Access authentication method of IMS network

An access authentication and network technology, applied in the field of data communication, can solve the problems of not being able to ensure data confidentiality and integrity, affecting user experience, information leakage, etc., to reduce authentication time, ensure confidentiality and integrity, and simplify The effect of the parameter

Pending Publication Date: 2020-03-27
STATE GRID ZHEJIANG ELECTRIC POWER +3
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 1. The user provides its identity to the P-CSCF in the form of plain text. When the UE sends the first request information to the network, the security key has not been negotiated between the UE and the network, and the attacker can steal it by analyzing the data packet. These identities, resulting in information leakage
[0006] 2. In the existing IMS AKA mechanism, during the mutual authentication process between UE and HSS, there are many AKA parameters in the authentication message. Due to the limitation of network bandwidth, the transmission delay will be very obvious. Users accessing the network through registration It will take a long time and affect the user experience
[0007] 3. During the AKA-based access authentication process, the UE does not perform identity authentication on the access point P-CSCF of the IMS core network, and cannot ensure the confidentiality and integrity of the data transmitted between the UE and the P-CSCF

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access authentication method of IMS network
  • Access authentication method of IMS network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] Embodiments of the present invention are described in detail below in conjunction with accompanying drawings:

[0042] An access authentication method for an IMS network, comprising:

[0043] Step 1: The network encrypts the user ID. Before registration and authentication between the network and the user, the P-CSCF at the edge of the network exchanges encryption functions with the user to encrypt the user ID twice;

[0044] The user ID includes a user private identifier IMPI and a user public identifier IMPU.

[0045] Step 2.1: The user generates the public key V to send the first request information to the network, the user server (HSS) in the network generates the public key W after receiving the first request information, and the HSS generates the public key W according to the public key V and Public key W generates session key AICK HSS and the authentication token and send the first response information to the user, the authentication token includes the HSS authe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an access authentication method of an IMS network. The method comprises: encrypting a user identity, performing dual encryption on a user ID through an exchange encryption function according to a random key generated by UE and a random key generated by a P-CSCF in a network, and decrypting the P-CSCF after entering the network, thereby avoiding leakage of a real identity ofthe user; performing identity authentication between the UE and the network through identity authentication tokens generated by the UE and the network respectively, so that parameters carried in information during identity authentication are simplified; and establishing IPSec association between the UE and the P-CSCF, and adopting a session key in a bidirectional identity authentication process to generate a negotiation key, so that the confidentiality and integrity of data transmitted between the UE and the P-CSCF are ensured.

Description

technical field [0001] The invention relates to the technical field of data communication, in particular to an access authentication method of an IMS network. Background technique [0002] The IP Multimedia Subsystem (IMS), defined by 3GPP and formed by the SIP protocol for session control and signaling, provides a better solution for network integration and service extension. The IMS system architecture is an open architecture system, and its core design method is "separation of business and control" and "separation of control and bearer". The method is beneficial to the development of new services, and can support multiple access modes so that different users can access the IMS network, so that users can enjoy various business services and improve user experience. [0003] As the core control platform of 3G network, the security of IP Multimedia Subsystem (IMS) is facing severe challenges. As the first step in the implementation of the entire IMS security scheme, the imp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04W12/06H04L9/32H04L9/30
CPCH04W12/02H04W12/06H04L9/3213H04L9/3066
Inventor 王云烨吴建伟杨鸿珍卢晓帆史俊潇方晴程贺琛段玉帅徐海青陈是同徐唯耀董媛媛浦正国梁翀张天奇余江斌吴小华张彬彬
Owner STATE GRID ZHEJIANG ELECTRIC POWER
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products