CN1812322A - Right discriminating system and processing method - Google Patents

Right discriminating system and processing method Download PDF

Info

Publication number
CN1812322A
CN1812322A CN 200510005160 CN200510005160A CN1812322A CN 1812322 A CN1812322 A CN 1812322A CN 200510005160 CN200510005160 CN 200510005160 CN 200510005160 A CN200510005160 A CN 200510005160A CN 1812322 A CN1812322 A CN 1812322A
Authority
CN
China
Prior art keywords
authentication
access end
entity
information
subscription
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN 200510005160
Other languages
Chinese (zh)
Inventor
武亚娟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN 200510005160 priority Critical patent/CN1812322A/en
Publication of CN1812322A publication Critical patent/CN1812322A/en
Pending legal-status Critical Current

Links

Images

Abstract

This invention discloses a kind of right identification system. It concludes: sign information storage, which is connected with right identification entity and used for storing the sign information of accessing end and providing right identification entity the right identification information corresponding to accessing end; accessing end, which is connected with right identification entity and used for making the right identification entity initiate right identification; right identification entity, which is connected with sign information storage and accessing end respectively. According to the right information provided by sign information storage, the right identification entity and the accessing end process mutual right identification. This invention also discloses a kind of right identification processing method. Accessing end sends the right identification request with accessing end identification to the right identification entity; after receiving right identification request, right identification entity requests the sign information storage to provide the right identification information corresponding to the accessing end identification; according to accessing end identification, sign information storage acquires right identification information and provides to right identification entity. According to the received right identification information, right identification entity and accessing end process mutual right identification.

