A Proposal for Federation Technology for Authenticated Information between Terminals
Recently, various services such as television and the
Internet have come to be received through various terminals.
However, we could gain greater convenience by receiving these
services through cellular phone terminals when we go out and then
continuing to receive the same services through a large screen digital
television after we have come home. However, it is necessary to go
through the same authentication processing again when using TVs
after we have come home. In this study, we have developed an
authentication method that enables users to switch terminals in
environments in which the user receives service from a server through
a terminal. Specifically, the method simplifies the authentication of
the server side when switching from one terminal to another terminal
by using previously authenticated information.
[1] IETF RFC2109 HTTP State Management Mechanism
[2] IETF RFC2965 HTTP State Management Mechanism
[3] "Generic Authentication Architecture (GAA) Generic bootstrapping
architecture," 3GPP TS 33.220 3rd Generation Partnership Project
[4] IETF RFC 2617 HTTP Authentication: Basic and Digest Access
Authentication
[5] IETF RFC 2818 HTTP Over TLS
[6] IETF RFC 3310 Hypertext Transfer Protocol (HTTP) Digest
Authentication Using Authentication and Key Agreement (AKA)
[7] IETF RFC 4301 Security Architecture for the Internet Protocol
[8] IETF RFC 4302 IP Authentication Header
[9] IETF RFC 4303 IP Encapsulating Security Payload (ESP)
[10] IETF RFC 4306 Internet Key Exchange (IKEv2) Protocol
[11] IETF RFC 4807 IPsec Security Policy Database Configuration MIB
[12] IETF RFC 4809 Requirements for an IPsec Certificate IETF Management
Profile
[13] IETF RFC 4478 Repeated Authentication in Internet Key Exchange
(IKEv2) Protocol
[14] IETF RFC 3526 More Modular Exponential (MODP) Diffie-Hellman
groups for Internet Key Exchange (IKE)
[1] IETF RFC2109 HTTP State Management Mechanism
[2] IETF RFC2965 HTTP State Management Mechanism
[3] "Generic Authentication Architecture (GAA) Generic bootstrapping
architecture," 3GPP TS 33.220 3rd Generation Partnership Project
[4] IETF RFC 2617 HTTP Authentication: Basic and Digest Access
Authentication
[5] IETF RFC 2818 HTTP Over TLS
[6] IETF RFC 3310 Hypertext Transfer Protocol (HTTP) Digest
Authentication Using Authentication and Key Agreement (AKA)
[7] IETF RFC 4301 Security Architecture for the Internet Protocol
[8] IETF RFC 4302 IP Authentication Header
[9] IETF RFC 4303 IP Encapsulating Security Payload (ESP)
[10] IETF RFC 4306 Internet Key Exchange (IKEv2) Protocol
[11] IETF RFC 4807 IPsec Security Policy Database Configuration MIB
[12] IETF RFC 4809 Requirements for an IPsec Certificate IETF Management
Profile
[13] IETF RFC 4478 Repeated Authentication in Internet Key Exchange
(IKEv2) Protocol
[14] IETF RFC 3526 More Modular Exponential (MODP) Diffie-Hellman
groups for Internet Key Exchange (IKE)
@article{"International Journal of Information, Control and Computer Sciences:56740", author = "Katsuyuki Umezawa and Takashi Tashiro and Satoru Tezuka", title = "A Proposal for Federation Technology for Authenticated Information between Terminals", abstract = "Recently, various services such as television and the
Internet have come to be received through various terminals.
However, we could gain greater convenience by receiving these
services through cellular phone terminals when we go out and then
continuing to receive the same services through a large screen digital
television after we have come home. However, it is necessary to go
through the same authentication processing again when using TVs
after we have come home. In this study, we have developed an
authentication method that enables users to switch terminals in
environments in which the user receives service from a server through
a terminal. Specifically, the method simplifies the authentication of
the server side when switching from one terminal to another terminal
by using previously authenticated information.", keywords = "Authentication, Cookie, Federation, GBA, IPSec", volume = "4", number = "3", pages = "483-8", }