CN1753363A - Method of selecting right identification mode at network side - Google Patents
Method of selecting right identification mode at network side Download PDFInfo
- Publication number
- CN1753363A CN1753363A CN 200510093819 CN200510093819A CN1753363A CN 1753363 A CN1753363 A CN 1753363A CN 200510093819 CN200510093819 CN 200510093819 CN 200510093819 A CN200510093819 A CN 200510093819A CN 1753363 A CN1753363 A CN 1753363A
- Authority
- CN
- China
- Prior art keywords
- authentication
- cscf
- user
- information
- request
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Landscapes
- Mobile Radio Communication Systems (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
This invention discloses a method for selecting authority authentication mode by the network including: HSS feeds back the information supporting the early IMS mode of authority authentication, the information supporting the 3G-authority authentication mode or the failure information directly to S-CSCF based on the received required information in the authority authentication vector required information from S-CSCF and the kind of the requiring user, if the information is from the first two, S-CSCF feeds back the information of permitting or refusing access to the user based on the authority authentication result after authentication with related modes, if it's the last one, then S-CSCF sends the information of forbidding the access to the UE directly.
Description
Technical field
The present invention relates to the mobile communication technology field, be meant especially when user's application of multimedia subsystem (IMS) network, by the method for network side anthority-discrimination-mode selecting.
Background technology
Development along with broadband network, mobile communication not only is confined to traditional Speech Communication, by with present that business (presence), short message, webpage (WEB) are browsed, the combining of data service such as locating information, propelling movement business (PUSH) and file-sharing, mobile communication can realize the business of multiple medium types such as audio frequency, video, picture and text, to satisfy user's multiple demand.
3rd Generation Partnership Project (3GPP) and 3rd Generation Partnership Project 2 (3GPP2) etc. are organized and have all successively been released IP-based IP multimedia subsystem, IMS (IMS) framework, its objective is and in the mobile network, use a kind of standardized open architecture to realize diversified multimedia application, so that more selection and abundanter impression to be provided to the user.
The IMS framework is superimposed upon on the packet field network, and the entity that this framework is relevant with authentication comprises CSCF (CSCF) entity and home signature user server (HSS) functional entity.
CSCF can be divided into serving CSCF (S-CSCF), proxy CSCF (P-CSCF) and three logic entities of inquiry CSCF (I-CSCF) again, these three logic entities may be on different physical equipments, in also may be in the same physical equipment different functional modules.S-CSCF is the service switching center of IMS, is used to carry out session control, peace preservation association's speech phase, and managing user information produces charge information etc.; P-CSCF is the access point of terminal user access to IMS, is used to finish user's registration, service quality (QoS) control and safety management etc.; I-CSCF is responsible for the intercommunication between the IMS territory, and network topology structure and configuration information are externally hidden in the distribution of management S-CSCF, and produce metering data etc.HSS is very important customer data base, is used to support the processing of each network entity to calling and session.
IMS is based on the 3G (Third Generation) Moblie network, thereby the business on the IMS is very abundant, so operator uses IMS on the network of 2G demand occurred.But on the network of 2G what can't support based on the safety related functions of 3G network IMS, for example based on access authentication of IMS layer etc., therefore, the transition right-identification scheme of 2G application IMS business has appearred being in the prior art, this authentication scheme is also referred to as Early IMS authentication scheme or IP-based authentication scheme, and this authentication scheme provides certain safety function for 2G user's application IMS business.When network upgrade after 3G, use complete authentication mode again based on 3G.
Authentication mode during existing application IMS based on 2G, just Early IMS authentication scheme is as follows:
User terminal at first inserts the packet domain (PS-Domain) of 3GPP, this packet field network can carry out authentication to the user, after authentication is passed through, the packet network gateway node (GGSN) of packet network distributes an IP address to the user, and this IP address also is this user applied IP address when using IMS professional.GGSN is notified to HSS with this IP address and user's telephone number (MSIDSN) by intermediate entities, HSS finds the privately owned identify label IMPI of user in IMS by user's MSISDN, and information such as this user's IMPI, MSISDN and IP address are bound preservation.When the user will use IMS, user terminal at first can send register request message (Register), this message is transmitted the back through intermediate entities and is arrived S-CSCF, S-CSCF obtains behind the binding relationship of this user's IMPI and IP address from HSS and preserves, S-CSCF checks from the IMPI of user terminal and the IP address of use thereof whether be complementary with this IMPI that self preserves and the binding of IP address then, if, think that then it is a validated user terminal, controlling this user terminal inserts, allow this user to use the IMS business, otherwise think that it is a disabled user, refuse this 2G user and insert.
