Authority-identifying method of internet protocol multi-media sub-system

A multimedia subsystem and authentication technology, applied in the field of IP multimedia subsystem authentication, can solve the problems of authentication failure, no solution provided, and reduced service quality in the authentication mode

Active Publication Date: 2007-01-10
HUAWEI TECH CO LTD
View PDF0 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0039] Even so, sometimes due to changes in user status, such as using different types of terminals in different locations, the authentication of the default IP multimedia subsystem and access layer binding authentication methods will fail.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authority-identifying method of internet protocol multi-media sub-system
  • Authority-identifying method of internet protocol multi-media sub-system
  • Authority-identifying method of internet protocol multi-media sub-system

Examples

Experimental program
Comparison scheme
Effect test

no. 6 example

[0249] refer to Figure 9a and Figure 9b , the sixth embodiment of the present invention comprises the following steps:

[0250] In step 901, the UE sends a registration message Register to the P-CSCF, and the message carries an access operator identifier and an access user identifier.

[0251] In step 902, the P-CSCF determines the CLF according to the access operator ID in the registration message and the preset correspondence between the access operator ID and the CLF.

[0252] In step 903, the P-CSCF queries the above determined CLF for the attachment information of the user at the access layer according to the access user identifier in the registration message. The data record of attachment information corresponding to the private user ID is pre-stored in the CLF, and the attachment information includes IP address information, location information, etc., but does not include the binding ID in the prior art. If there is no data record of the access user ID in the CLF, ...

no. 7 example

[0283] refer to Figure 10a and Figure 10b , the seventh embodiment of the present invention includes the following steps:

[0284] In step 1001, the UE sends a registration message Register to the P-CSCF, and the message carries an access operator identifier and an access user identifier.

[0285] In step 1002, the P-CSCF determines the CLF according to the access operator ID in the registration message and the preset correspondence between the access operator ID and the CLF.

[0286] In step 1003, the P-CSCF searches the CLF determined above for the attachment information of the user at the access layer according to the access user identifier in the registration message. The data record of attachment information corresponding to the private user ID is pre-stored in the CLF, and the attachment information includes IP address information, location information, etc., but does not include the binding ID in the prior art. If there is no data record of the access user ID in th...

no. 8 example

[0317] refer to Figure 11a and Figure 11b , the eighth embodiment of the present invention comprises the following steps:

[0318] Step 1101, the UE sends a registration message Register to the P-CSCF.

[0319] In step 1102, the P-CSCF forwards the UE's Register message to the I-CSCF.

[0320] Step 1103, the I-CSCF and the HSS select the corresponding S-CSCF through the Cx-Selection-Info message, that is, the I-CSCF sends a request to the HSS to search the user attributes in the HSS to determine which S-CSCF will process the registration report arts.

[0321] In step 1104, the I-CSCF forwards the UE's registration message Register to the S-CSCF determined in step 1103.

[0322] In step 1105, the S-CSCF and the HSS update the S-CSCF indication information on the HSS through a Cx-Put message, and inform the HSS that the subsequent processing of the user will be performed in this S-CSCF.

[0323]In step 1106, the S-CSCF sends an AV-Req message to the HSS to request the use...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The disclosed authentication method for IP multimedia subsystem includes steps: after receiving registration message sent from UE, P-CSCF queries attachment information of UE at access network from the determined CLF so as to obtain queried result, and sends registration message together with the queried result to I-CSCF; I-CSCF forwards the registration message to S-CSCF notified by HSS; based on authentication mode obtained from HSS, S-CSCF authenticates UE so as to obtain authentication result, which is sent to UE. It is reasonable that IMS service layer determines authentication mode for user, and S-CSCF accomplishes authenticating procedure. Further, the method not only discloses authentication mode of binding IMS service layer and access layer, as well as discloses the combining mode of the disclosed authentication mode with other authentication modes. Thus, if the disclosed binding authentication mode is in failure, then authentication can be carried correctly.

Description

technical field [0001] The invention relates to the field of Internet Protocol (IP) Multimedia Service Subsystem (IMS), in particular to an authentication method of the IP Multimedia Subsystem. Background technique [0002] In a fixed next generation (NGN) network and a mobile network, the network can generally be divided into an access network and a service network. Users access the IP network through the access network of the access network operator, and then enjoy different services, such as voice, video, and streaming media, through the service network of one or more service network operators. [0003] If the access network and the service network do not belong to the same operator, the authentication of the user by the access network and the authentication of the user by the service network are independent of each other. In this case, if a user wants to enjoy a certain service, usually two authentications are required, one is the authentication of the access layer, aft...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L12/56H04L12/851
Inventor 严军何承东
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products