Description

A kind of right discriminating system and processing method
Technical field
The present invention relates to authentication techniques, be meant a kind of right discriminating system and processing method especially.
Background technology
Development along with broadband network, mobile communication will not only be confined to traditional voice communication, multimedia service in conjunction with multiple medium types such as audio frequency, video, picture and texts will be carried out gradually, by with present (presence) business, the combination of data services such as short message service, webpage (WEB) browse service, positioning service, propelling movement (PUSH) business, file-sharing business can be satisfied user's multiple demand.
Under the promotion of multiple application, third generation partner program (3GPP, 3rd GenerationPartnership Project) normal structure has been released the IP multimedia subsystem, IMS (IMS based on Internet protocol (IP), IP Multimedia Subsystem) framework, purpose are to provide standardized open architecture to realize diversified multimedia application in communication network.
Fig. 1 shows the IMS configuration diagram, as shown in Figure 1, in R5 (Release 5) stage of 3GPP, introduced IMS domain, be called for short IMS, IMS is superimposed upon on the packet switching network, by call session management function (CSCF, Call Session Control Function), MGCF (MGCF, Media Gateway Control Function), media resource function (MRF, Multimedia Resource Function) and home signature user server functional entitys such as (HSS, HomeSubscriber Server) form.Wherein, CSCF is according to the difference in functionality of realizing, can be divided into serving CSCF (S-CSCF), proxy CSCF (P-CSCF) and three logic entities of inquiry CSCF (I-CSCF) again, S-CSCF is the service switching center of IMS, be used to carry out session control, peace preservation association's speech phase, managing user information, generation charge information, or the like; P-CSCF is the access point of terminal user access to IMS, is used to finish user's registration, carries out service quality (QoS) control and safety management, or the like; I-CSCF is used to realize route querying, as the intercommunication between in the IMS territory and the IMS territory, the distribution of S-CSCF is managed, and external network and other IMS territories is hidden opening up of network mend structure and configuration, generates charge information, or the like.MGCF realizes the function of control gateway, is used to realize the intercommunication between IMS network and other networks; MRF provides media resource, as the folding and unfolding sound, information transmitted between the terminal use is carried out encoding and decoding and multimedia conferencing bridge etc., MRF comprises media resource function control (MRFC, Multimedia Resource Function Controller) and (MRFP, MultimediaResource Function Processor).HSS is a User Information Database, stores the subscription data of user in the IMS network and configuration information etc.
Because it is irrelevant that the structure of IMS has been accomplished with the bottom bearer network, therefore, the IMS framework of 3GPP definition also can be applicable on other packet networks outside the packet field network of 3GPP definition, packet network as the 3GPP2 definition, wireless lan (wlan), next generation network (NGN) etc., realized the terminal type that uses with the user independence and with the independence of access network type, like this, do not limit IMS and only be applied in network relevant with 3GPP and the application, the access network of other types and the business of bearer network and application also can realize by the IMS framework.
A lot of parts (Enabler) are provided among the IMS, can have used sharedly by a lot of concrete,, meeting (Conference) business professional as presence business, management and group (Group Management), user certificate be professional or the like; IMS also provides some bearing capacitys, as multimedia broadcast multi-broadcasting business (MBMS, Multimedia Broadcast ﹠amp; Multicast Service), in order to support the diversified specific implementation of application layer.
Based on above-described IMS framework, user or application server (AS, Application Server) can communicate with realizing professional AS, to realize corresponding service.When access ends such as user or AS are visited other AS, the reply access end carries out authentication, to guarantee the fail safe of accessed AS, but corresponding authentication system configuration and corresponding handling process are not proposed at present, if the access end without authentication carries out malicious attack to the AS that visits, then can make accessed AS at a standstill, can't guarantee the carrying out of regular traffic; Or illegally use resource on the AS of visit without the unauthorized access end of authentication, then can bring imponderable loss for operator.Therefore, because unsound to the access end authentication mechanism causes accessed AS to be among the great potential safety hazard.
Summary of the invention
In view of this, one object of the present invention is to provide a kind of right discriminating system, another object of the present invention is to provide a kind of authentication processing method, makes that access end must be by ability access service entity after the authentication, to provide high safety reliable communication network.
In order to achieve the above object, the invention provides a kind of right discriminating system, this system comprises:
The CAMEL-Subscription-Information memory links to each other with authentication entity, is used for the CAMEL-Subscription-Information of memory access end, and provides authentication information corresponding to access end to authentication entity;
Access end links to each other with authentication entity, is used for initiating authentication to authentication entity;
Authentication entity links to each other with access end with the CAMEL-Subscription-Information memory respectively, and the authentication information that provides according to the CAMEL-Subscription-Information memory is provided, and carries out mutual authentication with access end.
This system further comprises: Business Entity, link to each other with access end with authentication entity respectively, and be used for connecting with access end by authentication, service application is provided.
Described Business Entity links to each other by the N interface with authentication entity, and/or described Business Entity links to each other by the A interface with access end.
Described CAMEL-Subscription-Information memory links to each other by H interface with authentication entity, and/or described authentication entity links to each other by B interface with access end.
Described CAMEL-Subscription-Information memory is HSS, or the HSS for expanding, or for being used to store the database of CAMEL-Subscription-Information.
