Authentication method and device

A technology of authentication and authentication information, applied in the field of communication, can solve problems such as inconvenient use for users, failure to realize automatic authentication, and unified authentication of IMS network and application server, etc., to achieve simple implementation, user use and operation The effect of convenient business management

Active Publication Date: 2012-10-03
HUAWEI TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the process of realizing the present invention, the inventor found that the prior art has at least the following deficiencies: the prior art requires the user to intervene in each authentication process, cannot realize automatic authentication, and is inconvenient for users to use; the existing Technical methods cannot realize unified authentication of IMS network and application server

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method and device
  • Authentication method and device
  • Authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0040] Embodiment 1 of the present invention provides a unified authentication method and system for an IP multimedia subsystem IMS network and an application server.

[0041] Embodiment 1 of the present invention utilizes the existing IMS equipment and flow, appropriately expands, and supports unified authentication of the IMS network and the application server. That is, after passing the IMS network authentication, the UE uses the authentication information acquired during the IMS network authentication process to automatically authenticate other application servers used by the authorized UE, without user intervention.

[0042] figure 2 It is a flowchart of signaling interaction of the system according to Embodiment 1 of the present invention. Such as figure 2 As shown, the signaling interaction process includes:

[0043] S201. The user equipment UE performs IP multimedia subsystem IMS network authentication, and the UE sends an IMS network authentication request to the...

Embodiment 2

[0065] Embodiment 2 of the present invention provides an authentication method, which is a unified authentication method for an IP multimedia subsystem IMS network and an application server, and the executing subject of the method may be a CSCF.

[0066] Figure 4 It is an overall flow chart of the method in Embodiment 2 of the present invention. Such as Figure 4 As shown, the method includes:

[0067] S401. Receive an IP Multimedia Subsystem IMS network authentication request sent by a user equipment UE;

[0068] S402. Obtain application server authentication information from the home subscriber server HSS according to the IMS network authentication request;

[0069] Specifically, the above application server authentication information includes: application server authentication user name HTTP-Username, application server authentication password (can be extended to authentication certificate) HTTP-Token, application server additional parameter Add-ons (such as IP address...

Embodiment 3

[0116] Embodiment 3 of the present invention provides a method for transmitting authentication information of an application server, and the subject of execution of the method may be the HSS.

[0117] Figure 5 It is a flow chart of the method of Embodiment 3 of the present invention. Such as Figure 5 As shown, the method includes:

[0118] S501. Receive a first message sent by a call session control function entity CSCF, where the first message includes an identifier of a UE requesting IMS network authentication;

[0119] S502. According to the first message, determine whether there is application server authentication information corresponding to the UE;

[0120] S503. When there is application server authentication information corresponding to the UE, send a second message including the application server authentication information corresponding to the UE to the CSCF.

[0121] Optionally, the first message may be a SAR message, the second message may be an SAA message,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides an authentication method and a device; the device comprises the following steps: a network authentication request of an IP multimedia subsystem IMS, which is sent by user equipment, is received; according to the IMS network authentication request, authentication information of an application server is obtained from a home subscriber server HSS; an IMS network authentication respond message containing the authentication information of the application server is transmitted to the UE, so as to trigger the UE to utilize the authentication information of the application server to carry out authentication in the application server. In the method of the embodiment of the invention, uniform authentication of IMS and the application server is realized by carrying the authentication information of the application server in the returned result of the IMS network authentication without mutually intervening the authentication process of the application server by the user. The method brings great convenience to the usage of the user and the management of operators; in addition, the existing IMS authentication flow is fully utilized to realize simpleness.

Description

technical field [0001] The present invention relates to the communication field, in particular to an authentication method and device. Background technique [0002] In an IMS (IP multimedia subsystem, IP multimedia subsystem) network, in addition to network devices providing basic telecommunication services, there are many application servers providing value-added services. This type of application server can run independently of the IMS network. In order to ensure legal service use and correct charging, many application servers need to authenticate UE (User Equipment, user equipment) separately. For example, an application server group that provides address book storage and management, regardless of whether the UE has passed the authentication of the IMS network, the UE must provide the correct user name and password to pass the group authentication before normally using the services provided by the group. [0003] figure 1 It is a flow chart of IMS network authentication...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04W12/06
CPCH04L29/06333H04W12/06H04L65/1073H04L29/06217H04L65/1016H04W12/069
Inventor 谢国军谢秀洪
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products