Authentication mode during existing application IMS based on 3G is as follows:
User terminal at first is linked into the packet domain (PS-Domain) of 3GPP, and through behind the authentication of packet domain, GGSN connects for user's distributing IP address.If the user will use the IMS business, then this user terminal is initiated Register in the IMS territory, after this message is forwarded to S-CSCF, by S-CSCF to HSS request authentication vector and use authentication and key agreement protocol (AKA) carries out IMS operation layer authentication to the user, authentication success back S-CSCF allows the user to insert, for the user provides IMS business, otherwise refuse this user's application IMS business.
Though based on the user of 2G and based on the user of 3G can both insert and application IMS in business, and the mode based on the access IMS of 2G and 3G is compatible mutually, but the problem that exists is at present, for the system that is upgraded to 3G, after core network among the IMS is received user's registration request, and do not know and use which kind of authentication mode that the user who inserts is carried out authentication, but the authentication mode of directly using based on 3G carries out authentication to this user.Like this, if legal 2G user, can not insert equally, this be because, network side is different with the authentication mode to 3G subscription to 2G user's authentication mode, and 2G user can not be by the authentication mode based on 3G, and network side will think that this user is the illegal user who inserts this moment, thereby cause validated user normally not insert, make the fault-tolerant ability of network poor.
Summary of the invention
In view of this, the object of the present invention is to provide a kind of method of network side anthority-discrimination-mode selecting, make network side select correct authentication mode according to user's needs.
For achieving the above object, technical scheme of the present invention is achieved in that
A kind of method of network side anthority-discrimination-mode selecting is applicable to multi-media subsystem network, and this method may further comprise the steps:
After a, service call State Control functional entity S-CSCF receive registration request from user terminal, send the authentication vector request that comprises required authentication mode sign to home signature user server HSS;
B, HSS judge according to required authentication mode sign whether S-CSCF asks the authentication information based on Early IMS authentication mode, if, execution in step d then; Otherwise, judge that again this request inserts user's type, if 3G subscription then returns the authentication information of supporting the 3G authentication mode, execution in step c then to S-CSCF; If 2G user, then execution in step d or step e;
C, S-CSCF adopt the authentication mode based on 3G that the user that request inserts is carried out authentication, if authentication is passed through, then return the information that allows access to the user, finish; If failed authentication and failure cause be not for supporting this authentication mode, S-CSCF sends the authentication vector request that comprises request Early IMS authentication mode sign, execution in step b then to HSS;
D, HSS return authentication information based on Early IMS to S-CSCF, by the authenticating result of S-CSCF according to the employing Early IMS authentication mode that obtains, return to user terminal and to allow to insert or information that refusal inserts, finish;
E, HSS return the failure information that this authentication mode is not supported in indication to S-CSCF, and informing user terminal was forbidden inserting after S-CSCF received this failure information, finished.
Preferably, the described S-CSCF of step a receives in the registration solicited message from user terminal, further comprises: the user access networks type information;
Described failed authentication of step c and failure cause be not when supporting this authentication mode, further comprise: S-CSCF judges this user access networks type, if access network type is the 2G network, then continue to carry out subsequent step, if access network type is a 3G network, then directly return the information that refusal inserts to the user.
Preferably, described S-CSCF further comprises: the user access networks type information in the authentication vector request that comprises required authentication mode sign that HSS sends;
The described HSS of step b judge S-CSCF need authentication information based on Early IMS authentication mode after, further comprise: HSS judges this user access networks type, if access network type is the 2G network, then continue to carry out subsequent step, if access network type is a 3G network, and the user that request inserts is 3G subscription, then returns the authentication information of supporting the 3G authentication mode to S-CSCF, after S-CSCF receives this information, perhaps execution in step c or directly return the information that refusal inserts to the user.
Preferably, the authentication information of described support 3G authentication mode is an AKA authentication vector information; The process that the user that the authentication mode of the described employing of step c 3G inserts request carries out authentication is: adopt the AKA agreement that the user is carried out authentication.
Preferably, the authentication information of described support Early IMS authentication mode is the binding information of User Identity and IP address; The process that the described S-CSCF of steps d obtains the authenticating result that adopts Early IMS authentication mode is: S-CSCF checks whether the IP address the binding information of this IP address of receiving from user terminal and this User Identity received from HSS and IP address mates, if then pass through authentication, otherwise this user can not pass through authentication, thereby directly obtains authenticating result.
Preferably, the described HSS of steps d to the method that S-CSCF returns based on the authentication information of Early IMS is:
HSS directly returns authentication information based on Early IMS to S-CSCF, perhaps,
HSS returns the failure information that this authentication mode is not supported in indication to S-CSCF, after S-CSCF receives this failure information, send to HSS and comprise the authentication vector request of request based on Early IMS authentication mode sign, HSS returns authentication information based on Early IMS to S-CSCF again according to this request.
