Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authentication method in communication system

A communication system and authentication technology, applied in the communication field, can solve the problems of attacking user key security threats, user interference, etc., and achieve the effect of good compatibility

Inactive Publication Date: 2008-06-11
ZTE CORP
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In order to solve the security threat of attacking the user’s key in the authentication process, and solve the problem of interference to the user caused by the illegal act of attacking the user’s key, the present invention is made

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method in communication system
  • Authentication method in communication system
  • Authentication method in communication system

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0027] First, refer to figure 1 with figure 2 A first embodiment of the present invention is described. figure 1 is a flow chart of the communication system authentication method according to the first embodiment of the present invention, figure 2 is a detailed flow chart of the communication system authentication method according to the first embodiment of the present invention.

[0028] Such as figure 1 As shown, the communication system authentication method according to the first embodiment of the present invention includes the following steps: step S102, the user sends an access request to the system through the terminal; step S104, the call session control server on the system side receives the access request, and sends the The home subscriber server sends an authentication request message; Step S106, the home subscriber server receives the authentication request message, judges whether the number of requests for authentication in a predetermined time period reaches...

no. 2 example

[0037] The following will refer to image 3 A second embodiment of the present invention is described. image 3 is a block diagram showing the configuration of the authentication device 300 in the communication system according to the second embodiment of the present invention.

[0038] Such as image 3 As shown, the authentication device 300 in the communication system according to the second embodiment of the present invention includes: a request module 302, which is used to enable the user to send an access request to the system through a terminal; a sending module 304, which is used to make the call session on the system side The control server receives the access request, and sends an authentication request message to the home user server; the judging processing module 306 is used to make the home user server receive the authentication request message, and judge whether the number of requests for authentication within a predetermined time period reaches a predetermined num...

no. 3 example

[0046] The following will refer to Figure 4 , Figure 5 , Image 6 ,with Figure 7 A third embodiment of the present invention is described. Figure 4 is a block diagram of a system configuration example applying the present invention, Figure 5 yes Figure 4 The flow chart of normal user registration in the system shown, Image 6 yes Figure 4 Flowchart of malicious registration of illegal users in the system shown, Figure 7 is in image 3 A flowchart of the implementation of the present invention in the system shown.

[0047] The following describes the embodiments of the present invention by taking the IMS system as an example.

[0048] Such as Figure 4 As shown, the mobile or fixed terminal UE 11 accesses the IMS (IP Mutimedia Subsystem) network, and is required to be authenticated during the registration (Register) process;

[0049] The access proxy server P-CSCF 12 implements the user agent function, and processes or forwards received requests and services....

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an authentification method of a communication system. The method comprises the following steps that: Step S102. a user sends an access request to a system through a terminal; Step S104. a call session control server on the system side receives the access request and sends an authentification request message to an HSS; Step S106. the HSS receives the authentification request message and judges whether the times of the authentification request in a presetting time period are up to the presetting times as well as sending the message including the judged result to the call session control server; Step S108. the call session control server authenticates the user according to the message. The invention can maintain the authority and security of a legal user and can have good compatibility.

Description

technical field [0001] The present invention relates to the field of communication, and in particular, to an authentication method in a communication system. Background technique [0002] Because IP technology has a series of advantages such as interoperability, the communication system is gradually changing to IP bearer. The resulting network convergence has led to the birth of a new generation of network communication standard - IMS. Due to the openness of IP technology, the security requirements of communication networks have reached unprecedented heights. The challenge-response-based bidirectional authentication mechanism has become a mainstream method for authenticating terminals or networks in communication systems. IETF's RFC3310 standard organically combines the authentication mechanism in the traditional IP field represented by RFC2617 with the authentication mechanism in the mobile field represented by the 3GPP 33.102 protocol. With the convergence of the network...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04Q7/38H04W12/06
Inventor 吴亚
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products