Authentication of HTTP Applications

ABSTRACT

An apparatus such as an HTTP proxy server compares information of a request by HTTP client logic with a known pattern of information for the client logic. When the information of the request matches the known pattern, the HTTP proxy server causes content and/or software to be communicated to the client in response to the request. Depending upon the results of the comparison, the HTTP proxy may also validate or invalidate the request before communicating it to the server.

TECHNICAL FIELD

The present disclosure relates to software application authentication.

BACKGROUND

Software and content piracy are significant problems. Each year, artistsand software developers lose large sums of money to pirates whoduplicate and/or distribute software and content without reimbursementto the owners. The advent of large-scale computing networks, such as theInternet, has exacerbated the problem, because content and software maybe duplicated and distributed by pirates quickly and easily over largegeographic areas.

Increasingly, content and software are being made available via wirelesstelephones. Wireless telephones are devices capable of transmitting andreceiving voice and/or data (non-voice) information to and from anetwork without the use of wires, cables, or other tangible transmissionmedia. So-called cellular telephones are a common example of wirelessphones.

Wireless telephones and the networks by which they communicate operateaccording to various technologies, including analog mobile phone service(AMPS), circuit switching, packet switching, wireless local area network(WLAN) protocols such as IEEE 802.11 compliant networks, wirelesswide-area networks (WWAN), short-range RF systems such as Bluetooth,code division multiple access (CDMA), time division multiple access(TDMA), frequency-division multiplexing (FDM), spread-spectrum, globalsystem for mobile communications (GSM), high-speed circuit-switched data(HCSD), general packet radio system (GPRS), enhanced data GSMenvironment (EDGE), and universal mobile telecommunications service(UMTS). Of course, these are only examples, and other technologies maybe employed in wireless communication as well.

Herein, the term ‘wireless device’ is meant to include wirelesstelephones (including cellular, mobile, and satellite telephones), andalso to include a variety of other wireless devices, including wirelessweb-access telephones, automobile, laptop, and desktop computers thatcommunicate wirelessly, and wireless personal digital assistants (PDAs).In general, the term ‘wireless device’ refers to any device withwireless communication capabilities. A wireless device may be a ‘clientdevice’, which is any device that provides requests for services from anetwork. A ‘server device’ is a device of the network that receives andresponds to client device requests. Of course, depending upon thecircumstances, a client device may act as a server device, and viceversa.

Many companies produce wireless telephones and other wireless devices.Among the more well-known producers are Nokia®, Ericsson®, Motorola®,Panasonic®, Palm® Computer, and Handspring®. A variety of producers alsoprovide wireless devices comprising versions of the Microsoft® Windows®operating software.

One method of content and software duplication involves “downloading”,whereby a client device (such as a personal computer, music player,wireless telephone, and so on) communicates with a server device toobtain a copy of content and/or software available via the serverdevice. Various protocols are available for downloading, includingHypertext Transfer Protocol (HTTP) and File Transfer Protocol (FTP).

Client logic is software of the client device that makes requests to theserver for content/software. To prevent unauthorized behavior and/orpiracy, the server may authenticate the client logic before fulfillingthe requests. Where the client and server communicate via HTTP, theserver may refer to the “User Agent” HTTP header for an identificationof the client logic. For example, the HTTP header may identify theclient logic as “WAP Browser for Nokia Phones version 1.5”. The servermay provide the requested content/software only to authorized clientlogic. Communication service providers (such as AT&T Wireless Servicesand other entities that provide wireless communications to subscribers)may enter into arrangements with content and software providers toprovide content and/or software for subscribers of the serviceproviders. Thus, content and software (such as ring tones and games fora wireless telephone) may be provided by the server to a “WAP Browserfor Phones” but not to another browser application that is notauthorized to receive this content and software.

A problem with this approach is that authorized client logic may be“spoofed” by unauthorized client logic. For example, HTTP client logicmay set the User-Agent header to identify itself to an HTTP server as anauthorized client logic for content and software, when in fact theapplication is not so authorized.

SUMMARY

The following summary is intended to highlight and introduce someaspects of the disclosed embodiments, but not to limit the scope of theinvention. Thereafter, a detailed description of illustrated embodimentsis presented, which will permit one skilled in the relevant art to makeand use aspects of the invention. One skilled in the relevant art canobtain a full appreciation of aspects of the invention from thesubsequent detailed description, read together with the figures, andfrom the claims (which follow the detailed description).

