WO2007051430A1 - Procede de modification de mot de passe d’authentification, serveur d’agent utilisateur et client d’agent utilisateur base sur sip - Google Patents

Procede de modification de mot de passe d’authentification, serveur d’agent utilisateur et client d’agent utilisateur base sur sip Download PDF

Info

Publication number
WO2007051430A1
WO2007051430A1 PCT/CN2006/002978 CN2006002978W WO2007051430A1 WO 2007051430 A1 WO2007051430 A1 WO 2007051430A1 CN 2006002978 W CN2006002978 W CN 2006002978W WO 2007051430 A1 WO2007051430 A1 WO 2007051430A1
Authority
WO
WIPO (PCT)
Prior art keywords
authentication password
authentication
user agent
password
new
Prior art date
Application number
PCT/CN2006/002978
Other languages
English (en)
French (fr)
Inventor
Dongjun Wu
Original Assignee
Huawei Technologies Co., Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co., Ltd. filed Critical Huawei Technologies Co., Ltd.
Publication of WO2007051430A1 publication Critical patent/WO2007051430A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords

Definitions

  • the present invention relates to the field of network communication technologies, and specifically relates to a SIP-based authentication password modification method, a user proxy server, and a user proxy client. Background of the invention
  • FIG. 1 The networking diagram of the SIP domain is shown in Figure 1.
  • UAC User Agent Client
  • UAS User Agent Server
  • the UAS When the UAS receives a request message, if it needs to authenticate the request message, it checks whether the request message carries the credentials (credentials). When the UAS determines that the request message does not carry the authentication information, it sends a 401 unauthorized response message to the UAC or a 407 proxy authentication request message to the UAC, and the response message carries the packet. Weight parameter. The UAC root ⁇ re-generates the authentication information in the response message and sends it to the UAS in the request message. The UAS re-authenticates according to the authentication information in the request message.
  • the object of the present invention is to provide a SIP-based authentication password modification method, a user proxy server, and a user agent client, which clarify the process of modifying the authentication password of the user proxy server after the user agent client authentication is passed. , perfected the SIP authentication process.
  • the present invention provides a SIP-based authentication password modification method, including: a user agent client transmitting authentication modification information to a user proxy server;
  • the user proxy server performs the modification of the authentication password according to the authentication modification information transmitted by the user agent client.
  • the following technical solutions are optional technical solutions.
  • the authentication modification information includes: modifying an authentication password operation type, an old authentication password, and a new authentication password, and the step of modifying the authentication password by the user proxy server includes:
  • the user proxy server authenticates the old authentication password transmitted by the user proxy client according to the modified authentication password operation type transmitted by the user proxy client, and after confirming that the old authentication password is successfully authenticated, the old authentication password is used. Modify the new authentication password transmitted by the user agent client;
  • the authentication modification information includes: modifying an authentication password operation type and a new authentication password
  • the step of the user proxy server performing the authentication password modification includes:
  • the user agent server modifies the old authentication password of the user agent client to the new authentication password transmitted by the user agent client when determining the user agent client transmission to modify the authentication password operation type information and the user agent client is online.
  • the old authentication password in the authentication modification information is: an encrypted old authentication password; and/or
  • the new authentication password in the authentication modification information is: an encrypted new authentication password
  • the authentication modification information further includes: an encryption type of the new authentication password.
  • the step of the user proxy server performing the authentication password modification includes:
  • the user agent client obtains the encryption key of the old authentication password and the encryption type of the new authentication password
  • the user agent client encrypts the old authentication password according to the encryption key of the old authentication password, encrypts the new authentication password according to the encryption type of the new authentication password, and encrypts the encrypted authentication password or
  • the weight cryptographic operation type and the encrypted authentication password are transmitted to the user proxy server;
  • the user proxy server modifies the old authentication password to a new authentication password, saves the encryption type of the new authentication password, and returns a message that the authentication password is successfully modified to the user agent client;
  • the step of the user proxy server performing the authentication password modification comprises: obtaining, by the user agent client, an encryption type of the new authentication password;
  • the user agent client encrypts the new authentication password according to the encryption type of the new authentication password, and transmits the encrypted authentication password, or the modified authentication password operation type and the encrypted authentication password to the user agent server;
  • the user proxy server modifies the old authentication password to a new authentication password, saves the encryption type of the new authentication password, and returns a message that the authentication password modification succeeds to the user agent client.
