Device and method for providing bootstrapped application authentication
09729529 ยท 2017-08-08
Assignee
Inventors
Cpc classification
H04L63/062
ELECTRICITY
H04W80/10
ELECTRICITY
H04W12/04
ELECTRICITY
International classification
Abstract
The present invention provides a device and a method in a device for authenticating the device for use in a network. The method includes requesting a first security context for use in securing a first type of communication, where as part of requesting the first security context, a second security context is jointly requested for use in securing a second type of communication. The first security context is then received and used to provide secure access and communication via the first type of communication. The second security context is then received and used to provide secure access and communication via the second type of communication.
Claims
1. A method in a device for authenticating the device for use in a network comprising: transmitting a first request to a serving call session control function, the first request jointly requesting a first security context for use in securing a first type of communication and a second security context for use in securing a second type of communication, the first request initiating a proxy on behalf of the device to obtain authorization for the first security context and in parallel to obtain authorization from a bootstrapping server function for the second security context; receiving the first security context in response to the first request, and using the first security context to provide secure access and communication via the first type of communication; and receiving the second security context in response to the first request, and using the second security context to provide secure access and communication via the second type of communication.
2. A method in accordance with claim 1 wherein the request for the second security context is encoded as one or more parameters associated with the request for the first security context.
3. A method in accordance with claim 2 wherein the one or more parameters include information identifying that the user device is requesting authentication for a second security context and information used to execute the authentication protocol in support of requesting the second security context.
4. A method in accordance with claim 1 wherein the request for the first security context is part of a request to establish a session initiation protocol (SIP) type communication connection.
5. A method in accordance with claim 1 wherein the first security context is an Internet protocol multimedia subsystem (IMS) security context.
6. A method in accordance with claim 1 wherein the request for the first security context includes an authentication and a key agreement in support of communications of a first type.
7. A method in accordance with claim 1 wherein the request for the second security context is part of a request to establish a communication connection with a network application function.
8. A method in accordance with claim 7 wherein the network application function includes one or more of accessing a server to modify multimedia telephony settings.
9. A method in accordance with claim 7 wherein the network application function includes one or more of accessing a server to change presence preferences.
10. A method in accordance with claim 7 wherein the network application function includes one or more of accessing a server to pull policies from a server.
11. A method in accordance with claim 7 wherein the network application function includes one or more of accessing a server to request a certificate from a server.
12. A method in accordance with claim 7 wherein the network application function includes one or more of accessing a server to create or edit a resource list on a server.
13. A method in accordance with claim 1 wherein the second security context is a bootstrapped security context.
14. A method in accordance with claim 1 wherein the request for the second security context includes an authentication and a key agreement in support of communications of a second type.
15. A method in accordance with claim 1 wherein the entity which provides the authentication for the first security context includes a proxy, which acts on behalf of the device for requesting authentication for the second security context.
16. A wireless communication device comprising: a user input adapted for receiving a request to initiate a network service; a transceiver adapted for communicating with a network; and a processor coupled to the user input and the transceiver, the processor for generating a first request to a serving call session control function jointly seeking a first security context for use in securing a first type of communication and a second security context for use in securing a second type of communication, the first request initiating a proxy on behalf of the device to obtain authorization for the first security context and in parallel to obtain authorization from a bootstrapping server function for the second security context; wherein the first request is transmitted by the transceiver; and wherein the transceiver receives the first security context in response to the first request and receiving the second security context in response to the first request; and the processor adapted for using the first security context to provide secure access and communication via the first type of communication; and using the second security context to provide secure access and communication via the second type of communication.
17. A wireless communication device in accordance with claim 16 wherein the wireless communication device is a radio frequency telephone.
18. A wireless communication device in accordance with claim 17 wherein the radio frequency telephone is a cellular telephone.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
(1)
(2)
(3)
(4)
(5)
(6)
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT(S)
(7) While the present invention is susceptible of embodiment in various forms, there is shown in the drawings and will hereinafter be described presently preferred embodiments with the understanding that the present disclosure is to be considered an exemplification of the invention and is not intended to limit the invention to the specific embodiments illustrated.
