CN101662753A - Method and device for authenticating access of emergency call - Google Patents
Method and device for authenticating access of emergency call Download PDFInfo
- Publication number
- CN101662753A CN101662753A CN200810141767A CN200810141767A CN101662753A CN 101662753 A CN101662753 A CN 101662753A CN 200810141767 A CN200810141767 A CN 200810141767A CN 200810141767 A CN200810141767 A CN 200810141767A CN 101662753 A CN101662753 A CN 101662753A
- Authority
- CN
- China
- Prior art keywords
- user terminal
- network side
- urgent call
- unauthenticated user
- unauthenticated
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Telephonic Communication Services (AREA)
Abstract
The embodiment of the invention discloses a method and a device for authenticating access of an emergency call. The method comprises that: a network side judges whether an unauthenticated user terminal sends emergency call indication; and when the network side receives the emergency call indication sent by the unauthenticated user terminal, the network side directly sends an authentication successmessage without a normal network access authentication flow. The device comprises an acquiring module, a judging module and a sending module. The emergency call problem of a WiMAX unauthenticated user can be solved by using a part of schemes or combining and using a plurality of schemes. For the unauthenticated user terminal and the network side, the aim can be achieved by guaranteeing minimum system change.
Description
Technical field
The present invention relates to field of wireless communication, relate in particular to the access authentication method and the device of urgent call.
Background technology
In case of emergency, the user can the call emergency services center, requires promptly to help, and emergency can have been located the position of exhaling the user by emergency services, solves accidents such as social security, emergency relief rapidly and accurately.Be called day by day in safety problem under the current form of the focal issue that the public is concerned about, the support of this demand becomes the condition of the market access, a lot of areas, the whole world are by legal provisions, and requiring provides the operator of commercial VoIP business that the emergency services function must be provided.
On February 11st, 2008, in the draft of NWG (Network Working Group, network access Identifier), distinguished three kinds of scenes for the urgent call networking about the agreement of urgent call:
The first, the emergence call service of authorized user (WiMAX authorized EmergencyService), the scene of verification process success when referring to devices accessing WiMAX network.Equipment still can be carried out urgent call.
The second, the emergence call service of unauthorized user (WiMAX Unauthorized EmergencyService), verification process failure when referring to devices accessing WiMAX network, as credit problems, account number is expired, and during the scene of Account lockout or the like, equipment still can be carried out urgent call.
The 3rd, the emergence call service of unauthenticated user (WiMAX Unauthenticated EmergencyService) refers to that emergency caller do not visit the scene of the credentials of WiMAX Access Network, as does not have username and password, does not have private key.
The inventor finds that there is following problem at least in prior art in realizing process of the present invention:
On February 11st, 2008, in the draft of NWG about the agreement of urgent call, there is following problem: because agreement is supported the urgent call of above-mentioned first kind of situation, authentication success networking user's emergence call service and agreement are supported the urgent call of above-mentioned second kind of situation, as the emergence call service of user owing to arrearage or the like problem authentification failure user.But this agreement is not supported the urgent call of above-mentioned the third situation, as the user's that do not open an account emergence call service.
Summary of the invention
Embodiment of the invention problem to be solved is to propose a kind of access authentication method and device of urgent call, makes the emergence call service of unauthenticated user, meets the regulation about the agreement of urgent call.
The embodiment of the invention provides a kind of access authentication method of urgent call, comprising: network side judges whether the unauthenticated user terminal sends the urgent call indication; When network side received unauthenticated user terminal transmission urgent call indication, network side sent authentication success message.
The embodiment of the invention provides a kind of access authentication device of urgent call simultaneously, comprising: acquisition module is used for network side and obtains the networking flow process request that the unauthenticated user terminal is initiated; Judge module is used for network side and judges whether the unauthenticated user terminal sends the urgent call indication, and when network side received that the unauthenticated user terminal sends the urgent call indication, network side sent authentication success message; Otherwise authentication is unsuccessful.
Compared with prior art, the embodiment of the invention has the following advantages:
Solved the urgent call problem of the WiMAX unauthenticated user that defines in the NWG agreement by the embodiment of the invention.For terminal and network side, system changes and guarantees that minimum just can achieve the goal.