Described access end is the user, or is application server, or is above the two combination.
The present invention also provides a kind of authentication processing method, and this method comprises:
A, access end send the authentication request that carries the access end sign to authentication entity; After authentication entity was received authentication request, request CAMEL-Subscription-Information memory provided the authentication information corresponding to the access end sign; The CAMEL-Subscription-Information memory obtains authentication information and offers authentication entity according to the access end sign, and authentication entity carries out mutual authentication according to authentication information and the access end received.
The memory of CAMEL-Subscription-Information described in the steps A obtains authentication information according to the access end sign: the CAMEL-Subscription-Information memory generates authentication information according to the access end sign, or the CAMEL-Subscription-Information memory identifies according to access end, searches with described access end and identifies corresponding authentication information.
The CAMEL-Subscription-Information of request described in steps A memory provides before the authentication information that identifies corresponding to access end, further comprise: authentication entity identifies according to access end, the access end of judging current initiation authentication request is user or application server, if the user, then ask the user signing contract information memory that authentication information corresponding to user ID is provided; If application server, then ask application server CAMEL-Subscription-Information memory that authentication information corresponding to application server identifier is provided.
Authentication success mutually further comprises after the described steps A:
B, authentication entity are access end assign sessions Transaction Identifier.
Further comprise after the described step B: access end sends the connection request that carries conversation affair mark to Business Entity, and Business Entity and access end connect.
Further comprise before the described steps A: access end sends connection request to Business Entity, after Business Entity is received connection request, judges that whether access end is by authentication, if then connect with access end; Otherwise the notice access end carries out authentication to authentication entity, then execution in step A.
Described Business Entity judges that whether access end by authentication is: Business Entity judges in the connection request of receiving whether carry conversation affair mark, if then connect with access end; Otherwise the notice access end carries out authentication to authentication entity, then execution in step A.
Before described Business Entity and access end connect, further comprise: Business Entity judges that according to conversation affair mark whether access end is by authentication, if then connect with access end; Otherwise refusal connects with access end.
Described Business Entity judges that whether access end by authentication is: Business Entity judges whether conversation affair mark is legal, and promptly Business Entity at first judges whether to store described conversation affair mark, if then connect with access end; Otherwise, the legitimacy of inquiring about described conversation affair mark to authentication entity, the result who returns according to authentication entity determines the legitimacy of described conversation affair mark.
The scheme that proposes according to the present invention, can either also can carry out authentication to the user to AS, can also carry out authentication to user and AS simultaneously, thereby guarantee no matter to user or AS, when the professional ability of using Business Entity to provide, all be legal and through authorizing, to guarantee runing and can managing of network, guarantee the service quality of regular traffic, make benefits of operators can not incur loss, satisfy Virtual network operator demand for security widely and business demand, provide high safety reliable communication network.
Description of drawings
Fig. 1 shows the IMS configuration diagram;
Fig. 2 shows right discriminating system structural representation among the present invention;
Fig. 3 shows authorizing procedure figure among the present invention.
Embodiment
For making the purpose, technical solutions and advantages of the present invention clearer, the present invention is described in further detail below in conjunction with accompanying drawing.
Fig. 2 shows right discriminating system structural representation among the present invention, as shown in Figure 2, right discriminating system comprises authentication entity, Business Entity and CAMEL-Subscription-Information memory, wherein, the CAMEL-Subscription-Information memory is used for the CAMEL-Subscription-Information of memory access end, and provides authentication information corresponding to access end to authentication entity; Access end is used for initiating authentication to authentication entity; The authentication information that provides according to the CAMEL-Subscription-Information memory is provided authentication entity, carries out mutual authentication with access end; Business Entity is used for connecting with access end by authentication, and service application is provided.Various service applications all can be carried out authentication to access end by above-described right discriminating system, and Business Entity is the network entity that various service applications can be provided.The CAMEL-Subscription-Information memory links to each other with authentication entity by H interface, and authentication entity links to each other with access end by B interface, and authentication entity links to each other with Business Entity by the N interface, and Business Entity links to each other with access end by the A interface.Also can link to each other between the above CAMEL-Subscription-Information memory, authentication entity, Business Entity, the access end by IP network.The above access end can be user or AS.The above CAMEL-Subscription-Information memory can be the database of HSS, memory access end CAMEL-Subscription-Information of HSS, expansion or memory etc.The HSS of expansion expands existing HSS, owing to only store user's CAMEL-Subscription-Information among the existing HSS usually, therefore can expand existing HSS, makes the HSS after the expansion can either store user's CAMEL-Subscription-Information, also can store the CAMEL-Subscription-Information of AS.Authentication entity can be the gateway component in the network, is used for the various functional entitys enforcement authentication processes to the outer net that is connected.The entity that provides different business to use in the network is provided the above Business Entity, as various AS.