(8)
(9) In the illustrated embodiment, the illustrated prior system includes a user device 12, and a Serving Call Session Control Function (S-CSCF) 14 with which the user device 12 is authenticated as part of an IMS registration. However, as noted above in some circumstances, interaction with some IMS application will require a further registration, in some instances identified as bootstrapping authentication. The further authentication includes the user device communicating with the Bootstrapping Server Function (BSF) 16 in order to create a security context including bootstrapped keys (i.e. temporary username/password), which can then be used as part of a second authentication with the appropriate Network Application Function (NAF) 18, which is often managed as part of an application server. As part of being authenticated with the NAF 18, the NAF communicates with the BSF 16 in order to receive bootstrapping key material, which can be used as part of the authentication of the user device 12.
(10) Such an arrangement involves AKA authentication as part of the IMS registration using SIP, and as part of the bootstrap authentication using HTTP, which substantially involves a largely duplicative challenge and response process, as part of the authentication.
(11) Alternatively,
(12) Similar to the system 10 illustrated in
(13)
(14) In connection with performing an authentication as part of the IMS registration, or as part of obtaining a security context in connection with creating the bootstrap keys, both of the serving call session control function 114 and the bootstrapping server function 116 communicate with the home subscriber server 208 in order to retrieve identification information needed to confirm the identity of the user device 112 including retrieving one or more AKA vectors containing both key material and information used to challenge the user device 112, as part of the issuance of the respective security context.
(15)
(16) The serving call session control function 114 then communicates with the home subscriber server 208 to get authorization vectors 304 for the first security context, which might include an authorization request and an authorization response. In parallel, the proxy 120 existing in the serving call session control function 114 and operating on behalf of the user device 112 initiates an HTTP Get 306 with the bootstrapping server function 116. The bootstrapping server function 116 then communicates with the home subscriber server 208 to get authorization vectors 308 for the second security context.
(17) The bootstrapping server function 116 then returns a challenge to the proxy 120 in the serving call session control function 114, which challenges the identity of the user device 112. The serving call session control function 114 then forwards the two challenges 312 to the user device 112 in support of both the IMS registration and the request for the bootstrapped security context. The user device 112 then responds with suitable responses 314 to both challenges 312, which confirms the user device's identity to the serving call session control function 114 and the bootstrapping server function 116. The serving call session control function 114 verifies the response for the first security context and then registers the user device for IMS services and downloads 316 the user's profile.
(18) The proxy in the serving call session control function 114 then executes a further HTTP get 318, which includes an appropriate response for the second security context to the previous challenge from the bootstrapping server function 116, and receives 320 the requested security context from the bootstrapping server function 116. The security context from the bootstrapping server function 116, as well as a security context from the serving call session control function 114 is then returned 322 to the user device in support of future communications between the user device 112 and the serving call session control function 114 via the proxy call session control function 206, and in support of future communications between the user device 112 and an application server or network application function 118 without needing to first perform a separate request.
(19) One of the advantages in merging the two requests, is the elimination of the need to separately support AKA as part of an HTTP client, which would otherwise be necessary to support the direct request between the user device 112 and the bootstrapping server function 116. A further benefit is the ability of the user device 112 to jointly maintain both security contexts through an interaction with the serving call session control function 114, which in turn communicates with the bootstrapping server function 116 via the proxy 120.
(20) The message sequence 300, illustrated in
(21)
(22) In some embodiments, the processor 406 could be implemented in the form of a microprocessor, which is adapted to execute one or more sets of prestored instructions 412, which may be used to form at least part of one or more processor modules 408 and 410. The one or more sets of prestored instructions 412 may be stored in a storage element 414, which is either integrated as part of the processor or is coupled to the processor 406. The storage element 414 can include one or more forms of volatile and/or non-volatile memory, including conventional ROM, EPROM, RAM, or EEPROM. The storage element 414 may still further incorporate one or more forms of auxiliary storage, which is either fixed or removable, such as a harddrive or a floppydrive. One skilled in the art will still further appreciate, that still other further forms of memory could be used without departing from the teachings of the present invention. In the same or other instances, the processor 406 may incorporate state machines and/or logic circuitry, which can be used to implement at least partially, some of modules and their corresponding functionality.
(23)
(24) In at least one embodiment, the entity which provides the authentication for the first security context includes a proxy, which acts on behalf of the device for requesting authentication for the second security context.
(25) While the preferred embodiments of the invention have been illustrated and described, it is to be understood that the invention is not so limited. Numerous modifications, changes, variations, substitutions and equivalents will occur to those skilled in the art without departing from the spirit and scope of the present invention as defined by the appended claims.