An apparatus acting as an HTTP proxy server, such as a WirelessApplication Protocol (WAP) proxy/gateway, compares information of arequest by client logic with a known pattern of information for an HTTPclient logic, and when the information of the request matches the knownpattern, causes content and/or software to be communicated to the clientin response to the request. The apparatus may apply informationprovisioned to a client device comprising the HTTP client (such as awireless phone or other wireless device) to interpret at least a portionof the information of the request. The interpreted information of therequest may be compared to information of the request identifying theclient logic. The HTTP proxy may also validate or invalidate the requestaccording to the result of the comparison.

BRIEF DESCRIPTION OF THE DRAWINGS

The headings provided herein are for convenience only and do notnecessarily affect the scope or meaning of the claimed invention.

In the drawings, the same reference numbers and acronyms identifyelements or acts with the same or similar functionality for ease ofunderstanding and convenience. To easily identify the discussion of anyparticular element or act, the most significant digit or digits in areference number refer to the figure number in which that element isfirst introduced.

FIG. 1 is a block diagram of an embodiment of an HTTP communicationarrangement.

FIG. 2 is a block diagram of an embodiment of a client device.

FIG. 3 is a block diagram of an embodiment of an HTTP proxy.

FIG. 4 is a block diagram of an embodiment of a wireless communicationnetwork.

FIG. 5 is a block diagram of an embodiment of a coupling of a wirelessnetwork to an HTTP network.

FIG. 6 is an action diagram of an embodiment of a method ofauthenticating an HTTP application.

FIG. 7 is a flow chart of an embodiment of authenticating an HTTPapplication.

FIG. 8 is a flow chart of an embodiment of a method of authenticating anapplication according to the total content of a protocol request.

DETAILED DESCRIPTION

The invention will now be described with respect to various embodiments.The following description provides specific details for a thoroughunderstanding of, and enabling description for, these embodiments of theinvention. However, one skilled in the art will understand that theinvention may be practiced without these details. In other instances,well known structures and functions have not been shown or described indetail to avoid unnecessarily obscuring the description of theembodiments of the invention. References to “one embodiment” or “anembodiment” do not necessarily refer to the same embodiment, althoughthey may.

Unless the context clearly requires otherwise, throughout thedescription and the claims, the words “comprise,” “comprising,” and thelike are to be construed in an inclusive sense as opposed to anexclusive or exhaustive sense; that is to say, in the sense of“including, but not limited to.” Words using the singular or pluralnumber also include the plural or singular number respectively.Additionally, the words “herein,” “above,” “below” and words of similarimport, when used in this application, shall refer to this applicationas a whole and not to any particular portions of this application. Whenthe claims use the word “or” in reference to a list of two or moreitems, that word covers all of the following interpretations of theword: any of the items in the list, all of the items in the list and anycombination of the items in the list.

Herein, “logic” refers to any information having the form of instructionsignals and/or data that may be applied to affect the operation of aprocessing device (processor). Examples of processors are computer CPUs(central processing units), microprocessors, digital signal processors,controllers and microcontrollers, and so on. Logic may be formed fromsignals stored in a device memory. Software is one example of suchlogic. Examples of device memories that may comprise logic include RAM(random access memory), flash memories, ROMS (read-only memories),EPROMS (erasable programmable read-only memories), and EEPROMS. Logicmay also be comprised by digital and/or analog hardware circuits, forexample, hardware circuits comprising logical AND, OR, XOR, NAND, NOR,and other logical operations. Herein, software is distinguished fromhardware in that software does not comprise hardware elements, whereaslogic may be formed from combinations of software and hardware.

FIG. 1 is a block diagram of an embodiment of an HTTP communicationarrangement. A client device 102 comprises HTTP client logic 104, e.g.logic to provide HTTP communications with a server. The client device102 communicates (wirelessly or via wires, cables, or other means) withan HTTP proxy 106. The HTTP proxy 106 represents the HTTP client 102 inHTTP communications with the network 108 (providing anonymity, security,and other benefits). The network 108 provides for communications betweenthe HTTP proxy 106 and an HTTP server 110. The HTTP server 110 providesthe HTTP client 104 with access to content and/or software via HTTPcommunications.

