Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authentication method and device

An authentication method and authentication information technology, which are applied in the field of authentication methods and devices, and can solve the problems of illegal calls and illegal registration of illegal users.

Active Publication Date: 2018-07-10
HANGZHOU HUAWEI ENTERPRISE COMM TECH
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the openness of the IP network and the intelligence of the terminals on the IP network, any IP-reachable place can initiate registration and call to the IP-PBX, so some illegal users may make illegal registration and illegal calls (stolen calls)

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method and device
  • Authentication method and device
  • Authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0121] In order to make the object, technical solution and beneficial effects of the present invention more clear, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0122] The terms "first", "second" and the like in the specification and claims of the present application and the above drawings are used to distinguish different objects, rather than to describe a specific order. Furthermore, the terms "include" and "have", as well as any variations thereof, are intended to cover a non-exclusive inclusion. For example, a process, method, system, product or device that includes a series of steps or units is not limited to the listed steps or units, but optionally also includes steps or units that are not listed, or optionally further includes For other...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses an authentication method and device. In the authentication method, a terminal sends a login request message of a user to a server, and receives an authentication message which is sent by the server after the user is determined to successfully log in; and the terminal sends an SIP (Session Initiation Protocol) including first authentication information to an IP-PBX (IP Private Branch eXchange) and receives an SIP response message sent by the IP-PBX. According to the invention, the server distributes the first authentication information to the user afterthe user logs in the server, the user carries the first authentication information in the subsequent SIP request message, and the IP-PBX performs authentication on the first authentication information. Illegal users cannot successfully log in the server to obtain the first authentication information, so that the IP-PBX refuses an SIP request of the illegal users due to the authentication failureof the first authentication information after receiving an SIP request message of the illegal users, thereby being capable of effectively refusing, relieving and avoiding the embezzlement risk, and protecting expensive long-distance telecommunication resources.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to an authentication method and device. Background technique [0002] UC (Unified Communication, Unified Communication) is a technology for realizing various media communications on a unified platform. UC is the trend of multimedia communication including voice. In UC, voice, instant message, video, address book, online status, Multimedia communications such as groups, in which voice and video often use VoIP (Voice over IP, voice over IP network and other value-added services) technology based on SIP (Session Initiation Protocol, session initiation protocol). [0003] VoIP is a technology for voice calls over IP networks. On the end user side, VoIP uses softphones or IP phones instead of traditional analog phones. On the network system side, IP-PBX (IP Private Branch eXchange, based on IP networks) voice exchange) to replace the traditional PBX. [0004] As a mains...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04M7/00
CPCH04L63/08H04M7/0078H04M7/009
Inventor 朱毅泉
Owner HANGZHOU HUAWEI ENTERPRISE COMM TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products