  • the step of acquiring the encryption type of the new authentication password includes: the user agent client transmitting the modified authentication password operation type in the registration request message to the user agent server;
  • the user proxy server When receiving the modified authentication password operation type, the user proxy server transmits the encryption type of the new authentication password or the encryption type of the modified authentication password operation type and the new authentication password to the response message of the registration request message to the response message.
  • User agent client When receiving the modified authentication password operation type, the user proxy server transmits the encryption type of the new authentication password or the encryption type of the modified authentication password operation type and the new authentication password to the response message of the registration request message to the response message.
  • the step of modifying the old authentication password to the new authentication password is specifically as follows:
  • the user proxy server decrypts the new authentication password according to the encryption type of the new authentication password, and modifies the old authentication password to the decrypted new authentication password; or
  • the user proxy server modifies the old authentication password to the encrypted new authentication password.
  • the modified authentication password operation type, the old authentication password, and the new authentication password are carried in the authentication challenge parameter of the authentication header field or the authentication challenge response parameter.
  • the method further includes - when the user proxy server fails to confirm the authentication of the old authentication password, returning a message that the authentication password modification fails to the user agent client;
  • the user agent server After the authentication password modification fails, and the user agent client needs to be authenticated, the user agent server performs authentication according to the original authentication password.
  • the present invention further provides a user agent server, wherein the user agent server is provided with an authentication password modification module; or the user agent server is provided with an authentication password modification module and an authentication module;
  • the authentication password modification module is configured to receive authentication modification information transmitted by the user agent client, and modify the authentication password according to the authentication modification information;
  • the authentication module is configured to perform authentication processing on the user proxy client according to the modified authentication password of the authentication password modification module.
  • the authentication module authenticates the old authentication password in the authentication modification information transmitted by the user agent client according to the authentication modification information, and notifies the authentication password modification module after confirming that the old authentication password is successfully authenticated; After receiving the notification from the authentication module, the right password modification module modifies the old authentication password to the new authentication password in the authentication modification information transmitted by the user agent client; or
  • the authentication password modification module when determining that the user agent client is online, modifies the old authentication password of the user agent client to the authentication modification information transmitted by the user agent client according to the authentication modification information transmitted by the user agent client. New authentication password.
  • the invention also provides a user agent client, wherein the user agent client is provided with a request modification module; and the request modification module is configured to send the authentication modification information to the user agent server.
  • the request modification module obtains an encryption key of the old authentication password, an encryption type of the new authentication password, and encrypts the old authentication password according to the encryption key of the old authentication password, and searches for the new authentication password according to the encryption type of the new authentication password.
  • the weight password is encrypted, and the encrypted authentication password, or the modified authentication password operation type and the encrypted authentication password are transmitted.
  • the present invention enables the user agent client to modify the authentication password stored in the user proxy server by transmitting the authentication password modification information between the user agent client and the user proxy server.
  • the process of modifying the authentication password of the user proxy server satisfies the requirement of the user to modify the authentication password; in the process of modifying the authentication password, by using the user agent client and the user agent
  • the encrypted old authentication password and the new authentication password are transmitted between the servers, which ensures the security in the process of modifying the authentication password.
  • the authentication password modification information of the present invention is carried in the authentication header field of the message, which facilitates the identification.
  • the modification process of the weight password implements the process; thus, the technical solution provided by the invention achieves the purpose of perfecting the SIP authentication process and improving user satisfaction.
  • 1 is a schematic diagram of a networking diagram of a SIP domain
  • FIG. 2 is a flowchart of an authentication password modification in a SIP registration process according to Embodiment 1 of the present invention
  • FIG. 3 is a flowchart of an authentication password modification according to Embodiment 2 of the present invention. Mode for carrying out the invention
  • a direct connection mode or an indirect connection mode may be used between the user agent client and the user agent server.
