Unlock instant, AI-driven research and patent intelligence for your innovation.

Method, system and device for SIP policy control authentication

A technology of policy control and policy, applied in the field of communication, can solve the problem of no policy authentication mechanism, unable to guarantee the authenticity and integrity of policy information, etc., to achieve the effect of enhancing security

Inactive Publication Date: 2012-08-29
HUAWEI TECH CO LTD +1
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0012] In the existing technology, there is no policy authentication mechanism, and the authenticity and integrity of policy information cannot be guaranteed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, system and device for SIP policy control authentication
  • Method, system and device for SIP policy control authentication
  • Method, system and device for SIP policy control authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0043] The embodiment of the present invention provides a method for SIP policy control authentication, which is applied to a network including three network entities of a user agent, a proxy server and a policy server. The method is as follows: figure 2 shown, including the following steps:

[0044] Step 201, the policy server receives a subscription request from a user agent;

[0045] Step 202, the policy server generates policy control authenticat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a method for SIP policy control authentication, which comprises the following steps that: a policy server receives a subscription request from a user agent; the policy server generates policy control authentication information according to the subscription request; and the policy server sends the policy control authentication information to the user agent. In the embodiment of the invention, by performing security enhancement on an SIP policy control mechanism, a policy control authentication mechanism is designed, and a client is ensured to initiate a session request in strict accordance with a policy prescription so that the security of a session is enhanced.

Description

technical field [0001] The embodiments of the present invention relate to the field of communication technologies, and in particular to a method, system and equipment for SIP policy control authentication. Background technique [0002] A SIP (Session Initial Protocol, Session Initiation Protocol) call requires policy control, for example, to decide whether to use a certain media stream encoding format or a certain media stream type according to the service type of the call or network conditions. [0003] In the prior art, the SIP policy control mechanism formulates corresponding policies according to different call requests, thereby controlling the operation of the entire network, such as figure 1 shown, including the following steps: [0004] Step 101, the user agent sends request information to the proxy server; [0005] Step 102, after the proxy server receives the request information, it returns a 488 response to the user agent, prompting the user agent to obtain polic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
Inventor 任兰芳贾科尹瀚位继伟王绍斌马骥江为强谷勇浩辛阳李茜杨亚涛李雪莲
Owner HUAWEI TECH CO LTD