Description of drawings
In order to be illustrated more clearly in the embodiment of the invention or technical scheme of the prior art, to do to introduce simply to the accompanying drawing of required use in embodiment or the description of the Prior Art below, apparently, accompanying drawing in describing below only is some embodiments of the present invention, for those of ordinary skills, under the prerequisite of not paying creative work, can also obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is the cut-in method schematic diagram in the embodiment of the invention.
Fig. 2 is the cut-in method schematic diagram of one embodiment of the invention.
Fig. 3 is the device schematic diagram of one embodiment of the invention.
Fig. 4 is a cut-in method schematic diagram another in the embodiment of the invention.
Fig. 5 is an another cut-in method schematic diagram in the embodiment of the invention.
Fig. 6 is an another access device schematic diagram in the embodiment of the invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the invention, the technical scheme in the embodiment of the invention is clearly and completely described, obviously, described embodiment only is the present invention's part embodiment, rather than whole embodiment.Based on the embodiment among the present invention, those of ordinary skills belong to the scope of protection of the invention not making the every other embodiment that is obtained under the creative work prerequisite.
The method of the user code resource allocation that the embodiment of the invention is provided below in conjunction with the drawings and specific embodiments is elaborated.
Fig. 1 is the cut-in method schematic diagram in the embodiment of the invention, comprising:
Step S101, network side judge whether the unauthenticated user terminal sends the urgent call indication;
Step S102, when network side receives the unauthenticated user terminal when sending the urgent call indication, network side sends authentication success message.
The advantage of this scheme is that authorizing procedure is simple fast, and system changes and guarantees that minimum just can achieve the goal.
Fig. 2 is the cut-in method schematic diagram in the embodiment of the invention, comprising:
Step S201, unauthenticated user terminal are initiated the networking flow process;
Step S202, network side request unauthenticated user terminal provide sign;
Step S203, unauthenticated user terminal can be used the urgent call indication in NAI { the sm=2} indicating emergency is called out and is networked;
When step S204, network side identify unauthenticated user terminal initiation urgent call networking, directly send authentication success message, make the unauthenticated user terminal by authorizing procedure, limiting terminal can only carry out emergence call service.
Usually, for the WiMAX network, the authorizing procedure that networks normally is meant: system is generally by device authentication, or authentification of user, or whether device authentication to distinguish the user be unauthenticated user if adding mode such as authentification of user.Device authentication refers to the authentication to equipment validity, is used to judge whether to allow the equipment access network.Device authentication is used to check the legitimacy of terminal in the WiMAX network.Operator can be used for monitoring stolen terminal, or unwarranted black terminal.If there is not device authentication, illegal WiMAX terminal also can insert the WiMAX network, takies certain resource, causes the wasting of resources.In addition, if there is not device authentication, the disabled user also may enjoy some some preferential policies that validated user just can have.Device authentication can adopt device certificate (DEVICE-CERT) or preset key (PSK) dual mode in the NWG agreement.Device certificate is a digital certificate through certificate authorization center digital signature, comprises the file of public-key cryptography owner information and public-key cryptography.The root certificate is self certificate of certificate issue mechanism, the legitimacy of other certificates such as personal certificate that can be used for verifying that this issuer issues.Server certificate is that the ca authentication center is issued, is installed on the server in order to prove the certificate of server identity.Authentification of user refers to the authentication to user validation, is used to judge whether to allow user access network.PKMv2 is used for carrying out the authentification of user of eating dishes without rice or wine, and PKMv2 transmits EAP in the air interface of MS and BS, supports many EAP authentication methods, as EAP-AKA, EAP-TLS, EAP-SIM and EAP-PSK or the like can also use the end-to-end transmission tunnel TTLS of a safety to be used for authentification of user.In order to make the WiMAX unauthenticated user in case of emergency, also can the call emergency services center, promptly helped.We provide different solutions to make the WiMAX unauthenticated user by authorizing procedure, obtain emergency services.
The foregoing description also can occur in judgement behind the authorizing procedure that normally networks, not by after the authentication.
The advantage of this scheme is that authorizing procedure is simple fast.
