Authentication method in communication system
A communication system and authentication technology, applied in the communication field, can solve the problems of attacking user key security threats, user interference, etc., and achieve the effect of good compatibility
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 example
[0027] First, refer to figure 1 with figure 2 A first embodiment of the present invention is described. figure 1 is a flow chart of the communication system authentication method according to the first embodiment of the present invention, figure 2 is a detailed flow chart of the communication system authentication method according to the first embodiment of the present invention.
[0028] Such as figure 1 As shown, the communication system authentication method according to the first embodiment of the present invention includes the following steps: step S102, the user sends an access request to the system through the terminal; step S104, the call session control server on the system side receives the access request, and sends the The home subscriber server sends an authentication request message; Step S106, the home subscriber server receives the authentication request message, judges whether the number of requests for authentication in a predetermined time period reaches...
no. 2 example
[0037] The following will refer to image 3 A second embodiment of the present invention is described. image 3 is a block diagram showing the configuration of the authentication device 300 in the communication system according to the second embodiment of the present invention.
[0038] Such as image 3 As shown, the authentication device 300 in the communication system according to the second embodiment of the present invention includes: a request module 302, which is used to enable the user to send an access request to the system through a terminal; a sending module 304, which is used to make the call session on the system side The control server receives the access request, and sends an authentication request message to the home user server; the judging processing module 306 is used to make the home user server receive the authentication request message, and judge whether the number of requests for authentication within a predetermined time period reaches a predetermined num...
no. 3 example
[0046] The following will refer to Figure 4 , Figure 5 , Image 6 ,with Figure 7 A third embodiment of the present invention is described. Figure 4 is a block diagram of a system configuration example applying the present invention, Figure 5 yes Figure 4 The flow chart of normal user registration in the system shown, Image 6 yes Figure 4 Flowchart of malicious registration of illegal users in the system shown, Figure 7 is in image 3 A flowchart of the implementation of the present invention in the system shown.
[0047] The following describes the embodiments of the present invention by taking the IMS system as an example.
[0048] Such as Figure 4 As shown, the mobile or fixed terminal UE 11 accesses the IMS (IP Mutimedia Subsystem) network, and is required to be authenticated during the registration (Register) process;
[0049] The access proxy server P-CSCF 12 implements the user agent function, and processes or forwards received requests and services....
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com