Authentication method and device
A technology of authentication and authentication vector, which is applied in the field of communication, can solve the problems of low authentication efficiency and achieve the effect of improving efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0025] An embodiment of the present invention provides an authentication method, which is applicable to the case of performing service authentication on a UE (User Equipment, user terminal), such as figure 2 As shown, the authentication method includes the following steps S201-S202.
[0026] Step S201, S-CSCF (Serving Call Session Control Function, service call session control function) receives the registration request sent by UE, and performs registration authentication with HSS (Home Subscriber Server, Home Subscriber Service); if the registration authentication is successful, then S-CSCF saves the authentication vector.
[0027] In this step, after receiving the registration request sent by the UE, the S-CSCF performs MAR (Multimedia authorization request, multimedia authentication request) / MAA (Multimedia authorization answer, multimedia authentication response) interaction with the HSS, and obtains authentication from the MAA fed back by the HSS Vector H(A1). The auth...
Embodiment 2
[0032] The embodiment of the present invention provides an authentication method, which is applicable to the case where the S-CSCF performs registration service authentication on the UE, such as image 3 As shown, it specifically includes the following steps S301-S306:
[0033] In step S301, the S-CSCF receives the first registration request sent by the UE, sends a multimedia authentication request MAR to the HSS, and receives a multimedia authentication response MAA fed back by the HSS.
[0034] In this step, after receiving the MAR sent by the S-CSCF, the HSS calculates and obtains the authentication vector according to the PVI, key and realm value, and fills the authentication vector into the MAA and feeds it back to the S-CSCF.
[0035] In step S302, the S-CSCF obtains the authentication vector from the MAA, and feeds back a response message containing the authentication vector to the UE.
[0036]In this step, the S-CSCF extracts the authentication vector in the MAA, gene...
Embodiment 3
[0047] The embodiment of the present invention provides an authentication method, which is applicable to the case where the S-CSCF performs re-registration or deregistration service authentication on the UE, such as Figure 4 As shown, it specifically includes the following steps S401-S411:
[0048] In step S401, the S-CSCF receives the first re-registration or deregistration request sent by the UE.
[0049] Step S402, judging whether there is an authentication vector stored in the S-CSCF; if no authentication vector is stored, perform step S403; if there is an authentication vector, perform step S404.
[0050] In step S403, the S-CSCF performs MAR / MAA interaction with the HSS to obtain an authentication vector.
[0051] In step S404, the S-CSCF feeds back a response message including the authentication vector to the UE.
[0052] Step S405, the S-CSCF receives the second re-registration or deregistration request sent by the UE, wherein the second re-registration or deregistr...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 