Fixed network access into IMS bidirectional authentication and key distribution method

A technology of two-way authentication and fixed network, applied in the field of authentication, can solve the problems of lowering capability requirements and the inability to fully satisfy the capability of fixed network terminals, and achieve the effect of lowering requirements and ensuring confidentiality and integrity

Inactive Publication Date: 2008-06-11
ZTE CORP
View PDF0 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In addition, in 3GPP, the authentication process of the user terminal accessing IMS is realized through the IMS AKA mechanism, and the terminal needs to support several necessary security algorithms to realize the complete authentication process.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Fixed network access into IMS bidirectional authentication and key distribution method
  • Fixed network access into IMS bidirectional authentication and key distribution method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The fixed network access IMS two-way authentication and key distribution method of the present invention realizes the two-way authentication between the fixed network user terminal and the IMS network side, completes key distribution and security capability negotiation, and ensures communication between broadband fixed users and P-CSCF confidentiality and integrity.

[0044] The entities involved in the present invention include fixed network user terminals, P-CSCF, S-CSCF and HSS in the IMS domain. (where CSCF is a call / session control function defined in 3GPP R5).

[0045] A user terminal (UE) is a terminal that accesses the IMS system and enjoys IMS services, and there is a shared key between the user terminal and the IMS network side.

[0046] P-CSCF is a proxy CSCF, and is the entrance of IMS network and external network.

[0047] The S-CSCF is the serving CSCF, which completes the session control function of the UE.

[0048] HSS is the home user server, which c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a fixed internet access IMS mutual authentification and a key distribution method which solves the problem that a security mechanism standard structure of the fixed internet access IMS does not have a solution. The method comprises the following steps that: a user terminal originates an authentification request to an HSS through a CSCF and provides a user ID; the HSS returns the response of the authentification request to the CSCF and sends both a CK and an IK to a P-CSCF as well as passing a certificate of an XRES to an S-CSCF; the CSCF returns a login response message to a UE; the user terminal authenticates the integrality of the corresponding part of the returned response message through a shared key of Ku sharing with the HSS and realizes the authentification of the IMS on the internet side; after the certification, the use terminal calculates the certificate of an RES and originates the login request to the CSCF again; the CSCF authenticates the certificate of the RES on the user terminal and the certificate of the XRES of the HSS; after the certification, the CSCF sends a message of a successful user authentification to the HSS. The invention realizes the mutual authentification of the IMS network through a basic encryption and integrality protection arithmetic and completes the distribution of the key.

Description

technical field [0001] The invention relates to an authentication method, in particular to a bidirectional authentication and key distribution method in the process of a fixed network accessing an IMS (IP Multimedia Subsystem). Background technique [0002] IMS (IP Multimedia Subsystem) is a subsystem proposed by 3GPP in Release 5 to support IP multimedia services. Its core feature is the use of SIP protocol and its independence from access. Currently, IMS supports 2G and 3G mobile access methods. Fixed access mode cannot be supported. Under the development trend of network convergence, 3GPP, ETSI and ITU-T are all researching the network convergence solution based on IMS. Convergence of fixed and mobile networks. At present, IMS can basically support the access of 2G and 3G, but it cannot support the access of fixed network yet. [0003] Broadband fixed network users (such as xDSL, HFC, etc.) access to the IMS system is an inevitable trend of future development. The sec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L9/08H04L12/46
Inventor 李刚陈剑勇熊晓春
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products