  • the user agent server of the embodiment of the present invention first needs to transmit the authentication modification information to the user proxy server, and the authentication modification information includes: modifying the authentication password operation type, the old authentication password, and the new authentication password. .
  • the authentication modification information further includes: an encryption type of the new authentication password.
  • the modification is a modification in the broad sense, not only to modify the originally set multi-bit authentication password to other multi-bit authentication passwords, but also includes: In the case where the original authentication password is set, the original setting is deleted. For the authentication password, if the authentication password is not set, add the authentication password and so on.
  • the authentication challenge request parameter and the authentication challenge response parameter may be used between the user agent client and the user proxy server in the embodiment of the present invention to implement the modification of the authentication password. In this way, the above authentication modification information can be carried in the Right in the header field.
  • the message When a message carries an authentication challenge request parameter, the message may be referred to as an authentication challenge request message.
  • When a message carries an authentication challenge response parameter, the message When a message carries an authentication challenge response parameter, the message may be referred to as an authentication challenge response message.
  • the embodiment of the present invention may extend the authentication challenge parameter and the authentication challenge response parameter in the authentication header field, that is, adding an encryption type of the authentication password operation type and the encryption type of the new authentication password in the authentication challenge parameter,
  • the modification challenge response parameter is added with the modification authentication password operation type, the encryption type of the new authentication password, and the new authentication password.
  • passwordop is the modification password operation type
  • passwordencmethod is the encryption type of the new authentication password. Passwordop and passwordencmethod are newly added parameters.
  • the extended authentication challenge response parameter may be in the following form:
  • passwordop is the modification authentication password operation type
  • passwordencmethod is the encryption type of the new authentication password
  • passwordnew is the new authentication password after the secret password.
  • Passwordop, passwordencmethod, and passwordnew are new parameters.
  • the value of passwordop can be add, modify, delete, etc.
  • the value of passwordencmethod can only be the encryption type that UAC and UAS can support. When the encryption type of the new authentication password is not encrypted.
  • the value of passwordencmethod is NONE.
  • step 3-1 the UAC carries the parameter passwordop in the REGISTER request message, indicating that the authentication password needs to be modified.
  • the authentication parameters in the REGISTER request message can be in the following format:
  • UAC transmits the REGISTER request message to the UAS.
  • the UAS determines that the UAC needs to modify the password according to the passwordop-change in the REGISTER request message.
  • the UAS transmits the authentication challenge parameters carrying the passwordop and passwordencmethod to the UAC.
  • the value of Passwordop is change, indicating that the modification of the authentication password is confirmed.
  • the passwordencmethod parameter carries the encryption type of the new authentication password.
  • the authentication challenge parameter can be in the following form:
  • the encryption type of the new authentication password is XOR (exclusive or).
  • the authentication challenge parameter transmitted by the UAS to the UAC may not include the Passwordop.
  • step 3-3 UAC root nonce to encrypt the old authentication password, root password encmethod to encrypt the new authentication password, and send the REGISTER request message carrying the authentication challenge response parameters such as nonce and passwordencmethod to UAS again.
  • the REGISTER request message in this step may be referred to as an authentication challenge response message.
  • the encrypted new authentication password is 09090909.
  • the authentication challenge response parameter transmitted by the UAC to the UAS may not include the Passwordop.
  • the UAS When the UAS receives the REGISTER request message again in step 3-4, the REGISTER request message is entered.
  • Line authentication processing that is, verifying that the old authentication password is correct. After the old authentication password is verified correctly, the modification of the authentication password is agreed.
  • the UAS can directly decrypt the new authentication password according to the encryption type of the new authentication password, replace the old authentication password with the decrypted new authentication password, and save the encryption type of the new authentication password.
  • the UAS can also modify the authentication. During the process of the password, the new authentication password is not decrypted, the old authentication password is directly replaced by the encrypted new authentication password, and the encryption type of the new authentication password is saved, and the new authentication password is further used in the subsequent authentication process.
  • the encryption type decrypts the new authentication password.
  • the UAS After the authentication password is successfully modified, the UAS responds to the UAC with 200 messages.
