Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Login implement method for user terminal to have access to IMS network and IMS

A user terminal and terminal technology, which is applied to electrical components, security devices, transmission systems, etc., can solve the problems that terminals cannot be securely accessed, and there is no solution, so as to reduce account theft and improve security.

Inactive Publication Date: 2014-12-24
ZTE CORP
View PDF3 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, for some traditional terminals of the IMS network, such as H.248, H.323, MGCP and other terminals, there is no corresponding solution because there is no condition for using digital certificates or USIM cards, resulting in the inability of these terminals to access safely

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Login implement method for user terminal to have access to IMS network and IMS
  • Login implement method for user terminal to have access to IMS network and IMS
  • Login implement method for user terminal to have access to IMS network and IMS

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] The main idea of ​​the solution of the embodiment of the present invention is: obtain the registration request message of the access user terminal carrying the registration access address information on the access side, and perform the registration access address information in the access flow of the access user terminal Legality check, if the check is passed, the corresponding normal access process will be carried out; otherwise, the access user terminal registration will be refused, so in the user registration process, the joint authentication of "user + key + access address" will be used, In order to improve the security of IMS network.

[0057] The embodiment of the present invention takes into account the user terminals accessing the IMS network. At present, a large part of them are softswitches and public switched telephone network (Public Switched Telephone Network, PSTN) terminals, which belong to old and old equipment, and do not have the ability to use soft and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a login implement method for a user terminal to have access to an IMS network and an IMS. The login implement method comprises the steps of acquiring a login request message of the access user terminal on an access side of the IMS network, wherein the login request message carries login access address information of the access user terminal; performing validity check on the login access address information in the access process of the access user terminal, and performing the corresponding normal access process when the check passes; otherwise, refusing login of the access user terminal. Therefore, in the login process of a user, check and limit on user access addresses are performed on the basis of an original key authentication mechanism, the access safety of the terminal of the IMS network is improved, and situations of account theft and the like can be reduced. The login implement method is suitable for traditional fixed terminals and mobile users limited in roaming.

Description

technical field [0001] The present invention relates to the field of communication technologies, and in particular to a next generation network (Next Generation Network, NGN) IP multimedia subsystem (IP Multimedia subsystem, IMS), and when a user terminal registers with the IMS network, the user access address is checked and A registered implementation method for restrictions. Background technique [0002] The IP Multimedia Subsystem is a standard for next-generation networks defined by the 3rd Generation Partnership Project (3GPP). Its notable feature is the adoption of the SIP (Session Initiation Protocol) It can have various capabilities such as separation of control functions and carrying capacity of various media services, separation of calls and sessions, separation of applications and services, separation of services and networks, and integration of mobile network and Internet services. [0003] The proposal of IMS complies with the development trend of communication...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04W12/06H04W60/00
CPCH04L65/1016H04L65/1073H04W12/06H04W12/72
Inventor 缪永生曹刚杨维权海斌
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products