Authentication method and system for ue of ils network in ims network
A network and authentication module technology, applied in the field of data communication, can solve the problems of complex authentication process and achieve the effect of optimizing the authentication process
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0104] Figure 4 It is a signaling flow chart of Embodiment 1 of the method for ILS network users to authenticate in the IMS network in the present invention. In this embodiment, the IMS network is a subnet within the ILS network, and the ILS network users authenticate in the IMS network The process is: P-CSCF adds the AID to the registration request message after receiving the registration request from the UE, and forwards it to the S-CSCF; the S-CSCF obtains the AID from the registration request message, and in addition, the S-CSCF queries the HSS from the HSS The saved AID, the AID saved by the HSS is recorded as AID HSS , if AID and AID HSS If they are consistent, the authentication of the UE is passed. The process includes the following steps:
[0105] Step 401, the UE accesses the ILS network and becomes a user of the ILS network;
[0106] This is the existing technology of the ILS network, and will not be described in detail here;
[0107] Step 402, the UE sends a ...
Embodiment 2
[0124] Such as Figure 5 As shown, it is the signaling flow chart of Embodiment 2 of the method for authenticating ILS network users in the IMS network of the present invention. In this embodiment, the ILS network and the IMS network are deployed separately, and the main process of UE authentication in the IMS network is as follows: After receiving the registration request from the UE, the P-CSCF queries the network elements of the ILS network for the AID, and then adds the AID to the registration request message and forwards it to the S-CSCF; the S-CSCF obtains the AID from the registration request message. In addition, the S - CSCF query to AID from HSS HSS , if AID and AID HSS If they are consistent, the authentication of the UE is passed.
[0125] The network elements of the ILS network store AID and IP ILS Network elements of the corresponding ILS network. IP ILS It is the address assigned by the ILS network to the UE.
[0126] The process includes the following ste...
Embodiment 3
[0133] Such as Figure 6 As shown, it is a flow chart of an embodiment of the P-CSCF obtaining the AID of the present invention. Embodiment 3 provides the flow of the P-CSCF querying the ILS network element to obtain the AID of the UE. The process includes:
[0134] Step 601, the UE accesses the ILS network and becomes a user of the ILS network;
[0135] This is the existing technology of the ILS network, and will not be described in detail here;
[0136] In step 602, the UE sends a registration request message, such as a SIP Register message, to the P-CSCF. The registration request message is sent by the UE, accessed to the ILS network through the ASR-A, and then sent out from the ILS network by the ASR-B. The source address in the IP packet where the registration request message is located is assigned by ASR-B, and is recorded here as IP ILS ;
[0137] Step 603: After receiving the registration request message, the P-CSCF can learn from the IP address of the IP message t...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com



