Unlock instant, AI-driven research and patent intelligence for your innovation.

Method of selecting right identification mode at network side

A network-side, authentication technology, applied in the field of mobile communications, can solve problems such as poor network fault tolerance, user authentication with unclear access, legal users unable to access normally, etc., to achieve the effect of improving capabilities

Active Publication Date: 2006-03-29
SNAPTRACK
View PDF0 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] Although both 2G-based users and 3G-based users can access and apply the services in IMS, and the ways of accessing IMS based on 2G and 3G are compatible, the current problem is that for systems that have been upgraded to 3G In other words, after the core network in the IMS receives the user's registration request, it does not know which authentication method should be used to authenticate the accessing user, but directly applies the 3G-based authentication method to authenticate the user.
In this way, if it is a legitimate 2G user, it cannot access it. This is because the authentication method for 2G users on the network side is different from that for 3G users, and 2G users cannot pass the authentication method based on 3G. At this time, the network side will consider the user as an illegal access user, thus causing legitimate users to fail to access normally, making the fault tolerance of the network poor

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method of selecting right identification mode at network side
  • Method of selecting right identification mode at network side
  • Method of selecting right identification mode at network side

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0039] For 3G networks, in the authentication vector request message sent by the S-CSCF of the existing protocol to the HSS, there is a field dedicated to identifying the authentication vector based on the 3G authentication method, that is, the AKA authentication scheme, and the content in this field only one. In order for the 3G network to be able to identify the Early IMS authentication mode, a new optional authentication mode identifier is added to this field to indicate the request to support the authentication vector of the EarlyIMS authentication mode. And set the identification requesting to support the 3G authentication mode as the default option of this field, and the identification requesting to support the Early IMS authentication mode as the optional item of this field.

[0040] Of course, in the authentication vector req...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This invention discloses a method for selecting authority authentication mode by the network including: HSS feeds back the information supporting the early IMS mode of authority authentication, the information supporting the 3G-authority authentication mode or the failure information directly to S-CSCF based on the received required information in the authority authentication vector required information from S-CSCF and the kind of the requiring user, if the information is from the first two, S-CSCF feeds back the information of permitting or refusing access to the user based on the authority authentication result after authentication with related modes, if ití»s the last one, then S-CSCF sends the information of forbidding the access to the UE directly.

Description

technical field [0001] The invention relates to the technical field of mobile communication, in particular to a method for selecting an authentication mode by a network side when a user uses a multimedia subsystem (IMS) network. Background technique [0002] With the development of broadband network, mobile communication is not limited to traditional voice communication, but through the communication with data services such as presence, short message, web page (WEB), location information, push service (PUSH) and file sharing, etc. Combined, mobile communication can realize services of multiple media types such as audio, video, picture and text, so as to meet various needs of users. [0003] Organizations such as the 3rd Generation Partnership Project (3GPP) and the 3rd Generation Partnership Project 2 (3GPP2) have successively launched the IP-based Multimedia Subsystem (IMS) architecture, which aims to use a A standardized open structure to achieve a variety of multimedia a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
Inventor 黄迎新武亚娟张文林
Owner SNAPTRACK