  • step 3-4 if the UAS refuses to modify the old authentication password due to the failure of the old authentication password verification, etc., the UAS may send the authentication password modification information to the UAC. Thereafter, when the UAC and the UAS are again When authentication is required, the authentication process is still performed according to the originally set and unmodified authentication password.
  • the REGISTER message is taken as an example to describe the process of modifying the authentication password.
  • the UAC and the UAS in the embodiment of the present invention may also carry the authentication modification information through other messages, and pass one or more The interaction of the request messages implements the process of modifying the authentication password.
  • the embodiment of the present invention can also carry the authentication modification information by extending other header domain parameters, and the basic implementation principles are the same. Here, only the old authentication password is used.
  • the process of the invention and the process of modifying the authentication password are separated as an example to describe the embodiments of the present invention, and other embodiments are not described in detail.
  • the old authentication password verification process and the authentication password modification process are implemented based on the transmission of the same message.
  • the old authentication password verification process and the authentication key modification process are completed in two steps, that is, the old authentication password is checked first, and the verification success indicates that the user agent client is online. Then, in the case where the user agent client is online, the old authentication password is modified.
  • a specific implementation process of Embodiment 2 of the present invention is shown in FIG. 3.
  • step 4-1 UAC sends a REGISTER request message, the REGISTER request message does not carry the parameter passwordop, or the REGISTER request message does not carry the Authorization header field.
  • the authentication challenge response parameter in the REGISTER request message can be in the following format -
  • the UAS After the UAS receives the REGISTER request message and determines that the REGISTER request message does not carry the authentication information, the UAS returns a 401 unauthenticated response message to the UAC, requesting the UAC to perform authentication.
  • the 401 unauthenticated response message carries an encryption algorithm (algorithm parameter) and an encrypted random number (nonce parameter).
  • the authentication parameter in the 401 unauthenticated response message may be in the following format:
  • the UAC receives the 401 unauthenticated response message, encrypts the old authentication password, and then sends the encrypted old authentication password to the UAS through the REGISTER request message.
  • the authentication parameter in the REGISTER request message may be in the following format:
  • the response parameter is the encrypted old authentication password.
  • the UAS receives the REGISTER request message again, and then checks the old authentication password. After the password verification succeeds, the UAC returns a 200 message of successful verification, and the UAC registration is successful.
  • the UAC can directly modify the authentication password.
  • the UAC sends a REGISTER request message, and the REGISTER request message carries a parameter passwordop to indicate that the authentication password needs to be modified.
  • the Call-ID in the REGISTER request message is the same as the Call-ID in the REGISTER request message in step 4-1 to indicate that the UAC is online.
  • the authentication challenge response parameter in the REGISTER request message can be in the following format:
  • the UAS transmits the authentication challenge parameters carrying the passwordop and passwordencmethod to the UAC.
  • the value of Passwordop is change, indicating that the modification of the authentication password is confirmed, and the passwordencmethod parameter carries the encryption type of the new authentication password.
  • the authentication challenge parameter can be in the following form:
  • the authentication challenge parameters transmitted by the UAS to the UAC may not include P aSSWOr dop. Go to step 4-7.
  • the UAC encrypts the new authentication password according to the passwordencmethod in the authentication challenge message, and sends the REGISTER request message to the UAS again.
  • the REGISTER request message carries the encrypted New authentication password passwordnew.
  • the authentication challenge response parameter in the REGISTER request message can be of the form:
  • the authentication challenge response parameter transmitted by the UAC to the UAS may not include Passwordop.
  • step 4-8 the UAS obtains a new authentication password from the received REGISTER request message.
  • the new authentication password is saved, the modification of the authentication password is completed, and the UAC responds to the 200 message.
  • the new authentication password saved by the UAS may be the decrypted new authentication password or the encrypted new authentication password.
  • the user agent server and user agent client of the embodiment of the present invention are described below.
  • An authentication password modification module and an authentication module are set in the user proxy server, and a request modification module is set in the user proxy client.
  • the request modification module is mainly used to send the authentication modification information to the user proxy server.
  • the authentication modification information sent by the request modification module may include: modifying the authentication password operation type, the old authentication password, and the new authentication password; in some cases, such as when the user agent client is online, the authentication modification information is also
  • the method may include: modifying an authentication password operation type and a new authentication password.