Preferably, the described S-CSCF of step a further comprises the application user's IP address in the authentication vector request that HSS sends; The authentication information of described support Early IMS authentication mode is the binding information of User Identity and IP address; The process that the described S-CSCF of steps d obtains the authenticating result that adopts Early IMS authentication mode is: HSS checks from the IP address in the binding information of the user's IP address of S-CSCF and this User Identity self preserved and IP address whether mate, if then pass through authentication, the information that sends the authentication success is to S-CSCF, otherwise the information that sends failed authentication is to S-CSCF.
Preferably, when the described S-CSCF of step a sends the authentication vector request that comprises required authentication mode sign to HSS, whether judgement is from there being request to support the sign of early IMS security mode in the register request message of user terminal, if have, then send and comprise the authentication vector request that Early IMS authentication mode is supported in request to HSS, otherwise, send the authentication vector request that comprises request support 3G authentication mode to HSS.
Preferably, the sign of early IMS security mode is supported in the request that comprises in the register request message that described user terminal sends, and is carried in the field that sets in advance in this message, perhaps, by default default value, expression is used and is supported Early IMS authentication mode; Described default default value is the security message head security headers that uses in the default 3G authentication mode message.
Preferably, the sign of Early IMS authentication mode is supported in described S-CSCF the request in the authentication vector request message of HSS of sending to, and is carried on to be used for the field of identification request based on the 3G authentication mode in this message.
Use the present invention, after HSS receives authentication vector request from S-CSCF, judge the authentication vector information that it is asked, if the authentication information of Early IMS authentication mode is supported in the S-CSCF request, then return authentication information, and adopt Early IMS authentication mode that the user of this request access is carried out authentication based on Early IMS to S-CSCF; If the authentication information of 3G authentication mode is supported in the S-CSCF request, judge that again this request inserts user's type, if 3G subscription then returns the authentication information of supporting the 3G authentication mode to S-CSCF, and adopt authentication mode that the user that this request inserts is carried out authentication based on 3G; If 2G user, then HSS returns failure information to S-CSCF, forbid inserting by this failed authentication of S-CSCF notice UE, perhaps, HSS returns authentication information based on Early IMS to S-CSCF, adopt the authentication mode of Early IMS that the user that this request inserts is carried out authentication,, return the information that allows access or refusal to insert to the user by S-CSCF at last according to authenticating result.
Use the present invention, make network side select correct authentication mode that the user is carried out authentication, improved the ability that network side is handled abnormal conditions, make the compatible to the full extent original security protocol of network side according to user's needs.
Description of drawings
Figure 1 shows that the schematic flow sheet of using embodiments of the invention one;
Figure 2 shows that the schematic flow sheet of using embodiments of the invention two;
Figure 3 shows that the schematic flow sheet of using embodiments of the invention three.
Embodiment
Below in conjunction with drawings and the specific embodiments, the present invention is done detailed description further again.
For 3G network, the S-CSCF of existing protocol sends in the authentication vector request message of HSS, and having a field to be specifically designed to identification request is the authentication vector of AKA authentication scheme based on the 3G authentication mode, and the content in this field is unique.Can discern the needs of Early IMS authentication mode for 3G network, be that this field increases a new optional authentication mode sign, supports the authentication vector of early IMS security mode in order to the expression request.And the default option that is designated this field that the 3G authentication mode is supported in request is set, and the option that is designated this field of Early IMS authentication mode is supported in request.
Certainly, send in the authentication vector request message of HSS at S-CSCF, increase and be used for indication request support 3G authentication mode sign or request support Early IMS authentication mode sign, as long as HSS can identify request and support the authentication information of 3G authentication mode or the authentication information that Early IMS authentication mode is supported in request, specific implementation is not limited to such scheme.
Figure 1 shows that the schematic flow sheet of using embodiments of the invention one.User in the present embodiment is for using the 2G user of 2G terminal or 3G terminal.
Step 101 when UE need use IMS professional, is initiated registration request (Register) in the IMS territory, this Register reaches S-CSCF through P-CSCF and I-CSCF.
Step 102, S-CSCF supports that according to the existing protocol process selecting 3G authentication mode is that the AKA authentication scheme sends the authentication vector request message to HSS, promptly asks simultaneously, also to include user's identify label in this request message based on AKA authentication vector information to HSS.This identify label can be IMPI, also can be user's common identity sign (IMPU), if IMPU then finds corresponding IMPI by HSS according to IMPU.
