Abstract:
The idea of the present invention is to replace the existing password/user ID based authentication process by a new digital signature authentication process in which preferably the first HTTP-request header is extended by the client authentication information independently of the authentication process used by the destination server and without server requesting authentication information. The authentication information preferably includes the client certificate containing the client public key, signed by certification authority, and preferably a hash value calculated over the HTTP-request header data being sent in the request, and encrypted with the Client's private key. The certificate and digital signature may be added during the creation of the HTTP-request header in the client system itself, or may be added later in a server acting as a gateway, proxy, or tunnel. A destination server that does not support the new digital signature authentication process will simply ignore the certificate and digital signature in the HTTP-request header and will automatically initiate its own authentication process. The present invention simplifies the existing digital signature authentication process and concurrently allows the coexistence of different authentication processes without changing the HTTP-protocol or causing unnecessary network traffic.
Abstract:
The idea of the present invention is to replace the existing password/user ID based authentication process by a new digital signature authentication process in which preferably the first HTTP-request header is extended by the client authentication information independently of the authentication process used by the destination server and without server requesting authentication information. The authentication information preferably includes the client certificate containing the client public key, signed by certification authority, and preferably a hash value calculated over the HTTP-request header data being sent in the request, and encrypted with the Client's private key. The certificate and digital signature may be added during the creation of the HTTP-request header in the client system itself, or may be added later in a server acting as a gateway, proxy, or tunnel. A destination server that does not support the new digital signature authentication process will simply ignore the certificate and digital signature in the HTTP-request header and will automatically initiate its own authentication process. The present invention simplifies the existing digital signature authentication process and concurrently allows the coexistence of different authentication processes without changing the HTTP-protocol or causing unnecessary network traffic.
Abstract:
The idea of the present invention is to replace the existing password/user ID based authentication process by a new digital signature authentication process in which preferably the first HTTP-request header is extended by the client authentication information independently of the authentication process used by the destination server and without server requesting authentication information. The authentication information preferably includes the client certificate containing the client public key, signed by certification authority, and preferably a hash value calculated over the HTTP-request header data being sent in the request, and encrypted with the Client's private key. The certificate and digital signature may be added during the creation of the HTTP-request header in the client system itself, or may be added later in a server acting as a gateway, proxy, or tunnel. A destination server that does not support the new digital signature authentication process will simply ignore the certificate and digital signature in the HTTP-request header and will automatically initiate its own authentication process. The present invention simplifies the existing digital signature authentication process and concurrently allows the coexistence of different authentication processes without changing the HTTP-protocol or causing unnecessary network traffic.
Abstract:
A utilization method and system within a communication network comprises at least one service provider and at least one service consumer. In particular, a there is license contract method and system for validating web services during runtime. At least one parameter is provided to define, if and how many meter event requests associated with service requests may be stored in a cache memory. The parameter is predefined and may be contained in the license contract. Further, a counter may be provided for counting the service requests. The actual status of the counter is sent to the service consumer and/or the service provider.
Abstract:
The idea of the present invention is to replace the existing password/user ID based authentication process by a new digital signature authentication process in which preferably the first HTTP-request header is extended by the client authentication information independently of the authentication process used by the destination server and without server requesting authentication information. The authentication information preferably includes the client certificate containing the client public key, signed by certification authority, and preferably a hash value calculated over the HTTP-request header data being sent in the request, and encrypted with the Client's private key. The certificate and digital signature may be added during the creation of the HTTP-request header in the client system itself, or may be added later in a server acting as a gateway, proxy, or tunnel. A destination server that does not support the new digital signature authentication process will simply ignore the certificate and digital signature in the HTTP-request header and will automatically initiate its own authentication process. The present invention simplifies the existing digital signature authentication process and concurrently allows the coexistence of different authentication processes without changing the HTTP-protocol or causing unnecessary network traffic.
Abstract:
A utilization method and system within a communication network comprises at least one service provider and at least one service consumer. In particular, a there is license contract method and system for validating web services during runtime. At least one parameter is provided to define, if and how many meter event requests associated with service requests may be stored in a cache memory. The parameter is predefined and may be contained in the license contract. Further, a counter may be provided for counting the service requests. The actual status of the counter is sent to the service consumer and/or the service provider.
Abstract:
Un método de utilización dentro de una red de comunicación que comprende al menos un proveedor (36; 38) del servicio y al menos un consumidor (32) del servicio, en el que el proveedor (36; 38) del servicio proporciona servicios al consumidor (32) del servicio, comprendiendo dicho método los pasos de: a) recibir un mensaje de solicitud de servicio del consumidor (32) del servicio; b) generar una solicitud de suceso de medida asociada con la solicitud del servicio; c) comparar el contenido real de una memoria oculta (70) con al menos un parámetro (CEP, CFP); d) almacenar la solicitud de suceso de medida en la memoria oculta (70), si esto está permitido dependiendo de dicha comparación; o e) enviar la solicitud de suceso de medida y el contenido de la memoria oculta (70) a un servicio (52) de tarificación con el fin de procesar las solicitudes de suceso de medida, si la solicitud de suceso de medida no puede ser almacenada en la memoria oculta (70) dependiendo de dicha comparación; caracterizado porque dicho al menos un parámetro (CEP, CFP) está asociado con la solicitud del servicio y con un convenio predefinido, y dicho parámetro (CEP, CFP) define, si y cuántas solicitudes de suceso de medida pueden ser almacenadas en la memoria oculta (70).
Abstract:
A utilization method and system within a communication network comprises at least one service provider and at least one service consumer. In particular, a there is license contract method and system for validating web services during runtime. At least one parameter is provided to define, if and how many meter event requests associated with service requests may be stored in a cache memory. The parameter is predefined and may be contained in the license contract. Further, a counter may be provided for counting the service requests. The actual status of the counter is sent to the service consumer and/or the service provider.