FIG. 2 is a block diagram of an embodiment of a client device. Theclient device 102 comprises the HTTP client 104, provision information210, operational logic 205, a processor 204, and a Subscriber IdentityModule (SIM) 202. The SIM 202 identifies a subscriber of the network 108by which the client device 102 communicates. A “subscriber” representsone or more persons or entities (corporations, partnerships, agents,operators, etc.) with access privileges to the network 108. A subscribermay be or represent a single user, or may represent one or more users.“User” refers to any person (or, conceivably, autonomous orsemi-autonomous logic) with access privileges to the network 108.Typically the user is the operator of the client device 102, although auser could also be the operator of a device or devices that provideservices via the network.

Some client devices 102 may not employ a SIM 202. In such devices asubscriber is typically associated with the client device 102 via logic205 of the client device.

The logic 205 is applied to the processor to operate the client device102. The HTTP client logic 104 is applied to the processor to provideHTTP communication with the network 108.

The provision information 210 is information communicated from thenetwork 108 to the client device 102 and stored therein. For example,the provision information 210 may include an International MobileStation Identifier (IMSI) for the device.

In some embodiments, the SIM 202 comprises a processor 214 and logic212. The logic 212 of the SIM 202 may be applied to the processor 214 tooperate the SIM 202 in cooperation with the operation of the clientdevice 102. The SIM 202 may also comprise provision information 210.When the provision information 210 is comprised by the SIM 202, theprovision information 210 may be portable among different client devices102 (by decoupling the SIM 202 from one device and coupling it withanother). When no SIM is present, the provision information 210 iscomprised by the client device 102.

FIG. 3 is a block diagram of an embodiment of an HTTP proxy 106. Theproxy 106 comprises a processor 306 and HTTP proxy logic 304 that, whenapplied to the processor 306, provides HTTP proxy services, may alsoperform authentication of the HTTP client 104 as described herein. Theproxy 106 comprises at least one port 308 by which HTTP communicationsmay take place.

FIG. 4 is a block diagram of an embodiment of a GSM network. Other typesof communications networks, such as GPRS networks and networks of mixedtechnology, may also be employed. In the GSM network, a client device102 communicates with a base station subsystem (BSS) 445 comprising basestation controllers (BSC) 420 coupled to one or more base transceiverstations (BTS) 425. In turn, each BTS 425 is coupled to one or antennae430.

The BTS 425 includes transmitting and receiving equipment to create aradio interface between the wireless network and terminal devices.Although the antennae 430 are shown as separate elements for clarity, itis common in the industry to collectively refer to the antennae 430,transmitter, and receiver, as the BTS.

The BSC 420 may perform management of the radio interface by allocatingchannels, managing handover from one BTS to another, paging the wirelessdevice, and transmitting connection-related signaling data.

The networking and switching subsystem (NSS) 435 of a wireless networkcomprises a Mobile Switching Center (MSC) 440, a Home Location Registry(HLR) 445, and a Visitor Location Registry (VLR) 450. Switching andnetwork management functions are carried out by the NSS 435. The NSS 435may also act as a gateway between the wireless network and othernetworks such as the Public Switched Telephone Network (PSTN),Integrated Services Digital Network (ISDN), the Internet, corporateintranets, other wireless networks, and the Public Data Network (PDN).

The MSC 440 is a switching mechanism that routes communications andmanages the network. In GPRS networks, GPRS support nodes (GSNs) such asSwitching GSNs (SGSNs) and Gateway GSNs (GGSNs) may provide switchingoperations similar to those provided by the MSC 440. There can be manyswitches 440 in a communication network, each responsible for thesignaling required to set up, maintain, and terminate connections towireless devices within the geographical area served by the switch 440.Each MSC (switch) 440 may manage several BSC 420. The MSC 440 is coupledto a Home Location Registry (HLR) 445 and a Visitor Location Registry(VLR) 450. The HLR 445 is also coupled to the VLR 450. The HLR 445 andVLR 450 may comprise certain dynamic or temporary subscriber data suchas current Location Area (LA) of the subscriber's mobile station andMobile Station Roaming Number (MSRN). Subscriber-related data isrecorded in the HLR 445 from which billing and administrativeinformation is extracted when needed by the cellular service provider.Some wireless networks have only one HLR 445 that serves allsubscribers; others have multiple HLRs.

