Unlock instant, AI-driven research and patent intelligence for your innovation.

Subscriber terminal UE access authentication method in IMS network

A user terminal and user authorization technology, applied in the IMS field, can solve the problem that the authentication process cannot continue

Active Publication Date: 2010-05-12
HUAWEI TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0055] The purpose of the present invention is to provide a method for user terminal UE access authentication in an IMS network to solve the problem that in the prior art, when the REGISTER message sent by the UE to the P-CSCF does not contain IMPI, the subsequent authentication process cannot continue The problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Subscriber terminal UE access authentication method in IMS network
  • Subscriber terminal UE access authentication method in IMS network
  • Subscriber terminal UE access authentication method in IMS network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0099] In the NBA authentication mode, the I-CSCF finds DIAMETER_USER_NAME_REQUIRED in the UAA message returned by the UPSF and sends a 401 challenge message to the P-CSCF, the P-CSCF forwards the challenge message to the UE, and the UE resends the authorization header field to the P-CSCF REGISTER message

[0100] The process of this embodiment is as follows image 3 As shown, it specifically includes the following steps:

[0101] Step 1, NASS access layer attach authentication, record the corresponding relationship between the UE's IP address and location information on the CLF.

[0102] Step 2. The UE sends a REGISTER message to the P-CSCF, which does not include the Authorization header field (that is, does not carry the IMPI) and the Security-Client header field.

[0103] Step 3: P-CSCF judges whether it needs to establish a security association with UE by checking whether the REGISTER message contains security negotiation parameters (such as Security-Client). The NBA au...

Embodiment 2

[0113] In the HTTP DIGEST authentication mode, the I-CSCF finds DIAMETER_USER_NAME_REQUIRED in the UAA message returned by the UPSF and sends a 401 challenge message to the P-CSCF, the P-CSCF forwards the challenge message to the UE, and the UE resends the Authorization header field to the P-CSCF The REGISTER message

[0114] The process of this embodiment is as follows Figure 4 As shown, it specifically includes the following steps:

[0115] Step 1. The UE sends a REGISTER message to the P-CSCF. The REGISTER message does not include the Authorization header field (that is, does not carry the IMPI) and the Security-Client header field.

[0116] Step 2. P-CSCF judges whether it needs to establish a security association with UE by checking whether the REGISTER message contains security negotiation parameters (such as Security-Client). HTTP DIGEST does not have this parameter, so it does not need to be established.

[0117] Step 3, P-CSCF forwards the REGISTER message of the UE ...

Embodiment 3

[0124] In the NBA authentication mode, when the P-CSCF receives the REGISTER message and finds that there is no Authorization header field, that is, does not carry the IMPI, it sends a 401 challenge message to the UE, and the UE sends the REGISTER message to the P-CSCF again after receiving the 401 challenge message. Which contains the Authorization header field

[0125] The process of this embodiment is as follows Figure 5 As shown, it specifically includes the following steps:

[0126] Step 1, NASS access layer attach authentication, record the corresponding relationship between UE's IP address and location information on the connected CLF.

[0127] Step 2. The UE sends a REGISTER message to the P-CSCF, which does not include the Authorization header field (that is, does not carry the IMPI) and the Security-Client header field.

[0128] Steps 3-4. When the P-CSCF receives the REGISTER message, it does not find the Security-Client header field and the Authorization header ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This invention discloses a UE access and authorization method in IMS network including the following steps: when a UE receives a challenge information sent by a proxy-call session control function entity (P-CSCF), it re-sends a register message increasing a head domain of authorization to the P-CSCF, which solves the problem that when a message sent by a UE does not contain head domain of authorization nor IMPI, I-CSCF can't get the S-CSCF address by interacting UAR / UAA with UPSF and can't finish the authorization process to the UE.

Description

technical field [0001] The present invention relates to the technical field of IMS (IP Multimedia Network Subsystem), and specifically relates to a method for user terminal UE access authentication in an IMS network. Background technique [0002] In TISPAN (Telecommunications and Internet Converged Services and Protocols for Advanced Networking) / NGN (Next Generation Network) network, in addition to IMS AKA (Authentication Key Agreement authentication key agreement) In addition to the authentication method, there are two other non-AKA authentication methods: IMS service layer authentication and access layer authentication binding (NASS-Bundled Authentication) and HTTP DIGEST (HTTP Digest Authentication) authentication method. [0003] In an NGN network, if the access network and the service network do not belong to the same operator, the authentication of the user by the access network and the authentication of the user by the service network are independent of each other. I...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/06H04L29/06
Inventor 何承东
Owner HUAWEI TECH CO LTD