Fig. 3 installs schematic diagram in the embodiment of the invention, comprising:
Described judge module 320 comprises:
Send submodule 322, when network side received unauthenticated user terminal transmission urgent call indication, network side sent authentication success message.
Fig. 4 is an another cut-in method schematic diagram in the embodiment of the invention, comprising:
Step S401, unauthenticated user terminal are initiated the networking flow process;
Step S402, network side request unauthenticated user terminal provide sign;
Step S403, unauthenticated user terminal are used the urgent call account number indicating emergency calling networking unified with network side in NAI, when being the user name pin mode, this unified urgent call account number uses unified account, as user name: e-call, password: e-call, perhaps username and password all is the unified account information of null character string;
When step S404, network side identify unauthenticated user terminal initiation urgent call networking, directly send authentication success message, make the unauthenticated user terminal by authorizing procedure, limiting terminal can only carry out emergence call service.
The advantage of this scheme is to have moved with the normal identical authorizing procedure that networks, and can produce follow-up signaling and professional encrypted secret key, and subsequent delivery can only be encrypted transmission.
Fig. 5 is an another cut-in method schematic diagram in the embodiment of the invention, comprising:
Step S501, when when the unauthenticated user terminal needs urgent call to network, initiating the networking flow process, unauthenticated user terminal and network side can be according to for example carrying out authorizing procedure with normal account.
If step S502 authentication is passed through, can carry out emergence call service, also can move other business according to CAMEL-Subscription-Information.
If step S503 authentification failure, the urgent call authentication-exempt flow process of the embodiment 1 that reruns or urgent call unified account identifying procedure guarantee that authentication passes through, and can initiate emergence call service.
The advantage of this scheme is the business that unauthenticated user terminal such as need are initiated other, does not need to initiate again authorizing procedure.
Fig. 6 is an another device schematic diagram in the embodiment of the invention, comprising:
First authentication module 601 is used for the unauthenticated user terminal earlier with the normal identical authorizing procedure that networks of normal account number operation;
Second authentication module 602 is used for the unauthenticated user terminal and uses the normal identical authorizing procedure that networks of unified urgent call account number operation.
More than disclosed only be several specific embodiment of the present invention, still, the present invention is not limited thereto, any those skilled in the art can think variation all should fall into protection scope of the present invention.
Claims (13)
1, a kind of access authentication method of urgent call is characterized in that, comprising:
Network side judges whether the unauthenticated user terminal sends the urgent call indication;
When network side received unauthenticated user terminal transmission urgent call indication, network side sent authentication success message.
2, the method for claim 1 is characterized in that, described network side judges the unauthenticated user terminal also comprises before whether sending the urgent call indication:
Network side is received the networking flow process request that the unauthenticated user terminal is initiated;
Network side request unauthenticated user terminal provides the sign that networks.
3, method as claimed in claim 2 is characterized in that, after it occurs in and judges the authorizing procedure that normally networks, not by after the authentication.
4, the method for claim 1 is characterized in that, described urgent call indication is that the unauthenticated user terminal uses urgent call indication SM=2 indicating emergency to call out networking in NAI.
5, the method for claim 1 is characterized in that, described urgent call indication is that the unauthenticated user terminal is used the urgent call account number indicating emergency calling networking unified with network side in NAI.
6, method as claimed in claim 5 is characterized in that, described network side and unauthenticated user terminal support unified urgent call account number to be:
Username and password uses unified account or the username and password account as null character string.
7, a kind of access authentication method of urgent call is characterized in that, comprising:
The unauthenticated user terminal is used the urgent call indicating emergency to call out and is networked;
The unauthenticated user terminal receives the authentication success message that network side sends;
The unauthenticated user terminal is initiated urgent call.
8, method as claimed in claim 7 is characterized in that, described unauthenticated user terminal uses the urgent call indicating emergency to call out before the networking, also comprises:
The unauthenticated user terminal is initiated the request of networking flow process;
The unauthenticated user terminal is received the network side requirement, and it provides the sign that networks.
9, method as claimed in claim 7 is characterized in that, described urgent call indication is that the unauthenticated user terminal uses urgent call indication SM=2 indicating emergency to call out networking in NAI.