Fig. 3 shows authorizing procedure figure among the present invention, and as shown in Figure 3, the implementation procedure of authentication may further comprise the steps:
Step 301~step 302: access end sends connection request to Business Entity, after Business Entity is received connection request, judges that whether corresponding access end is by authentication, if then execution in step 309; Otherwise, execution in step 303.
If access end is by the authentication of authentication entity, then authentication entity can be access end assign sessions Transaction Identifier, therefore, after Business Entity is received the service request of access end transmission, can by judging whether carry conversation affair mark in this service request, whether judge corresponding access end by authentication, if do not carry conversation affair mark in the service request, then Business Entity determines that corresponding access end does not pass through authentication; If carry conversation affair mark in the service request, then Business Entity judges whether this conversation affair mark is legal, if then Business Entity is determined corresponding access end by authentication, otherwise Business Entity determines that corresponding access end does not pass through authentication.Business Entity judges whether legal process can be conversation affair mark: Business Entity judges whether self stores corresponding conversation affair mark, if Business Entity self stores corresponding conversation affair mark, determines that then corresponding conversation affair mark is legal; If Business Entity self is not stored corresponding conversation affair mark, then inquire about the legitimacy of corresponding conversation affair mark to authentication entity, determine according to the information that authentication entity returns whether corresponding conversation affair mark is legal.
Access end is by after the authentication, and authentication entity can be provided as the conversation affair mark that corresponding access end distributes to Business Entity, is stored by Business Entity; Or store some legal conversation affair marks in the Business Entity in advance.
Step 303: Business Entity notifies corresponding access end to carry out authentication to authentication entity.
Step 304~step 307: access end sends the authentication request that carries the access end sign to authentication entity.After authentication entity was received authentication request, request CAMEL-Subscription-Information memory provided the authentication information corresponding to the access end sign; The CAMEL-Subscription-Information memory obtains authentication information according to the access end sign, generate CAMEL-Subscription-Information as the CAMEL-Subscription-Information memory according to the access end sign, or CAMEL-Subscription-Information memory look-up and access end identify corresponding authentication information, provides this authentication information to authentication entity then; After authentication entity is received authentication information, carry out mutual authentication according to this authentication information and access end.After the authentication success, authentication entity is an access end assign sessions Transaction Identifier mutually.The above authentication information can be authentication tlv triple, authentication five-tuple etc.
In addition; after the mutual authentication success of access end and authentication entity, authentication entity can generate key, and provides this key to access end; in the process that between subsequent access end and Business Entity, communicates, can protect by this key or by the cipher key pair communication content of this cipher key derivative.If key has useful life, then be about to when expired at key, access end is initiated authentication to authentication entity again, or Business Entity notice access end carries out mutual authentication with authentication entity again.
Step 308~step 309: access end sends the connection request that carries conversation affair mark to Business Entity, and Business Entity judges that according to conversation affair mark whether access end is by authentication, if then execution in step 310; Otherwise, execution in step 311.
Whether Business Entity can judge corresponding access end by authentication by judging that conversation affair mark is whether legal, if then Business Entity is determined corresponding access end by authentication, otherwise Business Entity determines that corresponding access end does not pass through authentication.Business Entity judges whether legal process can be conversation affair mark: Business Entity judges whether self stores corresponding conversation affair mark, if Business Entity self stores corresponding conversation affair mark, determines that then corresponding conversation affair mark is legal; If Business Entity self is not stored corresponding conversation affair mark, then inquire about the legitimacy of corresponding conversation affair mark to authentication entity, determine according to the information that authentication entity returns whether corresponding conversation affair mark is legal.
Step 310: Business Entity and corresponding access end connect, and communicate.
Step 311: the Business Entity refusal connects with corresponding access end.At this moment, access end can be initiated authentication to authentication entity once more, is begun by step 304.
If access end was directly initiated authentication to authentication entity before sending connection request to Business Entity, then authorizing procedure can be from step 304.
With the authentication process of user and AS implementation procedure of the present invention is further described respectively below.
When the user need use business,, then send the authentication request that carries user ID to authentication entity if the user can determine to need before using corresponding service to carry out mutual authentication with authentication entity; If the user needs to carry out mutual authentication with authentication entity before can not determine and using corresponding service, then can send the authentication request that carries user ID to authentication entity, also can send connection request to Business Entity, after Business Entity is received connection request, determine that relative users do not pass through authentication, the notice relative users is carried out authentication to authentication entity, and relative users sends the authentication request that carries user ID to authentication entity then.Above-described user ID can be user's permanent identification (IMPI), IMPI can directly be stored in the terminal that the user uses, also can be by the mobile contracted user's sign in the world (IMSI, International MobileSubscriber Identity) is changed acquisition.
