Authentication device in communication system

A communication system and authentication technology, applied in the field of communication, can solve the problems of user interference, attack user key security threats, etc., and achieve the effect of good compatibility, maintenance of authority and security

Inactive Publication Date: 2008-06-11
ZTE CORP
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In order to solve the security threat of attacking the user’s key in the authentication process, and solve the p

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication device in communication system
  • Authentication device in communication system
  • Authentication device in communication system

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0026] First, refer to figure 1 and figure 2 A first embodiment of the present invention is described. figure 1 is a flow chart of the communication system authentication method according to the first embodiment of the present invention, figure 2 is a detailed flow chart of the communication system authentication method according to the first embodiment of the present invention.

[0027] Such as figure 1 As shown, the communication system authentication method according to the first embodiment of the present invention includes the following steps: step S102, the user sends an access request to the system through the terminal; step S104, the call session control server on the system side receives the access request, and sends the The home subscriber server sends an authentication request message; Step S106, the home subscriber server receives the authentication request message, judges whether the number of requests for authentication in a predetermined time period reaches ...

no. 2 example

[0036] The following will refer to image 3 A second embodiment of the present invention is described. image 3 is a block diagram showing the configuration of the authentication device 300 in the communication system according to the second embodiment of the present invention.

[0037] Such as image 3As shown, the authentication device 300 in the communication system according to the second embodiment of the present invention includes: a request module 302, which is used to enable the user to send an access request to the system through a terminal; a sending module 304, which is used to make the call session on the system side The control server receives the access request, and sends an authentication request message to the home user server; the judging processing module 306 is used to make the home user server receive the authentication request message, and judge whether the number of requests for authentication within a predetermined time period reaches a predetermined nu...

no. 3 example

[0045] The following will refer to Figure 4 , Figure 5 , Figure 6 ,and Figure 7 A third embodiment of the present invention is described. Figure 4 is a block diagram of a system configuration example applying the present invention, Figure 5 yes Figure 4 The flow chart of normal user registration in the system shown, Figure 6 yes Figure 4 Flowchart of malicious registration of illegal users in the system shown, Figure 7 is in image 3 A flowchart of the implementation of the present invention in the system shown.

[0046] The following describes the embodiments of the present invention by taking the IMS system as an example.

[0047] Such as Figure 4 As shown, the mobile or fixed terminal UE 11 accesses the IMS (IP Mutimedia Subsystem) network, and is required to be authenticated during the registration (Register) process;

[0048] The access proxy server P-CSCF 12 implements the user agent function, and processes or forwards received requests and services...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an authentification method of a communication system. The device comprises a request module, a transmitter module, an identifying and processing module and an authentification module, wherein, the request module is used for the user to send an access request to a system through the terminal; the transmitter module is used for a call session control server on the system side to receive the access request and to send an authentification request message to an HSS; the identifying and processing module is used for the HSS to receive the authentification request message and to judge whether the times of the authentification request in a presetting time period are up to the presetting times as well as sending the message including the judged result to the call session control server; the authentification module is used for the call session control server to authenticate the user according to the message. The invention can maintain the authority and the security of a legal user and can have good compatibility.

Description

technical field [0001] The present invention relates to the field of communication, and in particular, to an authentication device in a communication system. Background technique [0002] Because IP technology has a series of advantages such as interoperability, the communication system is gradually changing to IP bearer. The resulting network convergence has led to the birth of a new generation of network communication standard - IMS. Due to the openness of IP technology, the security requirements of communication networks have reached unprecedented heights. The challenge-response-based bidirectional authentication mechanism has become a mainstream method for authenticating terminals or networks in communication systems. IETF's RFC3310 standard organically combines the authentication mechanism in the traditional IP field represented by RFC2617 with the authentication mechanism in the mobile field represented by the 3GPP 33.102 protocol. With the convergence of the network...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04Q7/38
Inventor 吴亚
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products