Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for carrying out authentication on user terminal

A user terminal and authentication technology, applied in the field of mobile communications, can solve problems such as 2G user terminal cannot access, does not support 2G user terminal authentication, and the user's satisfaction with the operator decreases.

Inactive Publication Date: 2006-07-12
HUAWEI TECH CO LTD
View PDF0 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] However, the existing authentication method based on the General Authentication Framework (GAA) is aimed at 3G user terminals, and it does not support the authentication of 2G user terminals. Or 2G user terminals can directly access without authentication
[0010] If 2G user terminals are not allowed to access, not only will the operator lose a lot of business, but it will also lead to a decline in user satisfaction with the operator.
[0011] If 2G user terminals can directly access without authentication, it is obviously impossible to guarantee the security of the AS and the entire network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for carrying out authentication on user terminal
  • Method for carrying out authentication on user terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0038] figure 1Shown is a schematic flow chart of Embodiment 1 of the application of the present invention. In this embodiment, the 2G UE has already connected to the 3GPP packet domain, and obtains the IP address assigned to it by the packet network gateway node (GGSN) of the packet network. Send related information such as the International Mobile Subscriber Identity (IMSI) and IP address in the packet domain to the HSS, and the HSS finds the user's identity IMPI in the IMS system through the user's MSISDN or IMSI, and sends the UE's IMPI, the IMPI Information such as the corresponding user's public identity identifier (IMPU), MSISDN, and the IP address of the UE is bound and saved. In this embodiment, a 2G UE accessing an AS is taken as an example for illustration.

[0039] Step 101, the 2G UE initiates an access request to the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Present invention discloses a method for proceeding authentication to user terminal. It features application service entity obtaining binding message labeled by said G user terminal user terminal IP address and identity labeling from HSS according to access request user identity labeling after received access request from 2 G user terminal containing identity labeling, then judging whether they are matching, if they are then said 2 G user terminal passing authentication otherwise said 2 G user terminal not passing authentication. Said invention realizes proceeding authentication to directly accessing application service entitative 2 G user terminal, ensuring legal user accessing and network safety, specially can normally allocate and operate to early stage applied based on IMS.

Description

technical field [0001] The invention relates to the technical field of mobile communication, in particular to a method for authenticating a 2G user terminal that directly accesses an application service entity. Background technique [0002] With the development of broadband network, mobile communication is not limited to traditional voice communication, but through the communication with data services such as presence, short message, web page (WEB), location information, push service (PUSH) and file sharing, etc. Combined, mobile communication can realize services of multiple media types such as audio, video, picture and text, so as to meet various needs of users. [0003] Organizations such as the 3rd Generation Partnership Project (3GPP) and the 3rd Generation Partnership Project 2 (3GPP2) have successively launched the IP-based Multimedia Subsystem (IMS) architecture, which aims to use a A standardized open structure to achieve a variety of multimedia applications to pro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04Q7/38
CPCH04L29/06217H04L63/08H04L29/0809H04L65/1016H04L63/0876H04L67/02
Inventor 黄迎新朱奋勤
Owner HUAWEI TECH CO LTD