The MSC 440 uses the VLR 450 to manage the wireless devices that arecurrently roaming in the area controlled by the MSC 440. The VLR 450stores information such as the International Mobile Subscriber Identity(IMSI), authentication data, and telephone number of the roamingwireless devices. The VLR 450 may obtain and comprise subscriberinformation, such as information about the services to which a roamingwireless device is entitled, from the HLR that serves the wirelessdevice. The VLR 450 controls a pool of MSRN and allocates an MSRN andTMSI to the roaming wireless device. The VLR 450 sends the MSRN andTemporary Mobile Subscriber Identity (TMSI) information to the HLR 445where they are stored with the subscriber's dynamic records for lateruse in call routing.

The operation subsystem (OSS) 455 may include an Equipment IdentityRegister (EIR) 460, an Authentication Center (AuC) 465, and an Operatingand Maintenance Center (OMC) 470. The OSS 455 may provide subscriptionmanagement, network operation, network maintenance, and mobile equipmentmanagement.

The AuC 465 stores data related to network security and authenticationof wireless devices and subscribers. A purpose of the AuC 465 is toprevent fraud by verifying the identity of subscribers and/or devicesthat try to access the network. Thus the AuC 465 may compriseauthentication algorithms and encryption codes necessary to protect asubscriber's access rights and identity and to prevent eavesdropping.

The EIR 460 is a database which stores International Mobile EquipmentIdentity (IMEI) numbers. Wireless devices are uniquely identified by anIMEI or equivalent number such as an Electronic Serial Number (ESN). AnEIR 460 generally indicates the status of a particular wireless deviceby flagging the IMEI of a device identified stolen, suspended, ormalfunctioning.

The OMC 470 monitors and controls other network elements to enhancesystem performance and quality. The OMC 470 also administers billing,subscriber service data, and generation of statistical data on the stateand capacity of the network.

FIG. 5 is a block diagram of an embodiment of a coupling of a network toan HTTP network. An HTTP network 504 is a network by which HTTPcommunication may take place. The network 108 is coupled to an HTTPproxy 502, by which the network 108 may communicate with the HTTPnetwork 504. The HTTP proxy 502 provides an interface between wirelessnetwork protocols and services, and Internet protocols and services. Forexample, the HTTP proxy 502 could provide an interface wherebycommunications from the HTTP server 110 involving Internet Protocol(IP), HTTP, and/or FTP, to name just a few, are communicated to thenetwork 108 via Signaling System 7 (SS7) or other network communicationmethods. Communications from the network 108 involving SS7 or otherwireless network protocols may likewise by converted by the HTTP proxy502 to protocols supported by the HTTP network 504.

FIG. 6 is an action diagram of an embodiment of a method ofauthenticating client logic. At 604 a network, such as a wirelessnetwork, communicates provision information to a client, and the clientstores the provision information at 606. At 608 the client communicatesa request to the server (e.g. an HTTP proxy server, or the HTTP serveritself). The request comprises particular headers, in a particularsequence, comprising particular values. The client may include at leastsome of the provision information in the request. At 610 the serverauthenticates the client logic according to the information provided inthe request. For example, the particular headers, sequence of theparticular headers, and content of the particular headers provided inthe request may strongly identify particular client logic. At 612content (and/or software) requested by the client is provided by theserver to the client, provided that the client is authenticated as aclient that is authorized to receive the content and/or software.

FIG. 7 is a flow chart of an embodiment of a method of authenticatingclient logic. At 702 the request information is provided to a server. At704 a check is made to determine whether header types and/or headerorder and/or header content of the request matches known header patternsof a client that is authorized to receive the requested content (and/orsoftware). If there is a match with an authorized client, the request isvalidated at 705, and in response to the valid request, the content isprovided at 706. A Otherwise the request is invalidated at 707, thecontent is not provided, and the method concludes at 708. A validatedrequest is a request that has a form and content such that the serveracts to fulfill the request. For example, a validated request maycontain a key or other authentication information to indicate that therequest comes from an authorized client and should be fulfilled.