After authentication entity was received authentication request, the HSS of request storing user subscription information or database or memory etc. provided the authentication information corresponding to user ID; HSS or the database or the memory etc. of storing user subscription information obtain authentication information, provide this authentication information to authentication entity then; After authentication entity is received authentication information, carry out mutual authentication according to this authentication information and user.After the authentication success, authentication entity is user's assign sessions Transaction Identifier mutually.
After the mutual authentication success of user and authentication entity; authentication entity can generate key; and provide this key to the user, in the process that between subsequent user and Business Entity, communicates, can protect by this key or by the cipher key pair communication content of this cipher key derivative.
After the mutual authentication success of user and authentication entity, send the connection request that carries conversation affair mark to Business Entity, whether Business Entity can further judge the user by authentication according to conversation affair mark, if, then Business Entity and relative users connect, and communicate; Otherwise the Business Entity refusal connects with relative users.At this moment, the user can initiate authentication to authentication entity once more.
When AS needs the access service entity, need visit other AS,, then send the authentication request that carries the AS sign to authentication entity if AS can determine to need to carry out mutual authentication with authentication entity before the access service entity as AS; If AS needs to carry out mutual authentication with authentication entity before can not determine and using corresponding service, then can send the authentication request that carries user ID to authentication entity, also can send connection request to Business Entity, after Business Entity is received connection request, determine that corresponding AS does not pass through authentication, notify corresponding AS to carry out authentication to authentication entity, corresponding then AS sends the authentication request that carries the AS sign to authentication entity.
Application/service identification of each AS is its operator network allocation, therefore, can think that application/service identification is exactly the permanent identification of its corresponding AS, will use/service identification identifies as AS; But, continuous development along with network, application/service identification also may in use be emitted by puppet and distort, therefore, operator also can be by the identity of coming the corresponding AS of unique identification for the method for each AS designated equipment sign, device identification is corresponding one by one with AS, in a carrier network, can guarantee its uniqueness, even the AS in the different operators network, also can guarantee its uniqueness by increasing the carrier network sign, like this, also the device identification corresponding to corresponding AS can be identified as AS, this device identification can further comprise the carrier network sign.In addition, also the combination of application/service identification and device identification can be identified as AS.
After the mutual authentication success of AS and authentication entity, authentication entity can generate key, and provides this key to AS, in the process that communicates between follow-up AS and Business Entity, can protect by this key or by the cipher key pair communication content of this cipher key derivative.
After authentication entity was received authentication request, the HSS of request storage AS CAMEL-Subscription-Information or enhancing HSS or database or memory etc. provided the authentication information corresponding to the AS sign; The HSS of storage AS CAMEL-Subscription-Information or enhancing HSS or database or memory etc. obtain authentication information, provide this authentication information to authentication entity then; After authentication entity is received authentication information, carry out mutual authentication according to this authentication information and AS.After the authentication success, authentication entity is an AS assign sessions Transaction Identifier mutually.
After the mutual authentication success of AS and authentication entity, send the connection request that carries conversation affair mark to Business Entity, whether Business Entity can further judge AS by authentication according to conversation affair mark, if, then Business Entity and corresponding AS connect, and communicate; Otherwise the Business Entity refusal connects with corresponding AS.At this moment, AS can initiate authentication to authentication entity once more.
Among the present invention, authentication entity can either be finished the mutual authentication process with the user, also can finish mutual authentication process with AS, therefore, if the CAMEL-Subscription-Information of user and AS is stored in different CAMEL-Subscription-Information memories, CAMEL-Subscription-Information as the user is stored in the user signing contract information memory, as HSS, the CAMEL-Subscription-Information of AS is stored in AS CAMEL-Subscription-Information memory, as the HSS of expansion, like this, after authentication entity is received authentication request, at first need according to the sign of carrying in the authentication request, that judge current initiation authentication is user or AS, if be the user, then ask the user signing contract information memory that the authentication information of relative users is provided; If be AS, then ask AS CAMEL-Subscription-Information memory that the authentication information of corresponding AS is provided.
Because AS compares with the user, characteristics are separately all arranged separately, as AS is static configuration relatively, the user then has roaming and characteristic movably, therefore, in the concrete process of handling authentication, can there be some differences, therefore also needing authentication entity is that user or AS judge to current initiation authentication.
If the AS sign is identical or essentially identical with the composition form of user ID, composition form as application/service identification or device identification and IMPI is identical, as long as then authentication entity can be discerned this composition form of similar application/service identification or device identification or IMPI.If the AS sign is different with the composition form of user ID, then authentication entity must be able to be discerned the composition form of IMPI, and the composition form of application/service identification or device identification.
The mutual authentication process of the above access end and authentication entity is identical with authentication mode in existing, so repeats no more among the present invention.
In a word, the above is preferred embodiment of the present invention only, is not to be used to limit protection scope of the present invention.

