Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authentication device for providing authentication to users accessing by terminal

A terminal access and authentication technology, applied in the field of communication, can solve the problems of attacking user key security threats, user interference, etc., and achieve the effect of good compatibility

Inactive Publication Date: 2008-06-11
ZTE CORP
View PDF0 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In order to solve the security threat of attacking the user’s key in the authentication process, and solve the problem of interference to the user caused by the illegal act of attacking the user’s key, the present invention is made

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication device for providing authentication to users accessing by terminal
  • Authentication device for providing authentication to users accessing by terminal
  • Authentication device for providing authentication to users accessing by terminal

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0025] First, refer to figure 1 with figure 2 The first embodiment of the present invention is described. figure 1 Is a flowchart of a communication system authentication method according to the first embodiment of the present invention, figure 2 It is a detailed flowchart of the authentication method of the communication system according to the first embodiment of the present invention.

[0026] Such as figure 1 As shown, the communication system authentication method according to the first embodiment of the present invention includes the following steps: step S102, the user sends an access request to the system through the terminal; step S104, the call session control server on the system side receives the access request and sends The home subscriber server sends an authentication request message; step S106, the home subscriber server receives the authentication request message, judges whether the number of authentication requests within a predetermined time period reaches ...

no. 2 example

[0035] The following will refer to image 3 The second embodiment of the present invention is described. image 3 It is a block diagram showing the configuration of the authentication device 300 in the communication system according to the second embodiment of the present invention.

[0036] Such asimage 3 As shown, the authentication device 300 in the communication system according to the second embodiment of the present invention includes: a request module 302, which is used to enable a user to send an access request to the system through a terminal; and a sending module 304, which is used to enable a call session on the system side The control server receives the access request and sends an authentication request message to the home user server; the judgment processing module 306 is used to make the home user server receive the authentication request message and judge whether the number of authentication requests within a predetermined time period reaches the predetermined num...

no. 3 example

[0044] The following will refer to Figure 4 , Figure 5 , Figure 6 ,with Figure 7 The third embodiment of the present invention is described. Figure 4 Is a block diagram of a system configuration example to which the present invention is applied, Figure 5 Yes Figure 4 The flow chart of normal user registration in the system shown, Figure 6 Yes Figure 4 The flow chart of malicious registration of illegal users in the system shown, Figure 7 Is in image 3 The flow chart of the present invention is implemented in the system shown.

[0045] In the following, an IMS system is taken as an example to describe the embodiments of the present invention.

[0046] Such as Figure 4 As shown, the mobile or fixed terminal UE 11 accesses the IMS (IP Mutimedia Subsystem) network, and is required to be authenticated during the registration process;

[0047] The access proxy server P-CSCF 12 implements a user agent function, which processes or forwards received requests and services. In the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an authentification device for providing a user through the terminal access with the authentification. The device comprises a request module, a transmitter module, an identifying and processing module and an authentification module, wherein, the request module is used for the user to send an access request to a system through the terminal; the transmitter module is used for a call session control server on the system side to receive the access request and to send an authentification request message to an HSS; the identifying and processing module is used for the HSS to receive the authentification request message and to judge whether the times of the authentification request in a presetting time period are up to the presetting times as well as sending the message including the judged result to the call session control server; the authentification module is used for the call session control server to authenticate the user according to the message. The invention can maintain the authority and security of a legal user and can have good compatibility.

Description

Technical field [0001] The present invention relates to the field of communications, and in particular, to an authentication device for providing authentication for users who access through a terminal. Background technique [0002] As IP technology has a series of advantages such as interoperability, communication systems are gradually shifting to IP bearer, and the resulting network convergence has led to the birth of a new generation of network communication standards-IMS. Due to the openness of IP technology, the security requirements of communication networks have reached unprecedented heights. Based on challenges, the response two-way authentication mechanism has become the mainstream method for authenticating terminals or networks in communication systems. The IETF RFC3310 standard organically combines the authentication mechanism in the traditional IP field represented by RFC2617 with the authentication mechanism in the mobile field represented by the 3GPP 33.102 protocol....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
Inventor 吴亚
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products