to communicate with base station 1914a (which can use cell-based wireless technology) and with base station 1914b, which can use IEEE 802 wireless technology. Figure 19B is a system diagram of an exemplary WTRU 1902. As shown in FIG. 19B, the WTRU 1902 can include a processor 1918, a transceiver 1 920, a transmit/receive element 1922, a speaker/microphone 1924, a numeric keypad 1926, a display/touchpad 1928, a non-removable memory 1 930, and a removable Memory 1932, power supply 1934, Global Positioning System (GPS) chipset 1 936, and other peripherals 1938. It should be understood that the WTRU 1902 can include any sub-combination of the aforementioned elements while remaining consistent with the embodiments. The processor 1918 can be a general purpose processor, a special purpose processor, a conventional processor, a digital signal processor (DSP), a plurality of microprocessors, one or more microprocessors, controllers, and micro-controls associated with the DSP core. 10, noodles No. A〇101 Page 63/100 pages 10109091673-0 201225697 Integrated circuit (ASIC), field programmable gate array (FPGA) circuit, any other type of integrated circuit (1C ), state machine, and so on. The processor 1918 can perform signal encoding, data processing, power control, input/output processing, and/or any other functionality that enables the WTRU 1 902 to operate in a wireless environment. Processor 1918 can be coupled to transceiver 1920, which can be coupled to transmit/receive element 1 922. While Figure 19B shows processor 1918 and transceiver 1 920 as separate components, it should be understood that processor 1918 and transceiver 1 920 can be integrated together in an electronic package or wafer. Transmit/receive element 1922 can be configured to transmit a signal to ' or receive a signal from a base plane (e.g., base station 1914a) on null plane 191 6 . For example, in one embodiment, the transmit/receive element 1922 can be an antenna configured to transmit and/or receive RF signals. In another embodiment, the transmit/receive element 1 922 may be a transmitter/detector configured to transmit and/or receive signals such as IR, UV or visible light. In yet another embodiment, the transmit/receive element 1922 can be configured to transmit and receive both RF and optical signals. It should be understood that the transmit/receive element 1 922 can be configured to transmit and/or receive any combination of wireless signals. Moreover, although the transmit/receive element 1 922 is shown as a separate element in Figure 19B, the WTRU 1 902 may include a number of transmit/receive elements 1922. More specifically, WTRU 1 902 may use a tricky technique. Thus, in one embodiment, the WTRU 1902 can include two or more transmit/receive elements 19 2 2 (e.g., multiple antennas) that transmit and receive wireless signals over the null plane 1916. The 1013091673-0 transceiver 1920 can be configured to modulate signals to be transmitted by the transmit/receive element 1922 and to demodulate signals received by the transmit/receive element 1 922. The WTRU 1902 may have multi-mode performance as described on 1 〇〇 1337 #单编号崖01 201225697. Thus, transceiver 1 920 can include multiple transceivers that enable WTRU 1902 to communicate via multiple RATs, such as UTRA, E-UTRA, and IEEE 802. 