Claims (15)

1, a kind of right discriminating system is characterized in that, this system comprises:
The CAMEL-Subscription-Information memory links to each other with authentication entity, is used for the CAMEL-Subscription-Information of memory access end, and provides authentication information corresponding to access end to authentication entity;
Access end links to each other with authentication entity, is used for initiating authentication to authentication entity;
Authentication entity links to each other with access end with the CAMEL-Subscription-Information memory respectively, and the authentication information that provides according to the CAMEL-Subscription-Information memory is provided, and carries out mutual authentication with access end.
2, system according to claim 1 is characterized in that, this system further comprises: Business Entity, link to each other with access end with authentication entity respectively, and be used for connecting with access end by authentication, service application is provided.
3, system according to claim 2 is characterized in that, described Business Entity links to each other by the N interface with authentication entity, and/or described Business Entity links to each other by the A interface with access end.
4, method according to claim 1 is characterized in that, described CAMEL-Subscription-Information memory links to each other by H interface with authentication entity, and/or described authentication entity links to each other by B interface with access end.
According to the arbitrary described system of claim 1 to 4, it is characterized in that 5, described CAMEL-Subscription-Information memory is HSS, or the HSS for expanding, or for being used to store the database of CAMEL-Subscription-Information.
According to the arbitrary described system of claim 1 to 4, it is characterized in that 6, described access end is the user, or be application server, or be above the two combination.
7, a kind of authentication processing method is characterized in that, this method comprises:
A, access end send the authentication request that carries the access end sign to authentication entity; After authentication entity was received authentication request, request CAMEL-Subscription-Information memory provided the authentication information corresponding to the access end sign; The CAMEL-Subscription-Information memory obtains authentication information and offers authentication entity according to the access end sign, and authentication entity carries out mutual authentication according to authentication information and the access end received.
8, method according to claim 7, it is characterized in that, the memory of CAMEL-Subscription-Information described in the steps A obtains authentication information according to the access end sign: the CAMEL-Subscription-Information memory generates authentication information according to the access end sign, or the CAMEL-Subscription-Information memory identifies according to access end, searches with described access end and identifies corresponding authentication information.
9, method according to claim 7, it is characterized in that, the CAMEL-Subscription-Information of request described in steps A memory provides before the authentication information that identifies corresponding to access end, further comprise: authentication entity identifies according to access end, the access end of judging current initiation authentication request is user or application server, if the user, then ask the user signing contract information memory that authentication information corresponding to user ID is provided; If application server, then ask application server CAMEL-Subscription-Information memory that authentication information corresponding to application server identifier is provided.
10, method according to claim 7 is characterized in that, authentication success mutually further comprises after the described steps A:
B, authentication entity are access end assign sessions Transaction Identifier.
11, method according to claim 10 is characterized in that, further comprises after the described step B: access end sends the connection request that carries conversation affair mark to Business Entity, and Business Entity and access end connect.
12, method according to claim 7 is characterized in that, further comprise before the described steps A: access end sends connection request to Business Entity, after Business Entity is received connection request, judge that whether access end is by authentication, if then connect with access end; Otherwise the notice access end carries out authentication to authentication entity, then execution in step A.
13, method according to claim 12 is characterized in that, described Business Entity judges that whether access end by authentication is: Business Entity judges in the connection request of receiving whether carry conversation affair mark, if then connect with access end; Otherwise the notice access end carries out authentication to authentication entity, then execution in step A.
14, according to claim 11 or 13 described methods, it is characterized in that, before described Business Entity and access end connect, further comprise: Business Entity judges according to conversation affair mark whether access end passes through authentication, if then connect with access end; Otherwise refusal connects with access end.
15, method according to claim 14, it is characterized in that, described Business Entity judges that whether access end by authentication is: Business Entity judges whether conversation affair mark is legal, be that Business Entity at first judges whether to store described conversation affair mark, if then connect with access end; Otherwise, the legitimacy of inquiring about described conversation affair mark to authentication entity, the result who returns according to authentication entity determines the legitimacy of described conversation affair mark.
CN 200510005160 2005-01-28 2005-01-28 Right discriminating system and processing method Pending CN1812322A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 200510005160 CN1812322A (en) 2005-01-28 2005-01-28 Right discriminating system and processing method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 200510005160 CN1812322A (en) 2005-01-28 2005-01-28 Right discriminating system and processing method

