A kind of SIP user authentication method and device

A user authentication and user technology, applied in the field of network security, can solve problems such as low authentication efficiency, and achieve the effect of improving authentication efficiency and solving low authentication efficiency.

Active Publication Date: 2022-05-10
CHINA MOBILEHANGZHOUINFORMATION TECH CO LTD +1
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] Embodiments of the present invention provide a SIP user authentication method and device, which are used to solve the technical problem of low authentication efficiency in existing SIP authentication methods and improve authentication efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A kind of SIP user authentication method and device
  • A kind of SIP user authentication method and device
  • A kind of SIP user authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0090] Please refer to figure 2 , Embodiment 1 of the present invention provides a session initiation protocol SIP user authentication method applied to a terminal device, including:

[0091] S101: Receive a first session request from a SIP user for the terminal device;

[0092] S102: Send the first session request to a SIP server;

[0093] S103: Receive the first response message sent by the SIP server, and determine the SIP user identity information;

[0094] S104: Determine the first summary message of the SIP user identity information;

[0095] S105: Generate a ring signature of the first digest message;

[0096] S106: Send a second session request including the ring signature different from the first session request to the SIP server, so that the SIP server can verify whether the ring signature is valid, wherein, if the ring signature is valid , indicating that the SIP user has passed the authentication of the SIP server.

[0097] In the specific implementation proc...

Embodiment 2

[0232] Based on the same inventive concept as Embodiment 1 of the present invention, please refer to Image 6 , the embodiment of the present invention also provides a session initiation protocol SIP user authentication device, which is applied to a terminal device, including:

[0233] The first receiving unit 10 is configured to receive a first session request from a SIP user for the terminal device;

[0234] A first sending unit 20, configured to send the first session request to a SIP server;

[0235] The second receiving unit 30 is configured to receive the first response message sent by the SIP server, and determine the SIP user identity information;

[0236] A determining unit 40, configured to determine the first summary message of the SIP user identity information;

[0237] A generating unit 50, configured to generate a ring signature of the first digest message;

[0238] The second sending unit 60 is configured to send a second session request including the ring si...

Embodiment 3

[0245] Based on the same inventive concept as Embodiment 1 of the present invention, please refer to Figure 7 , the embodiment of the present invention also provides a session initiation protocol SIP user authentication method applied to a SIP server, including:

[0246] S301: Receive a first session request sent by a SIP user for a terminal device;

[0247] S302: Send a first response message to the terminal device based on the first session request, so that the terminal device generates a ring signature of a first digest message of SIP user identity information;

[0248] S303: Receive a second session request sent by the terminal device that is different from the first session request and includes the ring signature, and verify whether the ring signature is valid, wherein if the ring signature is valid, it indicates that the SIP The user passes the authentication of the SIP server.

[0249] Steps S301 to S303 have been described in detail in Embodiment 1, and will not be ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a SIP user authentication method and device, wherein the method is applied to a terminal device, comprising: receiving a first session request from a SIP user for the terminal device; sending the first session request to a SIP server; Receive the first response message sent by the SIP server, and determine the SIP user identity information; determine the first digest message of the SIP user identity information; generate a ring signature of the first digest message; send and communicate with the first session Requesting a different second session request including the ring signature to the SIP server, so that the SIP server verifies whether the ring signature is valid, wherein if the ring signature is valid, it indicates that the SIP user has passed the Authentication of the SIP server. It is used to solve the technical problem of low authentication efficiency in the existing SIP authentication method, and improve the authentication efficiency.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a SIP user authentication method and device. Background technique [0002] With the development of the Internet and the next-generation network, its convenient access, gradually increasing access speed, easy-to-expand features, and rich business functions have been welcomed by operators and users, but at the same time, its security As the core protocol of the next generation network, the SIP (Session Initiation Protocol, Session Initiation Protocol) protocol also faces the same problem in terms of security. The SIP protocol belongs to the IP (Internet Protocol, Internet Protocol) application layer protocol, and is used to provide session applications for users on the IP network. A session refers to communication in the form of voice, video, and other media between two or more users, which may be IP telephony, conferences, instant messages, and so on. [0003] Such as ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L65/1104H04L65/1073H04L9/40
CPCH04L9/3255H04L9/3239H04L65/1073H04L63/0876H04L63/083H04L63/102H04L65/1104
Inventor 袁勇黄一鸣王姗姗
Owner CHINA MOBILEHANGZHOUINFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products