Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

An authentication method and device

An authentication method and a technology for authenticating information, applied in the field of authentication methods and devices, can solve the problems of illegal registration of illegal users, illegal calls, etc., achieve the effects of refusing to mitigate and improve the difficulty of initiating fraudulent calls, and protecting long-distance telecommunication resources

Active Publication Date: 2021-08-13
HANGZHOU HUAWEI ENTERPRISE COMM TECH
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the openness of the IP network and the intelligence of the terminals on the IP network, any IP-reachable place can initiate registration and call to the IP-PBX, so some illegal users may make illegal registration and illegal calls (stolen calls)

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An authentication method and device
  • An authentication method and device
  • An authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0121] In order to make the object, technical solution and beneficial effects of the present invention more clear, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0122] The terms "first", "second" and the like in the specification and claims of the present application and the above drawings are used to distinguish different objects, rather than to describe a specific order. Furthermore, the terms "include" and "have", as well as any variations thereof, are intended to cover a non-exclusive inclusion. For example, a process, method, system, product or device that includes a series of steps or units is not limited to the listed steps or units, but optionally also includes steps or units that are not listed, or optionally further includes For other...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses an authentication method and device. In this method, the terminal sends a user's login request message to the server, and receives an authentication information sent by the server after determining that the user has successfully logged in; the terminal sends a SIP request message including the first authentication information to the IP-PBX, and receives the IP-PBX sending It can be seen that after the user logs in to the server, the server assigns the first authentication information to the user, and the user carries the first authentication information in the subsequent SIP request message, and the IP-PBX authenticates the first authentication information. Since the illegal user cannot successfully log in to the server to obtain the first authentication information, after receiving the SIP request message sent by the illegal user, the IP‑PBX will reject the SIP request of the illegal user due to the failure of the first authentication information authentication, thus effectively rejecting the SIP request. Mitigate and avoid the risk of piracy, and protect expensive long-distance telecommunications resources.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to an authentication method and device. Background technique [0002] UC (Unified Communication, Unified Communication) is a technology for realizing various media communications on a unified platform. UC is the trend of multimedia communication including voice. In UC, voice, instant message, video, address book, online status, Multimedia communications such as groups, in which voice and video often use VoIP (Voice over IP, voice over IP network and other value-added services) technology based on SIP (Session Initiation Protocol, session initiation protocol). [0003] VoIP is a technology for voice calls over IP networks. On the end user side, VoIP uses softphones or IP phones instead of traditional analog phones. On the network system side, IP-PBX (IP Private Branch eXchange, based on IP networks) voice exchange) to replace the traditional PBX. [0004] As a mains...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04M7/00
CPCH04L63/08H04M7/0078H04M7/009
Inventor 朱毅泉
Owner HANGZHOU HUAWEI ENTERPRISE COMM TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products