ATIS 1000030-2008 Authentication and Authorization Requirements for Next Generation Network (NGN).pdf
《ATIS 1000030-2008 Authentication and Authorization Requirements for Next Generation Network (NGN).pdf》由会员分享,可在线阅读,更多相关《ATIS 1000030-2008 Authentication and Authorization Requirements for Next Generation Network (NGN).pdf(68页珍藏版)》请在麦多课文档分享上搜索。
1、 AMERICAN NATIONAL STANDARD FOR TELECOMMUNICATIONS ATIS-1000030.2008(R2013) Authentication and Authorization Requirements for Next Generation Network (NGN) As a leading technology and solutions development organization, ATIS brings together the top global ICT companies to advance the industrys most-
2、pressing business priorities. Through ATIS committees and forums, nearly 200 companies address cloud services, device solutions, emergency services, M2M communications, cyber security, ehealth, network evolution, quality of service, billing support, operations, and more. These priorities follow a fa
3、st-track development lifecycle from design and innovation through solutions that include standards, specifications, requirements, business use cases, software toolkits, and interoperability testing. ATIS is accredited by the American National Standards Institute (ANSI). ATIS is the North American Or
4、ganizational Partner for the 3rd Generation Partnership Project (3GPP), a founding Partner of oneM2M, a member and major U.S. contributor to the International Telecommunication Union (ITU) Radio and Telecommunications sectors, and a member of the Inter-American Telecommunication Commission (CITEL).
5、For more information, visit. AMERICAN NATIONAL STANDARD Approval of an American National Standard requires review by ANSI that the requirements for due process, consensus, and other criteria for approval have been met by the standards developer. Consensus is established when, in the judgment of the
6、ANSI Board of Standards Review, substantial agreement has been reached by directly and materially affected interests. Substantial agreement means much more than a simple majority, but not necessarily unanimity. Consensus requires that all views and objections be considered, and that a concerted effo
7、rt be made towards their resolution. The use of American National Standards is completely voluntary; their existence does not in any respect preclude anyone, whether he has approved the standards or not, from manufacturing, marketing, purchasing, or using products, processes, or procedures not confo
8、rming to the standards. The American National Standards Institute does not develop standards and will in no circumstances give an interpretation of any American National Standard. Moreover, no person shall have the right or authority to issue an interpretation of an American National Standard in the
9、 name of the American National Standards Institute. Requests for interpretations should be addressed to the secretariat or sponsor whose name appears on the title page of this standard. CAUTION NOTICE: This American National Standard may be revised or withdrawn at any time. The procedures of the Ame
10、rican National Standards Institute require that action be taken periodically to reaffirm, revise, or withdraw this standard. Purchasers of American National Standards may receive current information on all standards by calling or writing the American National Standards Institute. Notice of Disclaime
11、r and the principal is the source of a data item available to the verifier (data origin authentication). Entity authentication provides corroboration of the identity of a principal, within the context of a communication relationship. The principals authenticated identity is assured only when an auth
12、entication service is invoked. ATIS-1000030.2008 7 Notes: 1. When using data origin authentication, it is also necessary to have adequate assurance that the data has not been modified. This may be accomplished by using an integrity service, for example: by using environments in which data cannot be
13、altered; by verifying that the data received matches a digital fingerprint of the data sent; by using a digital signature mechanism; or by using a symmetric cryptographic algorithm. 2. The term “communications relationship” used in defining entity authentication may be interpreted in a broad way and
14、 could refer, for example, to an OSI connection, inter-process communication, or interaction between a user and a terminal. 5.1.2 Identifiers A principal is an entity whose identity can be authenticated. A principal has one or more distinguishing identifiers associated with it. Authentication servic
15、es are used by an entity to verify purported identities of principals. A principals identity which has been so verified is called an authenticated identity. Similarly, a principal whose identity has been verified is called an authenticated entity. Examples of principals that can be identified and he
16、nce authenticated are, but are not limited to: human users; NGN providers; processes; real open systems; OSI layer entities; enterprises, and flows in the bearer, signalling and management traffic. Distinguishing identifiers are used to unambiguous claim an identity within a given security domain. D
17、istinguishing identifiers distinguish a principal from others in the same domain, in one of two ways: 1. by virtue of membership in a group of entities considered equivalent for purposes of authentication (in this case the entire group is considered to be one principal and has one distinguishing ide
18、ntifier); or 2. by identifying one and only one entity. When authentication takes place between different security domains, a distinguishing identifier may not be sufficient to unambiguously identify an entity, as different security domain authorities may use the same distinguishing identifiers. In
19、this case, distinguishing identifiers have to be used in conjunction with a security domain identifier in order to provide an unambiguous identifier for the entity. ATIS-1000030.2008 8 LegacyTerminalsNote: Gateway (GW) may exist in either Transport Stratum or End-User Functions.*LegacyTerminalsTrans
20、port StratumService StratumEnd-UserFunctionsApplication FunctionsCore transport FunctionsNGNTerminals CustomerNetworksOtherNetworksApplication Support Functions and Service Support FunctionsCore TransportFunctions OtherNetworksEdgeFunctions Access Transport FunctionsServiceControl FunctionsNetwork A
21、ccessAttachment FunctionsNetwork Attachment Control Functions(NACF)ccess NetworkFunctions Resource and AdmissionControl Functions (RACF)UserProfileFunctionsT. UserProfileFunctionsGWOther NGN ServiceComponentsPSTN / ISDN EmulationService ComponentIP Multimedia Component network addresses; AP-titles a
22、nd AE-titles; object identifiers; names of persons (unambiguous within the context of the domain); quintuples that contain: o source IP address, o destination IP address, o source port number, o destination port number, and o protocol number. 5.1.3 Authentication Entities The term “claimant” is used
23、 to describe the entity which is or represents a principal for the purposes of authentication. A claimant includes the functions necessary for engaging in an authentication exchange on behalf of a principal. ATIS-1000030.2008 9 The term “verifier” is used to describe the entity which is or represent
24、s the entity requiring an authenticated identity. A verifier includes the functions necessary for engaging in an authentication exchange to request verification of a claimed identity. An entity involved in mutual authentication will assume both claimant and verifier roles. The term “trusted third pa
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ATIS10000302008AUTHENTICATIONANDAUTHORIZATIONREQUIREMENTSFORNEXTGENERATIONNETWORKNGNPDF
链接地址:http://www.mydoc123.com/p-541442.html