  • the request modification module may transmit the authentication modification information to the user proxy server through the registration request message.
  • the request modification module may send the authentication modification information to the user proxy server together, or may transmit the authentication modification information to the user proxy server in a divided manner.
  • the authentication password modification module is mainly configured to receive the authentication modification information transmitted by the request modification module, and modify the authentication password of the user proxy client according to the received authentication modification information. After the authentication password modification module successfully modifies the authentication password, the authentication module performs authentication processing on the user proxy client according to the modified authentication password; after the authentication password modification module fails to modify the authentication password, the authentication is performed. The module authenticates the user agent client according to the unmodified authentication password.
  • each module in the embodiment of the present invention by taking two specific procedures for modifying the authentication password as an example.
  • the response message of the REGISTER request message is transmitted to the UAC.
  • the value of Passwordop is change, indicating that the modification of the authentication password is confirmed, and the passwordencmethod parameter carries the encryption type of the new authentication password.
  • the response message sent by the authentication password modification module to the REGISTER request message of the user agent client may also not include passwordop.
  • the request modification module After the user agent client receives the post-authentication challenge parameter, the request modification module encrypts the old authentication password, and encrypts the new authentication password according to passwordencmethod, and then requests the modification module to carry authentication such as nonce and passwordencmethod.
  • a REGISTER request message challenging the response parameters is sent to the UAS.
  • the authentication module After the UAS receives the REGISTER request message, the authentication module performs authentication processing on the REGISTER request message, that is, whether the old authentication password is correct first, and after the old authentication password is verified correctly, the authentication password modification module is notified to the authentication password. to modify.
  • the authentication password modification module After receiving the notification of the authentication module, decrypts the new authentication password according to the encryption type of the new authentication password in the REGISTER request message, and replaces the old authentication password with the decrypted new authentication password. And storing the encryption type of the new authentication password; the authentication password modification module may also not decrypt the new authentication password in the process of modifying the authentication password, directly replacing the old authentication password with the encrypted new authentication password, and saving The encryption type of the new authentication password, such that in the subsequent authentication process of the authentication module, the authentication module decrypts the new authentication password according to the encryption type of the new authentication password.
  • the authentication password modification module responds to the 200 message to the user agent client after the authentication password is successfully modified. Thereafter, when the authentication module needs to authenticate the user agent client, the authentication password should be modified according to the authentication password modified by the authentication password modification module.
  • the authentication password modification module If the authentication password modification module refuses to modify the old authentication password due to the failure of the old authentication password verification, the authentication password modification module sends the information of the authentication password modification failure to the user agent client, and thereafter, the authentication When the module needs to authenticate the user agent client, it still performs authentication processing according to the originally set and unmodified authentication password.
  • Embodiment 2 In the case that the user agent client is online, the authentication password is modified.
  • the request modification module sends a REGISTER request message to the user proxy server, and the REGISTER request message carries the parameter passwordop to indicate that the authentication password needs to be modified.
  • the Call-ID in the REGISTER request message indicates that the user agent client is online.
  • the authentication password modification module determines that the UAC needs to modify the authentication password according to the passwordop-change in the REGISTER request message received by the user proxy server, and the authentication password modification module carries the password of the passwordop and passwordencmethod in the case that the user proxy client is determined to be online. Weight challenge parameters are transmitted to the user Proxy client. The value of Passwordop is change, indicating that the modification of the authentication password is confirmed, and the passwordencmethod parameter carries the encryption type of the new authentication password.
  • the response message sent by the authentication password modification module to the REGISTER request message of the user agent client may also not include passwordop.
  • the authentication password modification module encrypts the new authentication password according to the passwordencmethod in the authentication challenge message, and sends the REGISTER request message to the user proxy server again.
  • the REGISTER request message carries the encrypted new authentication password passwordnew.
  • the authentication password modification module obtains a new authentication password from the REGISTER request message received by the user proxy server, saves the new authentication password, completes the modification of the authentication password, and responds to the user agent 200 message.