Step 103, HSS receives the authentication vector request from S-CSCF, know the information of its request AKA authentication vector according to the sign of the request authentication mode in this request message after, search this user's descriptor to judge this request access user's type according to the User Identity in this request message again, in the present embodiment, the user that HSS judges this request access can not support the AKA authentication scheme for 2G user, at this moment, HSS has two covers to carry into execution a plan, one cover is an execution in step 104~105, another set of is execution in step 104 '~106 ', specifically carries out which sets of plan and is set by operator.Illustrate respectively with regard to two sets of plan below.
Step 104~105, HSS returns the failure information of not supporting this authentication mode to S-CSCF, after S-CSCF receives this failure information, send message informing UE and make a mistake, forbid that promptly UE inserts, UE will not register after receiving the message of error notification automatically once more, so far, this flow process finishes.
If subscriber terminal equipment is supported Early IMS authentication mode, and the user knows the ability of this subscriber terminal equipment, the user can handle subscriber terminal equipment and initiate the registration request again so, promptly re-execute step 101, the registration request of a beginning new round, the sign that has comprised request support early IMS security mode in this register request message, after S-CSCF receives this request, can directly support the authentication vector of early IMS security mode to the HSS request, its subsequent treatment is identical with following processing mode shown in Figure 3, concrete processing procedure can no longer describe in detail at this referring to Fig. 3.
Step 104 ', HSS returns the authentication vector information of supporting Early IMS authentication mode to S-CSCF, i.e. the binding information of this user's IMPI and this IP address.
When concrete the application, HSS has two kinds of implementations, explanation respectively below to the process that S-CSCF returns the authentication vector information of supporting Early IMS authentication mode.Concrete which kind of mode that adopts is set by operator.
A kind of is that HSS directly returns the authentication information of supporting Early IMS authentication mode to S-CSCF; Another kind is, HSS returns the failure information of not supporting this authentication mode to S-CSCF, after S-CSCF receives this failure information, again send the authentication vector request to HSS again, comprise request in this request and support the sign of Early IMS authentication mode, HSS returns the authentication information of supporting Early IMS authentication mode after judging the authentication information of S-CSCF request support Early IMS authentication mode to S-CSCF.
Step 105 ', after S-CSCF receives the message of returning, adopt Early IMS authentication mode that this user is carried out authentication, promptly check from the User IP among the Register of UE whether with the binding information of IMPI that receives from HSS and IP address the IP address be complementary, if coupling then think that this user is a validated user and is preserved this user's the IMPI and the binding information of IP address.
The work of in the above-mentioned steps 105 ' UE being carried out authentication also can be finished by HSS, if by the authentication operations of HSS execution to UE, the request of carrying in the authentication vector request that is then sent in step 102 inserts user's IP address, HSS check this IP address whether with the binding information of IMPI that self preserves and IP address in the IP address be complementary, if the coupling would think that this user is a validated user, at this moment, this UE of indication has passed through authentication in the information that HSS returns to S-CSCF, also comprise this user's the IMPI and the binding information of IP address simultaneously, so that use in the S-CSCF operation afterwards; If do not match then think that this user is illegal user, at this moment, this UE of indication promptly returns the information of failed authentication by authentication in the information that HSS returns to S-CSCF.
Step 106 ', after authentication, S-CSCF sends the information that allows access to UE.If authentication is not passed through, then S-CSCF sends to UE and forbids the information that inserts.
In the foregoing description, be 3G subscription if HSS judges required authentication information and this user of S-CSCF request AKA authentication mode, then return the authentication information of supporting the 3G authentication mode to S-CSCF, correspondingly, the back authentication process also is based on the authentication mode of 3G.
Figure 2 shows that the schematic flow sheet of using embodiments of the invention two.User in the present embodiment is for using the 3G subscription of 2G terminal.
Step 201 when UE need use IMS professional, is initiated Register in the IMS territory, this Register reaches S-CSCF through P-CSCF and I-CSCF.
Step 202, S-CSCF supports that according to the existing protocol process selecting 3G authentication mode is that the AKA authentication scheme sends the authentication vector request message to HSS, promptly to HSS request AKA authentication vector information, simultaneously, the IMPI or the IMPU that also include the user in this request message, if IMPU then finds corresponding IMPI by HSS according to IMPU.
Step 203, HSS receives the authentication vector request from S-CSCF, know the information of its request AKA authentication vector according to the sign of the request authentication mode in this request message after, search this user's descriptor to judge this request access user's type according to the User Identity in this request message again, in the present embodiment, HSS judges this user for behind the 3G subscription, returns the authentication information of supporting the 3G authentication mode, i.e. AKA authentication vector information to S-CSCF.
Step 204, S-CSCF sends authentication request to user terminal.