10, method as claimed in claim 7 is characterized in that, described urgent call indication is that the unauthenticated user terminal is used the urgent call account number indicating emergency calling networking unified with network side in NAI.
11, method as claimed in claim 10 is characterized in that, described network side and unauthenticated user terminal support unified urgent call account number to be:
Username and password uses unified account or the username and password account as null character string.
12, a kind of access authentication device of urgent call is characterized in that, comprising:
Acquisition module is used for network side and obtains the networking flow process request that the unauthenticated user terminal is initiated;
Judge module is used for network side and judges whether the unauthenticated user terminal sends the urgent call indication, and when network side received that the unauthenticated user terminal sends the urgent call indication, network side sent authentication success message; Otherwise authentication is unsuccessful.
13, device as claimed in claim 12 is characterized in that, described judge module comprises:
Judge submodule, be used for network side and judge whether the unauthenticated user terminal sends the urgent call indication;
Send submodule, be used for network side and send authentication success message.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200810141767A CN101662753A (en) | 2008-08-30 | 2008-08-30 | Method and device for authenticating access of emergency call |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200810141767A CN101662753A (en) | 2008-08-30 | 2008-08-30 | Method and device for authenticating access of emergency call |
Publications (1)
Publication Number | Publication Date |
---|---|
CN101662753A true CN101662753A (en) | 2010-03-03 |
Family
ID=41790448
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN200810141767A Pending CN101662753A (en) | 2008-08-30 | 2008-08-30 | Method and device for authenticating access of emergency call |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101662753A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2013123641A1 (en) * | 2012-02-21 | 2013-08-29 | 华为技术有限公司 | Method, system, node b and user equipment for emergency call access |
US9326113B2 (en) | 2010-11-16 | 2016-04-26 | Huawei Device Co., Ltd. | Network device, called terminal, and method for processing third-party call |
-
2008
- 2008-08-30 CN CN200810141767A patent/CN101662753A/en active Pending
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9326113B2 (en) | 2010-11-16 | 2016-04-26 | Huawei Device Co., Ltd. | Network device, called terminal, and method for processing third-party call |
WO2013123641A1 (en) * | 2012-02-21 | 2013-08-29 | 华为技术有限公司 | Method, system, node b and user equipment for emergency call access |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR101986312B1 (en) | Method for Creating Trust Relationship and Embedded UICC | |
CN108684041B (en) | System and method for login authentication | |
US20140245417A1 (en) | Centralized secure management method of third-party application, system and corresponding communication system | |
EP1476980B1 (en) | Requesting digital certificates | |
KR100645512B1 (en) | Apparatus and method for authenticating user for network access in communication | |
EP2384038B1 (en) | Method and system for realizing network locking and unlocking by a terminal device | |
US9497630B2 (en) | Enhanced manageability in wireless data communication systems | |
CN101552986B (en) | Access authentication method and system of streaming media service | |
JP2007511122A (en) | How to manage application security with security modules | |
CN111246477B (en) | Access method, terminal, micro base station and access system | |
US8302175B2 (en) | Method and system for electronic reauthentication of a communication party | |
KR20150011305A (en) | Biometric authentication electronic signature registration methods using an instant messenger | |
CN102905263A (en) | Method and device for enabling third generation (3G) user to safely access to network | |
WO2011124051A1 (en) | Method and system for terminal authentication | |
CN111556501A (en) | Trusted communication system and method | |
CN110929231A (en) | Digital asset authorization method and device and server | |
CN107659935A (en) | A kind of authentication method, certificate server, network management system and Verification System | |
CN101662753A (en) | Method and device for authenticating access of emergency call | |
CN104244210A (en) | Emergency communication method, mobile terminal, authentication server and wireless access point | |
CN114615309B (en) | Client access control method, device, system, electronic equipment and storage medium | |
WO2011144129A2 (en) | Machine-card interlocking method, user identity model card and terminal | |
CN101931952A (en) | Wireless metropolitan area network system and identification and verification method thereof | |
CN107864136A (en) | A kind of stolen method of anti-locking system short message service | |
CN114845301A (en) | Number verification method, terminal and system based on super SIM card | |
KR20140029067A (en) | Methods and apparatus for electronically identifying personal identity |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20100303 |