Unlock instant, AI-driven research and patent intelligence for your innovation.

Authentication method and system for ue of ils network in ims network

A network and authentication module technology, applied in the field of data communication, can solve the problems of complex authentication process and achieve the effect of optimizing the authentication process

Inactive Publication Date: 2017-06-30
NANJING ZHONGXING XIN SOFTWARE CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0039] The present invention provides an authentication method, system, P-CSCF and S-CSCF for ILS network UE in IMS network, so as to solve the problem that the authentication process of ILS network users is relatively complicated in IMS network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method and system for ue of ils network in ims network
  • Authentication method and system for ue of ils network in ims network
  • Authentication method and system for ue of ils network in ims network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0104] Figure 4 It is a signaling flow chart of Embodiment 1 of the method for ILS network users to authenticate in the IMS network in the present invention. In this embodiment, the IMS network is a subnet within the ILS network, and the ILS network users authenticate in the IMS network The process is: P-CSCF adds the AID to the registration request message after receiving the registration request from the UE, and forwards it to the S-CSCF; the S-CSCF obtains the AID from the registration request message, and in addition, the S-CSCF queries the HSS from the HSS The saved AID, the AID saved by the HSS is recorded as AID HSS , if AID and AID HSS If they are consistent, the authentication of the UE is passed. The process includes the following steps:

[0105] Step 401, the UE accesses the ILS network and becomes a user of the ILS network;

[0106] This is the existing technology of the ILS network, and will not be described in detail here;

[0107] Step 402, the UE sends a ...

Embodiment 2

[0124] Such as Figure 5 As shown, it is the signaling flow chart of Embodiment 2 of the method for authenticating ILS network users in the IMS network of the present invention. In this embodiment, the ILS network and the IMS network are deployed separately, and the main process of UE authentication in the IMS network is as follows: After receiving the registration request from the UE, the P-CSCF queries the network elements of the ILS network for the AID, and then adds the AID to the registration request message and forwards it to the S-CSCF; the S-CSCF obtains the AID from the registration request message. In addition, the S - CSCF query to AID from HSS HSS , if AID and AID HSS If they are consistent, the authentication of the UE is passed.

[0125] The network elements of the ILS network store AID and IP ILS Network elements of the corresponding ILS network. IP ILS It is the address assigned by the ILS network to the UE.

[0126] The process includes the following ste...

Embodiment 3

[0133] Such as Figure 6 As shown, it is a flow chart of an embodiment of the P-CSCF obtaining the AID of the present invention. Embodiment 3 provides the flow of the P-CSCF querying the ILS network element to obtain the AID of the UE. The process includes:

[0134] Step 601, the UE accesses the ILS network and becomes a user of the ILS network;

[0135] This is the existing technology of the ILS network, and will not be described in detail here;

[0136] In step 602, the UE sends a registration request message, such as a SIP Register message, to the P-CSCF. The registration request message is sent by the UE, accessed to the ILS network through the ASR-A, and then sent out from the ILS network by the ASR-B. The source address in the IP packet where the registration request message is located is assigned by ASR-B, and is recorded here as IP ILS ;

[0137] Step 603: After receiving the registration request message, the P-CSCF can learn from the IP address of the IP message t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An authentication method, system, P-CSCF and S-CSCF for User Equipments (UE) in Identifier Locator Separation (ILS) network in IP Multimedia Core Network Subsystem network, the authentication method includes: a Proxy Call Session Control Function entity (P-CSCF) acquires an Access Identity (AID) of the UE; the P-CSCF adds the AID to a registration request message of the UE, and transmits the registration request message to a Serving Call Session Control Function entity (S-CSCF). The authentication method and system, authenticate using AID, and predigest or optimize the authentication process of the UE in the ILS network in the IMS network.

Description

technical field [0001] The present invention relates to the technical field of data communication, and in particular to an authentication method, system, agent session call control entity and service session call control entity of an identity location separation (ILS) network user equipment (UE) in an IP multimedia subsystem network. Background technique [0002] Identity and Location Separation (ILS) network is a new type of Internet technology, which introduces the idea of ​​identity and location separation, and supports the mobility and continuity of mobile access terminals. In particular, each user in the ILS network has a unique permanent identity. The network needs to verify the identity every time the user accesses, so the network can guarantee the authenticity and reliability of the identity. Based on this unique and reliable identity, an identity management system can be established to carry out services based on user identity management and improve network security...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L65/1016H04W12/06
Inventor 徐绍华郝振武
Owner NANJING ZHONGXING XIN SOFTWARE CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More