Step 205, because this user's terminal is the 2G terminal, it does not support the authentication mode based on 3G, therefore, it is the information of not supporting the failed authentication of this authentication mode that UE returns failure cause to S-CSCF, during specific implementation, can increase by a field and be used to represent that failure cause is not for supporting this authentication mode in the information that UE returns, also can adopt other method, as long as can express failure cause for not supporting this authentication mode.
Step 206, S-CSCF receives failure cause for after not supporting the failure information of this authentication mode, sends the authentication vector request to HSS again, comprises the sign that Early IMS authentication mode is supported in request in this request.
Step 207 after HSS receives step 206 described request, is returned the authentication information of supporting the early IMS security mode, the i.e. binding information of user's IMPI and IP address to S-CSCF.
Step 208, after S-CSCF receives the message of returning, adopt Early IMS authentication mode that this user is carried out authentication, promptly check from the User IP among the Register of UE whether with the binding information of IMPI that receives from HSS and IP address the IP address be complementary, if coupling then think that this user is a validated user and is preserved this user's the IMPI and the binding information of IP address.
The above-mentioned work that UE is carried out authentication also can be finished by HSS, if by the authentication operations of HSS execution to UE, the request of carrying in the authentication vector request that is then sent in step 206 inserts user's IP address, HSS check this IP address whether with the binding information of IMPI that self preserves and IP address in the IP address be complementary, if the coupling would think that this user is a validated user, at this moment, this UE of indication has passed through authentication in the information that HSS returns to S-CSCF, also comprise this user's the IMPI and the binding information of IP address simultaneously, so that use in the S-CSCF operation afterwards; If do not match then think that this user is illegal user, at this moment, this UE of indication promptly returns the information of failed authentication by authentication in the information that HSS returns to S-CSCF.
Step 209, after authentication, S-CSCF sends the information that allows access to UE.If authentication is not passed through, then S-CSCF sends to UE and forbids the information that inserts.
In addition, receive from the failure cause of user terminal to after not supporting the failure information of this authentication mode at S-CSCF, can further judge the access network type field in the register request message, to prevent from have the ability to carry out the 3G authentication mode but refusal carry out based on the malicious user of the authentication mode of 3G and gain business by cheating.For example the user uses the subscriber card of 3G and the mobile phone of 3G, but in step 205, return the failed message of not supporting this authentication mode, this time, S-CSCF just can judge whether this user is malicious user by judging the access network type field in the Register message, if this field shows that access network type is a 3G network, S-CSCF just can determine that this user is the user of a malice and refuse its access so.Because the user terminal of 2G is to insert by the access network of 3G.
Figure 3 shows that the schematic flow sheet of using embodiments of the invention three.User in the present embodiment is for using the 2G user of 2G terminal.
Step 301 when UE need use IMS professional, is initiated Register in the IMS territory, this Register reaches S-CSCF through P-CSCF and I-CSCF, and, comprise the sign that Early IMS authentication mode is supported in request in this register request message.
During specific implementation, can in Register message, increase by a field, be used for the expression request and support the early IMS security mode; Also can be by default default value in Register message, the method that also is default part message content is represented the authentication mode that it supports the 2G transition, for example, in Register message, do not comprise the security message head security headers that uses in the 3G authentication mode message, represent to wish to use support Early IMS authentication mode; Also can adopt other method, as long as can express the authentication information that Early IMS authentication mode is supported in request.
Step 302, S-CSCF sends the authentication vector request according to the registration solicited message that receives to HSS, comprise request in this authentication vector request and support Early IMS authentication mode sign, simultaneously, the IMPI or the IMPU that also include the user in this request message, if IMPU then finds corresponding IMPI by HSS according to IMPU.
Step 303 after HSS receives step 302 described request, is returned the authentication information of supporting the early IMS security mode, the i.e. binding information of user's IMPI and IP address to S-CSCF.
Step 304, after S-CSCF receives the message of returning, adopt Early IMS authentication mode that this user is carried out authentication, promptly check from the User IP among the Register of UE whether with the binding information of IMPI that receives from HSS and IP address the IP address be complementary, if coupling then think that this user is a validated user and is preserved this user's the IMPI and the binding information of IP address.
The above-mentioned work that UE is carried out authentication also can be finished by HSS, if by the authentication operations of HSS execution to UE, the request of carrying in the authentication vector request that is then sent in step 302 inserts user's IP address, HSS check this IP address whether with the binding information of IMPI that self preserves and IP address in the IP address be complementary, if the coupling would think that this user is a validated user, at this moment, this UE of indication has passed through authentication in the information that HSS returns to S-CSCF, also comprise this user's the IMPI and the binding information of IP address simultaneously, so that use in the S-CSCF operation afterwards; If do not match then think that this user is illegal user, at this moment, this UE of indication promptly returns the information of failed authentication by authentication in the information that HSS returns to S-CSCF.
