Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Method and system for re-authentication in IP multimedia core network system (IMS)

A multimedia and authentication technology, applied in the field of communication systems, can solve problems such as loss of user trust

Inactive Publication Date: 2005-12-07
QUALCOMM INC
View PDF0 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there is a problem with this proposal, even if a fake user sends an invalid reply to the network, and the network loses trust in the user, the user is still registered until its termination timer expires

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for re-authentication in IP multimedia core network system (IMS)
  • Method and system for re-authentication in IP multimedia core network system (IMS)
  • Method and system for re-authentication in IP multimedia core network system (IMS)

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0013] Details are presented here for purposes of illustrative discussion of embodiments of the invention, by way of example. Instructions and attached Figure 1 It is intended to acquaint those skilled in the art how the present invention may actually be practiced.

[0014] In addition, in order to avoid obscuring the present invention, the fact that details about implementing such a block diagram largely depend on the platform on which the present invention is implemented is also taken into account, that is, the details should be within the ability of those skilled in the art, and can be described as a block diagram Form expresses arrangement. While specific details (eg, circuits, flowcharts) are set forth to describe example embodiments of the invention, it will be apparent to those skilled in the art that the invention can be practiced without these specific details. Finally, it is apparent that any combination of hardwired circuitry and software instructions can be used...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method and system for authentication of a mobile device that includes a mobile device and a network element in a communications network. The network element may be a call state control function. If the network element detects an incorrect event related to a mobile device, the network element shortens a registration validity time for the mobile device and sends the mobile device a notification to re-authenticate. The incorrect event can be, for example, an incorrect authentication response, an incorrect action by the mobile device, a session over a time maximum, traffic generated being over a maximum, or credit run out. The mobile device is de-registered if the mobile device fails to re-authenticate within the shortened registration validity time, and re-registered if the mobile device re-authenticates within the shortened registration validity time. The registration validity time for the mobile device is extended after re-registration.

Description

technical field [0001] The present invention relates to communication systems, in particular but not exclusively to communication systems in which registration and / or authentication with the system is provided. Background technique [0002] An exemplary IP communication network has been introduced in the fifth edition of the 3rd Generation Partnership Project (3GPP) specification. Different technical specifications (available on the 3gpp.org website) address various aspects of the network. [0003] The 3GPP Technical Specification 3G TS 24.229: "SIPMultimedia Call COntrol Protocol based on SIP and SDP" (TS 24.3.229v2.0.0(2002-02)), which is included here by reference, introduces , users, etc.) and different network elements, such as serving call state control function (S-CSCF), proxy call state control function (P-CSCF), interrogating call state control function (I-CSCF), call control protocol between . Section 5.4.1 of TS 24.299 introduces UE registration and authenticat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G09C1/00H04B7/26H04L9/32H04L29/06H04Q3/00H04W8/02H04W12/06
CPCH04L63/08H04L63/108H04L29/06523H04L29/06217H04L29/06333H04L65/80H04L65/1073H04L65/1016H04L63/1458H04W12/06H04W12/61H04W12/122H04W12/12
Inventor 巴伊科·加博尔
Owner QUALCOMM INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products