Publications (1)

Publication Number Publication Date
CN1812322A true CN1812322A (en) 2006-08-02

Family

ID=36845030

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 200510005160 Pending CN1812322A (en) 2005-01-28 2005-01-28 Right discriminating system and processing method

Country Status (1)

Country Link
CN (1) CN1812322A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008138272A1 (en) * 2007-05-16 2008-11-20 Huawei Technologies Co., Ltd. Message service capability center and method for sending message service
WO2011038691A1 (en) * 2009-09-30 2011-04-07 华为技术有限公司 Authentication method and device
CN101232379B (en) * 2008-01-29 2011-08-31 中国移动通信集团公司 Method for implementing system login, information technology system and communication system
CN101090416B (en) * 2006-09-29 2012-02-29 中兴通讯股份有限公司 Basic service addition service implementing system and method
CN103888434B (en) * 2012-12-21 2017-08-08 中国移动通信集团北京有限公司 A kind of method and apparatus for controlling user terminal to log in IMS network

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101090416B (en) * 2006-09-29 2012-02-29 中兴通讯股份有限公司 Basic service addition service implementing system and method
WO2008138272A1 (en) * 2007-05-16 2008-11-20 Huawei Technologies Co., Ltd. Message service capability center and method for sending message service
CN101309439B (en) * 2007-05-16 2012-06-20 华为技术有限公司 Transmission method of fusion message capability center and fusion message service
CN101232379B (en) * 2008-01-29 2011-08-31 中国移动通信集团公司 Method for implementing system login, information technology system and communication system
WO2011038691A1 (en) * 2009-09-30 2011-04-07 华为技术有限公司 Authentication method and device
CN103888434B (en) * 2012-12-21 2017-08-08 中国移动通信集团北京有限公司 A kind of method and apparatus for controlling user terminal to log in IMS network

Similar Documents

Publication Publication Date Title
JP4136946B2 (en) Communication system and method
EP1701505B1 (en) A method for selecting the authentication manner at the network side
EP1703746B1 (en) A method for reducing interface load of home subscriber server
CN100379315C (en) Method for carrying out authentication on user terminal
US20160381529A1 (en) Reducing size of messages over the cellular control channel
EP1994707B1 (en) Access control in a communication network
US8351928B2 (en) Synchronizing DHCP and mobile IP messaging
CN1299533C (en) Method for user to register on belonging signatory user's service device
WO2006099815A1 (en) A method for implementing the user registering in the ip multimedia subsystem and the system thereof
US8265622B2 (en) Method and saving entity for setting service
EP2119178B1 (en) Method and apparatuses for the provision of network services offered through a set of servers in an ims network
CN101115232B (en) Roaming control method and system for accessing to IP multimedia subsystem network through SBC
CN1812322A (en) Right discriminating system and processing method
CN1303793C (en) Method for realizing application server communication
WO2008134956A1 (en) Media control method, system, device and media service combining device
CN1852556A (en) Method for realizing registering in IP multi-media subsystem
CN100536484C (en) Method for canceling IP address
WO2007056925A1 (en) A session control method and equipment in ims network
KR101117440B1 (en) A Device And Method For Providing Free Number Service in the IP Multimedia Subsystem
CN1774123A (en) Method for preventing user with 3G ability from using transition right-identification mode
Kim et al. PUBLIC WLAN WITH UMTS IP MULTIMEDIA SUBSYSTEM

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Open date: 20060802