Step 305, after authentication, S-CSCF sends the information that allows access to UE.If authentication is not passed through, then S-CSCF sends to UE and forbids the information that inserts.
In addition, in order to prevent from have the ability to carry out the 3G authentication mode but refusal carry out based on the malicious user of the authentication mode of 3G and gain business by cheating, can in the authentication vector request that step 302 sent, comprise access network type information, if it is 3G subscription that HSS finds this user, and its access network type is a 3G network, so just can conclude that this user terminal also is the terminal (because the 2G terminal can not be connected on the Access Network of 3G) of 3G, thereby think that this user should select the authentication mode based on 3G, rather than based on the authentication mode of Early IMS.In HSS gives the response message of S-CSCF, indicate HSS and select the authentication mode of 3G and comprise relevant authentication information, rather than return authentication information based on the authentication mode of Early IMS to S-CSCF.S-CSCF can select to use the authentication mode based on 3G that the user is carried out authentication after receiving the information that HSS returns, and also can select to refuse the current registration request of this user.
The above only is preferred embodiment of the present invention, and is in order to restriction the present invention, within the spirit and principles in the present invention not all, any modification of being done, is equal to replacement, improvement etc., all should be included within protection scope of the present invention.
Claims (10)
1, a kind of method of network side anthority-discrimination-mode selecting is applicable to multi-media subsystem network, it is characterized in that, this method may further comprise the steps:
After a, service call State Control functional entity S-CSCF receive registration request from user terminal, send the authentication vector request that comprises required authentication mode sign to home signature user server HSS;
B, HSS judge according to required authentication mode sign whether S-CSCF asks the authentication information based on Early IMS authentication mode, if, execution in step d then; Otherwise, judge that again this request inserts user's type, if 3G subscription then returns the authentication information of supporting the 3G authentication mode, execution in step c then to S-CSCF; If 2G user, then execution in step d or step e;
C, S-CSCF adopt the authentication mode based on 3G that the user that request inserts is carried out authentication, if authentication is passed through, then return the information that allows access to the user, finish; If failed authentication and failure cause be not for supporting this authentication mode, S-CSCF sends the authentication vector request that comprises request Early IMS authentication mode sign, execution in step b then to HSS;
D, HSS return authentication information based on Early IMS to S-CSCF, by the authenticating result of S-CSCF according to the employing Early IMS authentication mode that obtains, return to user terminal and to allow to insert or information that refusal inserts, finish;
E, HSS return the failure information that this authentication mode is not supported in indication to S-CSCF, and informing user terminal was forbidden inserting after S-CSCF received this failure information, finished.
2, method according to claim 1 is characterized in that, the described S-CSCF of step a receives in the registration solicited message from user terminal, further comprises: the user access networks type information;
Described failed authentication of step c and failure cause be not when supporting this authentication mode, further comprise: S-CSCF judges this user access networks type, if access network type is the 2G network, then continue to carry out subsequent step, if access network type is a 3G network, then directly return the information that refusal inserts to the user.
3, method according to claim 1 is characterized in that, described S-CSCF further comprises: the user access networks type information in the authentication vector request that comprises required authentication mode sign that HSS sends;
The described HSS of step b judge S-CSCF need authentication information based on Early IMS authentication mode after, further comprise: HSS judges this user access networks type, if access network type is the 2G network, then continue to carry out subsequent step, if access network type is a 3G network, and the user that request inserts is 3G subscription, then returns the authentication information of supporting the 3G authentication mode to S-CSCF, after S-CSCF receives this information, perhaps execution in step c or directly return the information that refusal inserts to the user.
According to the described arbitrary method of claim 1~3, it is characterized in that 4, the authentication information of described support 3G authentication mode is an AKA authentication vector information; The process that the user that the authentication mode of the described employing of step c 3G inserts request carries out authentication is: adopt the AKA agreement that the user is carried out authentication.
According to the described arbitrary method of claim 1~3, it is characterized in that 5, the authentication information of described support Early IMS authentication mode is the binding information of User Identity and IP address; The process that the described S-CSCF of steps d obtains the authenticating result that adopts Early IMS authentication mode is: S-CSCF checks whether the IP address the binding information of this IP address of receiving from user terminal and this User Identity received from HSS and IP address mates, if then pass through authentication, otherwise this user can not pass through authentication, thereby directly obtains authenticating result.
