Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Method for authenticating user terminal

A user terminal and authentication technology, applied in the field of communication, can solve problems such as increased network message traffic, increased request processing delay, and impact on user experience, achieving the effects of process control, reduced processing overhead, and guaranteed reliability

Active Publication Date: 2007-09-05
HUAWEI TECH CO LTD
View PDF0 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the network authenticates each request of the IMS terminal, the request processing delay increases, affecting user experience; at the same time, the network message traffic increases and processing overhead increases

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for authenticating user terminal
  • Method for authenticating user terminal
  • Method for authenticating user terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] In order to make the purpose, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0064] The implementation network of the present invention includes but not limited to packet networks such as IMS network, NGN network, and Internet network; the implemented signaling includes but not limited to SIP, HTTP, etc.; the authentication mode of the network to the terminal includes but not limited to IMS AKA, HTTP Digest, etc. Authentication method; the secure channel established between the terminal and the network access control entity includes but is not limited to IPSec secure channel, TLS secure channel, etc., or there is no secure channel. The implementation network logic structure of the present invention is as shown in Figure 2, wherein:

[0065] A user terminal is any type of communication terminal that can access a pa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The method comprises: when receiving a request message from user end, deciding if the request message comprises the address information of the user end; if yes, comparing the address information of user end with the saved address information of user end; if they are matched.

Description

technical field [0001] The invention relates to the communication field, in particular to an authentication method of a user terminal. Background technique [0002] IP Multimedia Subsystem (IMS) is a subsystem superimposed by 3GPP on the packet network. It uses the packet domain as the bearer channel for controlling signaling and media transmission, and introduces the Session Initiation Protocol (SIP protocol) as a service control protocol. Using SIP is simple, Easy to expand and convenient for media combination, it provides rich multimedia services by separating service control from bearer control; the main functional entities in IMS include call session control function entity CSCF for controlling user registration, session control and other functions, centralized user management The home user server HSS of the subscription data, and the application server AS providing various business logic control functions. [0003] In the IMS application, in order to complete the user...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
CPCH04L63/08H04L63/126
Inventor 李辉
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products