1 processor WTRU 1902 can mate To, and receive student input data from speaker/microphone 1924, numeric keypad 1926, and/or display/touchpad 1928 (eg, a liquid crystal display (LCD) display unit or an organic light emitting diode (OLED) display unit). The processor i9i8 can also output user data to the speaker/microphone 1924, the keyboard 1926, and/or the display/touchpad 19 tray. In addition, the processor 1918 can access the information and store the data to any type of appropriate memory, such as the non-removable memory 1930 and/or the removable memory 1932. The non-removable memory 1930 can include random access memory. (RAM), read-only memory (ROM), hard drive, or any other type of storage device. The removable memory 1 932 may include a user identity module (SIM) card, a memory stick, and a secure digital (SD) memory card. In other embodiments, the processor Q 1918 can access the information from, and store data on the WTRU 1902 (e.g., on a feeder or home computer (not shown)). The processor 1918 can receive energy from the power source 1934 and can be configured to allocate and/or control power to other components in the WTRU 1 902. Power source 1934 can be any suitable insult that powers WTRU 19〇2. For example, the power source 1 934 may include one or more dry cells (eg, cadmium (NiCd), nickel zinc (NiZn), nickel metal hydride (ημη), lithium ion (Li~10n), etc., solar cells, fuel Battery, etc. #〇面#单号A0101 Page 65/100 pages 1091091673-0 201225697 The processor 1918 can also be coupled to a gps chipset 1 936, which can be configured to provide information about the WTRU 19〇2 Location information of the current location (e.g., 'longitude and latitude') WTRU 1 902 may receive location information from the base station (e.g., base stations 1914a, 1914b) plus or in place of GPS chipset 1936 information on the null plane 191 6 and/or Or determining the location based on signal timing received from two or more neighboring base stations. It should be understood that the WTRU 1902 may obtain location information by any suitable location determination method while maintaining consistency of implementation. The processor 1918 is further coupled to other peripheral devices 1 938, which may include one or more software and/or hardware modules that provide additional features, functionality, and/or wired or wireless connections. For example, peripheral device 1 938 may include an accelerometer, an electronic compass, a satellite transceiver, a digital camera (for photo or video), a universal serial bus (USB) port, a vibrating device, a television transceiver, a hands-free headset, blue Bud® modules, FM radio units, digital music players, media players, video game player units, internet browsers, and more. Figure 19C is a system diagram of RAN 19 04 and core network 1 906, in accordance with an embodiment. As described above, the RAN 1904 can communicate with the WTRUs 1 902a, 1 902b, 1 902c over the null plane 1916 using E-UTRA radio technology. The RAN 1904 can also communicate with the core network 1 906. The RAN 1904 may include 1 940a, 1 940b, 1 940c, but it should be understood that the RAN 1904 may include any number of 6 nodes 3 while remaining consistent with the embodiments. The eNodeBs 1 940a, 1 940b, 1940c may each include one or more transceivers for communicating with the WTRUs 1 902a, 1902b, 1 902c over the null plane 191 6 . In one embodiment 10013373# single number A0101, eNodeB 1940a, 1 940b, 1 940c may be implemented ΜΙΜΟ page 66 / 100 pages 1013091673-0 201225697 technology. Thus, the eNodeB 1940a, e.g., can transmit wireless signals to, and receive wireless signals from, the WTRU 1902a using multiple antennas. Each eNodeB 1940a, 1940b, 1940c may be associated with a special community (not shown) and configured to handle radio resource management decisions, handover decisions 'users' scheduling in the uplink and/or downlink, etc. . As shown in Fig. 19C, the 'eNodebs 1940a, 1940b, 1940c can communicate with each other on the X2 interface. The core network 1906 shown in Figure 19C may include a mobility management gateway (〇 MME) 1942' service gateway 1944, and a packet data network (PDN) gateway 1 946. While each of the foregoing elements are described as being part of the core network 19〇6, it should be understood that any of these elements may be owned and/or operated by entities other than the core network operator. The MME 1942 can be connected to each