6, method according to claim 5 is characterized in that, the described HSS of steps d to the method that S-CSCF returns based on the authentication information of Early IMS is:
HSS directly returns authentication information based on Early IMS to S-CSCF, perhaps,
HSS returns the failure information that this authentication mode is not supported in indication to S-CSCF, after S-CSCF receives this failure information, send to HSS and comprise the authentication vector request of request based on Early IMS authentication mode sign, HSS returns authentication information based on Early IMS to S-CSCF again according to this request.
According to the described arbitrary method of claim 1~3, it is characterized in that 7, the described S-CSCF of step a further comprises the application user's IP address in the authentication vector request that HSS sends; The authentication information of described support Early IMS authentication mode is the binding information of User Identity and IP address; The process that the described S-CSCF of steps d obtains the authenticating result that adopts Early IMS authentication mode is: HSS checks from the IP address in the binding information of the user's IP address of S-CSCF and this User Identity self preserved and IP address whether mate, if then pass through authentication, the information that sends the authentication success is to S-CSCF, otherwise the information that sends failed authentication is to S-CSCF.
8, according to the described arbitrary method of claim 1~3, it is characterized in that, when the described S-CSCF of step a sends the authentication vector request that comprises required authentication mode sign to HSS, whether judgement is from there being request to support the sign of Early IMS authentication mode in the register request message of user terminal, if have, then send the authentication vector request that comprises request support Early IMS authentication mode to HSS, otherwise, the authentication vector request that the 3G authentication mode is supported in request comprised to the HSS transmission.
9, method according to claim 8, it is characterized in that, the sign of Early IMS authentication mode is supported in the request that comprises in the register request message that described user terminal sends, be carried in the field that sets in advance in this message, perhaps, by default default value, expression is used and is supported Early IMS authentication mode; Described default default value is the security message head securityheaders that uses in the default 3G authentication mode message.
10, according to the described arbitrary method of claim 1~3, it is characterized in that, the sign of Early IMS authentication mode is supported in described S-CSCF the request in the authentication vector request message of HSS of sending to, and is carried on to be used for the field of identification request based on the 3G authentication mode in this message.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2005100938198A CN1294722C (en) | 2004-09-23 | 2005-08-30 | Method of selecting right identification mode at network side |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200410080104.4 | 2004-09-23 | ||
CNA2004100801044A CN1642083A (en) | 2004-09-23 | 2004-09-23 | Network side anthority-discrimination-mode selecting method |
CNB2005100938198A CN1294722C (en) | 2004-09-23 | 2005-08-30 | Method of selecting right identification mode at network side |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1753363A true CN1753363A (en) | 2006-03-29 |
CN1294722C CN1294722C (en) | 2007-01-10 |
Family
ID=36680056
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNB2005100938198A Active CN1294722C (en) | 2004-09-23 | 2005-08-30 | Method of selecting right identification mode at network side |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN1294722C (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2008025280A1 (en) * | 2006-08-24 | 2008-03-06 | Huawei Technologies Co., Ltd. | A method and system of authentication |
WO2008034377A1 (en) * | 2006-08-29 | 2008-03-27 | Huawei Technologies Co., Ltd. | Method and system of authentication consultation |
WO2008138272A1 (en) * | 2007-05-16 | 2008-11-20 | Huawei Technologies Co., Ltd. | Message service capability center and method for sending message service |
CN101068196B (en) * | 2006-05-01 | 2010-05-12 | 中兴通讯股份有限公司 | Bluetooth mobile telephone switch-in bluetooth gateway service insertion controlling method |
CN101106795B (en) * | 2006-07-12 | 2010-09-08 | 华为技术有限公司 | A registration hiding method for IMS domain |
CN101188860B (en) * | 2007-12-19 | 2010-11-10 | 华为技术有限公司 | A method and device for recognizing exceptional terminal |
CN101577910B (en) * | 2008-07-29 | 2011-03-16 | 中兴通讯股份有限公司 | Register and authentication method for IP multimedia subsystem |
CN101317419B (en) * | 2006-04-24 | 2011-07-06 | 华为技术有限公司 | Operation processing method and device, service operation validity decision method and server |
CN101350748B (en) * | 2007-07-20 | 2012-02-29 | 中兴通讯股份有限公司 | Method and system for accessing control terminal after being losing to obtain data summary calculation parameter |
