Method and apparatus for inter-verifying network between multi-medium sub-systems
A technology of multimedia subsystems and network entities, applied in the field of mobile network security, can solve the problems of attacking other users, the border router cannot identify, and the P-CSCF cannot generate charging information, etc., and achieves the effect of preventing fraud and good compatibility.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0097] When the UE is in the home zone, that is, in the non-roaming state, the UE sends a SIP message INVITE to the home zone P-CSCF, including the initial SDP. An initial SDP may contain one or more media. In the next step, the P-CSCF in the home zone selects the position of the next-hop CSCF. In the non-roaming state, the next hop is the home zone S-CSCF. Before this, the authentication process of the home zone S-CSCF and the home zone P-CSCF is triggered, which is similar to the AKA authentication. See Figure 3, the authentication process is as follows:
[0098] Step 101: The home area S-CSCF sends an authentication vector request to the home area HSS, and the content of the request includes the SIP URI of the P-CSCF to be authenticated.
[0099] Step 102: The home zone HSS queries the P-CSCF's entity identity information according to the universal resource identifier (SIP URI) of the home zone P-CSCF requesting registration, and uses the P-CSCF's private key as a pre-sh...
Embodiment 2
[0112] When the UE is in the roaming state, when the P-CSCF in the roaming area directly requests services from the S-CSCF in the home area, the authentication process is triggered. Referring to Figure 6a, the authentication process is as follows:
[0113] Step 201: The S-CSCF in the home area can query the address of the HSS in the roaming area according to the SIP URI information in the message sent by the P-CSCF. The S-CSCF in the home area asks the HSS in the roaming area for the entity identity of the P-CSCF. The process and steps 102 is similar.
[0114] Step 202: The S-CSCF in the roaming area transfers the entity identity of the P-CSCF (including the identity, private key K, and home network) to the S-CSCF in the home area. The transmission of information is encrypted with the S-CSCF public key of the home area and digitally signed to ensure the privacy, integrity and authenticity of the transmitted information.
[0115] Step 203: The home zone S-CSCF calculates an a...
Embodiment 3
[0118] In the above-mentioned embodiment, the authentication vector is calculated in the S-CSCF, the present invention provides another embodiment, the authentication vector can also be calculated in the HSS, the steps described in Fig. 6b are as follows:
[0119] When the UE is in the roaming state, when the P-CSCF in the roaming area directly requests services from the S-CSCF in the home area, the authentication process is triggered.
[0120] Step 301: The S-CSCF in the home area can query the address of the HSS in the roaming area according to the SIP URI information in the message sent by the P-CSCF, and the S-CSCF in the home area sends an authentication vector request to the HSS in the roaming area; the content of the request includes SIPURI of the P-CSCF performing the authentication.
[0121] Step 302: The HSS in the roaming area queries the entity identity information of the P-CSCF according to the universal resource identifier (SIPURI) of the P-CSCF in the home area,...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 