of the eNodes B 1940a, 1940b, 1940c' in the RAN 1904 via the S1 interface and acts as a control node. For example, MME 1 942 may be responsible for authenticating WTRUs i9〇2a, 19〇2b, 19〇2c, bearer start/destart, selecting a particular during initial attachment of WTRUs 1 902a, 1 902b, 1 902c Service gateway, and so on. The MME 1942 may also provide control plane functionality for switching between the RAN 19〇4 and other rans (not shown) that use other radio technologies (e.g., GSM or WCDMA). The service gateway 1944 can be connected to each of 6 nodes b 1940a, 1940b, 1940c of ran 19〇4 via the S1 interface. The service gateway 1944 can typically route and forward user profile packets to/from the WTRU l9〇2a '19〇2b, 1902<^the service gateway 1944 can also perform other functions, such as anchoring the user plane during handover between 6-node Bs In the downlink data available, 1013091673-0 10013373, the production order number A〇1〇l page 67/100 pages 201225697 triggers paging, management and storage of WTRUs 1 902a, 1902b, at WTRU 1 902a, 1 902b, 1 902c, 1 902c context, and so on. Service gateway 1944 may also be coupled to PDN gateway 1946, which may provide WTRUs 1 902a, 1 902b, 1 902c with access to a packet switched network (e.g., Internet 1910) to facilitate WTRUs 1902a, 1 902b, Communication between the 1902c and the IP enabled device. The core network 1906 facilitates communication with other networks. For example, core network 1906 can provide WTRUs 1902a, 1902b, 1 902c with access to a circuit-switched network (e.g., PSTN 1 908), thereby facilitating communication between WTRUs 1902a, 1 902b, 1 902c and conventional landline communication devices. Communication. For example, core network 1 906 can include or be in communication with an IP gateway (eg, an ip Multimedia Subsystem (IMS) server) that acts between core network 1906 and PSTN 1908. interface. In addition, core network 1 906 can provide WTRUs 1 902a, 1 902b, 1 902c with access to network 1912, which can include other wired or wireless networks that are owned and/or operated by other service providers. Even though the features and elements are described above in a particular combination, one of ordinary skill in the art will appreciate that each feature or element can be used alone or in combination with other features and elements. Moreover, the methods described herein can be implemented in a computer program, software, or firmware that can be embodied in a computer readable medium that can be executed by a general purpose computer or processor. Examples of computer readable media include electronic signals (sent on a wired or wireless connection) and computer readable storage media. Examples of computer readable storage media include, but are not limited to, 'read only memory (_), random access memory (RAM), scratchpad, cache memory, semiconductor memory device, magnetic medium, such as internal hard Disc and removable disk, magneto-optical media and optical media 10013373^ early number Αί)1()1 page 68 / total 1 page 1013091673-0 201225697 , such as CD-ROM discs, and digital universal discs (DVD) ). The processor associated with the software is used to implement a radio frequency transceiver for a WTRU, UE, terminal, base station, RNC, or any host computer. BRIEF DESCRIPTION OF THE DRAWINGS [0005] A more detailed understanding can be obtained from the following description of examples given in connection with the accompanying drawings, in which: FIG. 1 shows an exemplary embodiment of a protocol flow for OpenlD protocol operation. ;