By way of example, HTTP client logic conforming to Wireless ApplicationProtocol Version 2.0 (WAP2) may communicate an HTTP request as a seriesof text strings separated by carriage return and line feed characters(e.g. lines). The first line may be the HTTP method (e.g. GET, HEAD,POST, etc.) containing the Universal Resource Identifier (URI) and theprotocol version. The method line may be followed by a series of headerlines, then the body of the request (the body is typically only presentwhen uploading data via the “POST” or “PUT” methods). In general,various headers may be provided, in different orders, with differingvalues. However, at least some of the set of headers provided, and theheader order, and the header values, are predictable for specific HTTPclients. The following sets of headers, header order, and header valuesmay be provided by a WAP2 browser:

GET http://home/ HTTP/ 1.1 Accept: text/vnd.wap.wml,application/vnd.wap.wmlscriptc, application/*, application/xhtml+xml,image/vnd.wap.wbmp, image/gif, image/jpeg, image/png, text/html, text/x-vCalendar, text/x-vCard, text/css, multipart/*, text/x-co- desc, text/vnAccept-Charset: ISO-8859-1, US-ASCII, UTF-8;q=0.800, ISO-10646-UCS-2;q=0.600 Accept-Language: English, Finnish x-wap-profile;http://myclient.profile.com/uaprof/myclient.xml Cookie2: $Version=“1”Proxy-Connection: Keep-Alive User-Agent: myclient/2.0 Profile/MIDP-1.0Configuration/CLDC- 1.0 Host: home

The “Accept” header identifies the MIME types (content formats)supported by the client logic and the client device that is executingthe client logic.

The “Accept-Charset” header identifies the character sets that theapplication supports.

The “Accept-Language” header identifies the languages that theapplication supports.

The “x-wap-profile” header is a WAP2-specific header that identifies thelocation of the User Agent Profile (detailed device capabilityinformation) for the client device.

The “Cookie2” header advises the HTTP server that the applicationunderstands “new-style” cookies.

The “Proxy-Connection” header requests that the HTTP server keep theconnection open between the application and the server, by communicatingperiodic Transmission Control Protocol (TCP) “keep-alive” packets.

The “User-Agent” header identifies the HTTP client logic, and is uniqueto the client logic. It may include information about the vendor, clientcode source, version, and client device.

The “Host” header is a request-specific header that identifies where therequested URI is located.

The HTTP client may provide a header including information derived fromprovision information. The following is one example of such a header.

x-ATTWS-client: vgxuyg239y0fcwecx235136scxdw0988iwuefc0iajs0fcqe0ciq

The header is named “x-ATTWS-client”, but it could have any namedifferent than the names of other headers. The value“vgxuyg239y0fcwecx235136scxdw0988iwuefc0iajs0fcqe0ciq” may be an encodedrepresentation of the User Agent or other header. The encoding may bebased upon provision information, such as the IMSI. The HTTP proxy mayinterpret the header and compare the result with the User Agent headerprovided by the HTTP client, to authenticate the HTTP client.

The value “vgxuyg239y0fcwecx235136scxdw0988iwuefc0iajs0fcqe0ciq” mayalso be a secret, predetermined “signature” value provisioned in theclient device (communicated from the network to the client device andstored therein).

Although various examples are presented involving HTTP as used by WAP2clients, similar techniques may be applied to any communicationprotocol. For example, the header set, sequence, and content of a WAPVersion 1.2.1 Wireless Session Protocol (WSP) connect request may beexamined to authenticate a WSP client.

FIG. 8 is a flow chart of an embodiment of a method of authenticatingclient logic according to the total content (header set, header order,and header content) of a protocol request. At 802 a total is set to zeroor some other initial value. At 804 it is determined whether there aremore header bytes to consider. If not, the method concludes at 812. Ifthere are more header bytes to consider, a check is made at 806 todetermine whether the byte under consideration is an odd number or evennumbered byte. If the byte under consideration is an odd numbered byte,the byte value is added to the total at 808. Otherwise the byte value issubtracted from the total at 810. The final total provides a reasonableauthentication of the client logic according to the entire content ofthe request.

Of course, header information may be processed in information unitsother than bytes. For example, header information may be processed inwords, double words, and so on, depending upon the nature andrequirements of the processor and software employed.

1. A method comprising: comparing information of a request by clientlogic with a known pattern of information for the client logic; and whenthe information of the request matches the known pattern, causing atleast one of content and software to be communicated to the client logicin response to the request. 2.-23. (canceled)