CN101645901B (en) * | 2009-09-03 | 2012-10-17 | 烽火通信科技股份有限公司 | Method for deciding user authentication mode by IMS network based on terminal capabilities |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101330384B (en) * | 2007-06-19 | 2011-12-07 | 中兴通讯股份有限公司 | Authentication method for terminal equipment |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE10116547A1 (en) * | 2001-04-03 | 2002-10-10 | Nokia Corp | Registration of a terminal in a data network |
US20050210141A1 (en) * | 2002-01-31 | 2005-09-22 | Telefonaktiebolaget Lm Ericsson (Publ) | Method for providing multiple sdp media flows in a single pop context |
-
2005
- 2005-08-30 CN CNB2005100938198A patent/CN1294722C/en active Active
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101317419B (en) * | 2006-04-24 | 2011-07-06 | 华为技术有限公司 | Operation processing method and device, service operation validity decision method and server |
CN101068196B (en) * | 2006-05-01 | 2010-05-12 | 中兴通讯股份有限公司 | Bluetooth mobile telephone switch-in bluetooth gateway service insertion controlling method |
CN101106795B (en) * | 2006-07-12 | 2010-09-08 | 华为技术有限公司 | A registration hiding method for IMS domain |
WO2008025280A1 (en) * | 2006-08-24 | 2008-03-06 | Huawei Technologies Co., Ltd. | A method and system of authentication |
CN101132279B (en) * | 2006-08-24 | 2011-05-11 | 华为技术有限公司 | Authentication method and authentication system |
WO2008034377A1 (en) * | 2006-08-29 | 2008-03-27 | Huawei Technologies Co., Ltd. | Method and system of authentication consultation |
WO2008138272A1 (en) * | 2007-05-16 | 2008-11-20 | Huawei Technologies Co., Ltd. | Message service capability center and method for sending message service |
CN101309439B (en) * | 2007-05-16 | 2012-06-20 | 华为技术有限公司 | Transmission method of fusion message capability center and fusion message service |
CN101350748B (en) * | 2007-07-20 | 2012-02-29 | 中兴通讯股份有限公司 | Method and system for accessing control terminal after being losing to obtain data summary calculation parameter |
CN101188860B (en) * | 2007-12-19 | 2010-11-10 | 华为技术有限公司 | A method and device for recognizing exceptional terminal |
CN101577910B (en) * | 2008-07-29 | 2011-03-16 | 中兴通讯股份有限公司 | Register and authentication method for IP multimedia subsystem |
CN101645901B (en) * | 2009-09-03 | 2012-10-17 | 烽火通信科技股份有限公司 | Method for deciding user authentication mode by IMS network based on terminal capabilities |
Also Published As
Publication number | Publication date |
---|---|
CN1294722C (en) | 2007-01-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN1294722C (en) | Method of selecting right identification mode at network side | |
CN1642083A (en) | Network side anthority-discrimination-mode selecting method | |
CN1885787A (en) | Registration abnormity handling method in user registration course | |
CN100379315C (en) | Method for carrying out authentication on user terminal | |
EP2084882B1 (en) | Authentication in a communications network | |
GB2425685A (en) | Associating multiple public user identities with a common service profile in a user terminal or application server | |
CN1645812A (en) | Method for noticing terminal ability variation to network | |
CN1299533C (en) | Method for user to register on belonging signatory user's service device | |
CN1781331A (en) | Multiple registration of a subscriber in a mobile communication system | |
US8265622B2 (en) | Method and saving entity for setting service | |
EP2250791B1 (en) | Securing contact information | |
EP2790426B1 (en) | Method and system for enabling an Aggregation/Authentication Proxy to route XCAP messages to IMS Application Server | |
CN1777322A (en) | Method for treating user of updating IP address at network side | |
US9692835B2 (en) | Method and apparatuses for the provision of network services offered through a set of servers in an IMS network | |
CN101645901B (en) | Method for deciding user authentication mode by IMS network based on terminal capabilities | |
CN1303793C (en) | Method for realizing application server communication | |
US20120246289A1 (en) | Control Entity and Method for Setting up a Session in a Communications Network, Subscriber Database and Communications Network | |
CN100387014C (en) | Method for treating abnormity of registration in procedure of registering users | |
CN101132645B (en) | Method for changing control function of processing proxy call conversation by IP multimedia subsystem | |
CN100433913C (en) | Method for realizing registering in IP multi-media subsystem | |
CN101001145B (en) | Authentication method for supporting terminal roaming of non-IP multimedia service subsystem | |
EP2083577B1 (en) | User device and registration method of user device | |
CN101035029A (en) | Query device, method, system, and multimedia subsystem of the user service data | |
CN1984141A (en) | Operation in IP multi-medium sub-system and home signature user server | |
CN1774123A (en) | Method for preventing user with 3G ability from using transition right-identification mode |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
C41 | Transfer of patent application or patent right or utility model | ||
TR01 | Transfer of patent right |
Effective date of registration: 20160425 Address after: American California Patentee after: Snaptrack, Inc. Address before: 518129 Bantian HUAWEI headquarters office building, Longgang District, Guangdong, Shenzhen Patentee before: Huawei Technologies Co., Ltd. |