第2圖示出了用於OpenID/GBA的訊務流的示例性實施方 式; 第3圖示出了使用本地鑑別來鑑別用戶和/或無線設備的 協定流的示例性實施方式; 第4圖示出了使用本地鑑別來鑑別用戶和/或無線設備的 協定流的另一個示例性實施方式; 第5A和5B圖示出了使用本地鑑別來鑑別用戶和/或無線設 備的協定流的另一個示例性實施方式;Figure 2 shows an exemplary embodiment of a traffic flow for OpenID/GBA; Figure 3 shows an exemplary embodiment of a protocol flow for authenticating a user and/or a wireless device using local authentication; Another exemplary embodiment showing the use of local authentication to authenticate a subscriber stream and/or a protocol flow of a wireless device is shown; FIGS. 5A and 5B illustrate another use of local authentication to authenticate a subscriber stream of a user and/or wireless device. Exemplary embodiment;
第6A和6B圖示出了使用本地鑑別來鑑別用戶和/或無線設 備的協定流的另一個示例性實施方式; 第7圖示出了用於鑑別階段的操作流的示例性實施方式; 第8圖示出了用於供應階段(provisioning phase )的 操作流的示例性實施方式; 第9圖示出了用於鑑別階段的操作流的另一個示例性實施 方式; 第10圖示出了用於拆分終端情況的協定流的示例性實施 方式; 第11圖示出了安全網域(SD)層次(hierachy )的示例 10013373#單減 A〇101 第69頁/共100頁 1013091673-0 201225697 性實施方式; 第12圖示出了安全網域(SD)層次的另一個示例性實施 方式; 第13圖示出了使用作為全局平臺(GP)應用的智慧卡網 頁伺服器(SCWS)的安全網域層次的示例性實施方式; 第14圖示出了可在卡的運行時間環境(RTE)中實現 SCWS的示例性實施方式; 第1 5A和1 5B圖示出了用於提供SS0協定的協定流的示例 性實施方式; 第16A圖示出了整合SS0協定與通用引導程式結構(GBA )的鑑別階段的協定流的示例性實施方式; 第16B圖示出了整合SS0協定與將設備固定到RP通道的通 用引導程式結構(GBA)的鑑別階段的協定流的示例性實 施方式; 第17圖示出了用於使用網域名稱伺服器(DNS)查找的協 定流的示例性實施方式; 第18圖示出了用於鑑別與密鑰協議(AKA)的協定流的示 例性實施方式; 第1 9A圖示出了執行一個或多個公開的實施方式的示例性 通信系統; 第19B圖示出了執行一個或多個公開的實施方式的示例性 無線發射/接收單元;以及 第19C圖示出了執行一個或多個公開的實施方式的示例性 系統無線電接入網。 【主要元件符號說明】6A and 6B illustrate another exemplary embodiment of a protocol flow for authenticating a user and/or a wireless device using local authentication; FIG. 7 illustrates an exemplary embodiment of an operational flow for the authentication phase; 8 illustrates an exemplary embodiment of an operational flow for a provisioning phase; FIG. 9 illustrates another exemplary embodiment of an operational flow for an authentication phase; An exemplary embodiment of a protocol flow for splitting a terminal situation; Figure 11 shows an example of a secure domain (SD) hierarchy (hierachy) 10013373#single reduction A〇101 page 69/100 pages 1013091673-0 201225697 Embodiment 12; FIG. 12 illustrates another exemplary embodiment of a secure domain (SD) hierarchy; and FIG. 13 illustrates security using a smart card web server (SCWS) as a global platform (GP) application An exemplary embodiment of a domain level; Figure 14 illustrates an exemplary embodiment of implementing SCWS in a card's runtime environment (RTE); Figures 15A and 15B illustrate the use of an SS0 protocol. Exemplary implementation of the agreement flow Method 16A shows an exemplary implementation of a protocol flow that integrates the authentication phase of the SSO protocol with the Generic Bootstrap Architecture (GBA); Figure 16B shows a generic boot that integrates the SS0 protocol with the device to pin the RP channel. An exemplary embodiment of a protocol flow for the authentication phase of a program structure (GBA); Figure 17 shows an exemplary embodiment of a protocol flow for lookup using a Domain Name Server (DNS); Figure 18 shows An exemplary embodiment for authenticating a protocol flow with an Key Agreement (AKA); Figure 19A illustrates an exemplary communication system that implements one or more disclosed embodiments; Figure 19B illustrates execution of one or An exemplary wireless transmit/receive unit of the plurality of disclosed embodiments; and a 19Cth diagram illustrates an exemplary system radio access network that implements one or more disclosed embodiments. [Main component symbol description]
[0006] 808共用機密密鑰K 10013373^^'^^ A〇101 第70頁/共100頁 1013091673-0 201225697 816 、 Ktmp 、 Ks_NAF 、 CK/IK 、 Ks 、 Ks_ext_NAF 、[0006] 808 shared secret key K 10013373^^'^^ A〇101 page 70 / total 100 pages 1013091673-0 201225697 816 , Ktmp , Ks_NAF , CK / IK , Ks , Ks_ext_NAF ,
Ks_int_NAF臨時密錄 906、Krp機密會話密鑰 908關聯控制碼 1102 、ISD發行方安全網域 1104、SSD補充安全網域 1404、RTE卡的運行時間環境 1 504、USIM/UICC 安全模組 1806、ME移動設備 1 900通信系統 1 902a、1 902b、1 902c、1 902d無線發射/接收單元 1 904、RAN無線電接入網路 1 908、PSTN公共交換電話網路 1914a、1914b 基站 1916空中介面 1 922發射/接收元件Ks_int_NAF temporary secret record 906, Krp secret session key 908 associated control code 1102, ISD issuer secure domain 1104, SSD supplementary secure domain 1404, RTE card runtime environment 1 504, USIM/UICC security module 1806, ME Mobile device 1 900 communication system 1 902a, 1 902b, 1 902c, 1 902d wireless transmitting/receiving unit 1 904, RAN radio access network 1 908, PSTN public switched telephone network 1914a, 1914b base station 1916 empty interfacing plane 1 922 transmitting /receiving component
