Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Client authentication method, password agent device and system

An authentication method and technology of an agent device, applied in the fields of IP multimedia subsystem, client authentication method, password agent device and system, can solve the problems of being easily attacked by hackers, unable to guarantee information security, poor security level, etc., to improve experience , High login security, and the effect of improving security

Inactive Publication Date: 2011-03-30
CHINA MOBILE COMM GRP CO LTD
View PDF4 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 1. The existing static login authentication method is unreliable and cannot guarantee information security
[0006] 2. The existing static login method requires the user to remember the password and user name, which is inconvenient. If you remember it incorrectly, you may not be able to log in normally
[0007] 3. The security of the existing login method is usually limited by the complexity of the password itself and the user's computer level, the security level is poor, and it is often easily attacked by hackers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Client authentication method, password agent device and system
  • Client authentication method, password agent device and system
  • Client authentication method, password agent device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0030] figure 1 It is a flow chart of Embodiment 1 of the client authentication method according to the present invention. Such as figure 1 As shown, this embodiment includes:

[0031] Step S102: receiving a dynamic authentication request including an IMS user ID;

[0032] Step S104: Generate a random dynamic password for the valid dynamic authentication request and send it to the IMS user; for example, verify whether the IMS user ID contained in the dynamic authentication request is legal;

[0033] Step S106: Receive the dynamic password input by the IMS user, and search for the corresponding static password for the successfully authenticated user;

[0034] Step S108: Use the static password to perform subsequent authentication of each network element of the IMS core network.

[0035] This embodiment aims at the combination of dynamic password authentication, a strong authentication method, and IMS users, and provides a reliable authentication method for the user side to ...

Embodiment 2

[0037] figure 2 It is a flow chart of Embodiment 2 of the client authentication method according to the present invention. Such as figure 2 As shown, this embodiment includes:

[0038] Step S201: Receive the dynamic authentication request containing the user ID, and perform the following steps on the verified legal authentication request, otherwise, the dynamic authentication requester "illegal user" can be returned directly;

[0039] Step S202: Determine the type of the user identifier, such as: the user's identity identifier (user ID), or the user's mobile number, such as a mobile phone number. If it is a mobile number, then step S204 is performed, and if it is a user ID number, then step S203;

[0040] Step S203: Search for the mobile terminal identification (such as: mobile phone number) corresponding to the user ID. Generally, the corresponding relationship between users and their identifications will be stored, as shown in Table 1

[0041] Table 1 Correspondence be...

Embodiment 3

[0050] according to the above figure 1 and figure 2 According to the description of the method embodiment, those skilled in the art know that the strong authentication method of dynamic password authentication is used to assist in completing the IMS client authentication login. The user does not need to remember the static password, and only needs to enter the received dynamic password when logging in. However, in actual application, when the dynamic authentication method is adopted, the following problems may be encountered:

[0051]At present, when an IMS user logs in, although the user only needs to enter a password once, the IMS core device side needs to complete such as home subscriber server (Home Subscriber Server, HSS for short), application server (Application Server, AS for short), fixed network simulation service ( PSTN / ISDN Simulation Services (PSS for short) and other multiple network elements authentication and authentication, because these network elements all...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a client authentication method, a password agent device and a system. The method comprises the following steps of: receiving a dynamic authentication request containing user identification; generating a dynamic password according to the dynamic authentication request, and sending the dynamic password to the user; receiving the dynamic password of the user, and searching a corresponding static password for the user passing the verification; and performing authentication on a subsequent core network element according to the static password. The method can improve the security of client login, and overcomes the defect of low reliability in the IMS login mode in the prior art.

Description

technical field [0001] The present invention relates to IP Multimedia Subsystem (IP Multimedia Subsystem, IMS for short) technology in the field of communication, in particular, relates to a client authentication method, a password proxy device and a system. Background technique [0002] As the 3GPP next-generation communication technology standard and evolution direction, IMS provides strong support and solutions for the integration of IT technology and CT technology. IMS technology supports a variety of different physical access communication methods. Among the many supported communication methods, using a computer to connect to the Internet to realize IMS communication has become the mainstream. [0003] At present, when a user logs in to the IMS network using the client, the authentication and authentication of the user is mainly completed through the user name and password, that is, the IMS client user can log in to the IMS network by entering the user name and password...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/04H04L12/06H04L29/06H04W12/06
Inventor 张乐高翔赵刚张向祺冯运波
Owner CHINA MOBILE COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products