1 942、MME移動性管理閘道 RP信賴方 B-TID引導事務識別字 K會話密錄 A關聯控制碼 S、Kasc簽名密錄 DNS網域名稱伺服器 0?8?0?61111)伺服器功能 BA瀏覽器代理 AM授權管理 1013091673-0 1QQ13373#:單編號A0101 第71頁/共100頁 201225697 DM委託管理 SCWS智能卡網頁伺服器 GP全局平臺 SD安全網域 RAM隨機存取記憶體 GAA通用鑑別結構 A K A密餘協議 BSF引導程式功能 FQDN完全合格網域名稱1 942, MME mobility management gateway RP relying party B-TID boot transaction identification word K session secret record A associated control code S, Kasc signature secret DNS domain name server 0? 8? 0? 61111) server function BA Browser Agent AM Authorization Management 1013091673-0 1QQ13373#: Single Number A0101 Page 71 / Total 100 Page 201225697 DM Entrusted Management SCWS Smart Card Web Server GP Global Platform SD Security Domain RAM Random Access Memory GAA Universal Identification Structure AKA Secret protocol BSF boot program function FQDN fully qualified domain name
Kut安全通道密餘 RNC無線電網路控制器 KDF函數 G P S全球定位系統 PDN分組資料網路 X2、S1介面 HHH337#單編號删1 第72頁/共100頁 1013091673-0Kut secure channel redundancy RNC radio network controller KDF function G P S global positioning system PDN packet data network X2, S1 interface HHH337# single number deletion 1 page 72 / total 100 pages 1013091673-0
Claims (1)
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US40372910P | 2010-09-20 | 2010-09-20 | |
| US42838810P | 2010-12-30 | 2010-12-30 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| TW201225697A true TW201225697A (en) | 2012-06-16 |
Family
ID=46726273
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| TW100133738A TW201225697A (en) | 2010-09-20 | 2011-09-20 | Identity management on a wireless device |
Country Status (1)
| Country | Link |
|---|---|
| TW (1) | TW201225697A (en) |
Cited By (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN104662861A (en) * | 2012-07-13 | 2015-05-27 | 交互数字专利控股公司 | Methods and systems for authenticating a user of a wireless unit |
| TWI488479B (en) * | 2012-11-02 | 2015-06-11 | Keypasco Ab | Secure distributed dynamic url |
| US9124571B1 (en) | 2014-02-24 | 2015-09-01 | Keypasco Ab | Network authentication method for secure user identity verification |
| CN108337227A (en) * | 2017-12-22 | 2018-07-27 | 北京深思数盾科技股份有限公司 | Method and middleware based on OpenID account login application programs |
-
2011
- 2011-09-20 TW TW100133738A patent/TW201225697A/en unknown
Cited By (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN104662861A (en) * | 2012-07-13 | 2015-05-27 | 交互数字专利控股公司 | Methods and systems for authenticating a user of a wireless unit |
| TWI488479B (en) * | 2012-11-02 | 2015-06-11 | Keypasco Ab | Secure distributed dynamic url |
| US9124571B1 (en) | 2014-02-24 | 2015-09-01 | Keypasco Ab | Network authentication method for secure user identity verification |
| CN108337227A (en) * | 2017-12-22 | 2018-07-27 | 北京深思数盾科技股份有限公司 | Method and middleware based on OpenID account login application programs |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US9185560B2 (en) | Identity management on a wireless device | |
| TWI514896B (en) | Method and apparatus for trusted federated identity | |
| KR101636028B1 (en) | Identity management with local functionality | |
| TWI538463B (en) | Ensure network communication system and method | |
| US9237142B2 (en) | Client and server group SSO with local openID | |
| KR101670973B1 (en) | Methods and systems for authenticating a user of a wireless unit | |
| US20150319156A1 (en) | Independent identity management systems | |
| TW201225697A (en) | Identity management on a wireless device | |
| HK1175906A (en) | Method and apparatus for trusted federated identity |