  • the new authentication password saved by the authentication password modification module may be the decrypted new authentication password or the encrypted new authentication uniform code. Thereafter, when the authentication module needs to authenticate the user agent client, the authentication password modified by the authentication password modification module should be used for authentication processing.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Description

基于 SIP的鉴权密码修改方法、 用户代理服务器和用户代理客户端
技术领域
本发明涉及网络通讯技术领域, 具体涉及一种基于 SIP的鉴权密码修改方法、 用户 代理服务器和用户代理客户端。 发明背景
SIP域的组网图如附图 1所示。图 1中,发出请求消息的逻辑实体称为 UAC(User Agent Client, 用户代理客户端) , 接受请求消息并发出响应消息的逻辑实体称为 UAS (User Agent Server, 用户代理服务器) 。
当 UAS收到一个请求消息时, 如果需要对这个请求消息进行鉴权, 就会检查请求消 息中是否携带有鉴权信息 (credentials) 。 当 UAS确定请求消息中没有携带鉴权信息时, 向 UAC发出 401未鉴权 (Unauthorized) 的响应消息或者向 UAC发出 407代理鉴权请求 (Proxy Authentication Required) 的响应消息, 且响应消息中携带鉴权参数。 UAC根椐 响应消息中的鉴权参数重新生成鉴权信息, 并将其放在请求消息中发给 UAS, UAS根据 请求消息中的鉴权信息重新进行鉴权。
目前还不能够对 UAS的鉴权密码进行修改,如果用户需要修改 SIP电话的鉴权密码, 则不能够实现。 SIP的鉴权流程还需要进一步的完善。 发明内容
本发明的目的在于, 提供一种基于 SIP的鉴权密码修改方法、 用户代理服务器和用户 代理客户端, 明确了用户代理客户端鉴权通过后、对用户代理服务器的鉴权密码进行修 改的流程, 完善了 SIP的鉴权流程。
为达到上述目的, 本发明提供的一种基于 SIP的鉴权密码修改方法, 包括: 用户代理客户端将鉴权修改信息传输至用户代理服务器;
用户代理服务器根据用户代理客户端传输来的鉴权修改信息进行鉴权密码的修改。 下述方法技术方案为可选技术方案。
所述鉴权修改信息包括: 修改鉴权密码操作类型、 旧鉴权密码和新鉴权密码, 且所 述用户代理服务器进行鉴权密码修改的步骤包括:
用户代理服务器根据用户代理客户端传输来的修改鉴权密码操作类型对用户代理 客户端传输来的旧鉴权密码进行鉴权, 并在确认旧鉴权密码鉴权成功后, 将旧鉴权密码 修改为用户代理客户端传输来的新鉴权密码;
或者所述鉴权修改信息包括: 修改鉴权密码操作类型和新鉴权密码, 且所述用户代 理服务器进行鉴权密码修改的步骤包括:
用户代理服务器在确定用户代理客户端传输来修改鉴权密码操作类型信息、且用户 代理客户端在线时,将用户代理客户端的旧鉴权密码修改为用户代理客户端传输来的新 鉴权密码。
所述鉴权修改信息中的旧鉴权密码为: 加密后的旧鉴权密码; 和 /或
所述鉴权修改信息中的新鉴权密码为: 加密后的新鉴权密码;
当所述新鉴权密码为: 加密后的新鉴权密码时, 所述鉴权修改信息还包括: 新鉴权 密码的加密类型。
所述用户代理服务器进行鉴权密码修改的步骤包括:
用户代理客户端获取旧鉴权密码的加密密钥、 新鉴权密码的加密类型;
用户代理客户端根据旧鉴权密码的加密密钥对旧鉴权密码进行加密、根据新鉴权密 码的加密类型对新鉴权密码进行加密, 并将加密后的鉴权密码、或者将修改鉴权密码操 作类型和加密后的鉴权密码传输至用户代理服务器;
用户代理服务器在确认旧鉴权密码鉴权正确后, 将旧鉴权密码修改为新鉴权密码, 保存新鉴权密码的加密类型, 并向用户代理客户端返回鉴权密码修改成功的消息; 或者所述用户代理服务器进行鉴权密码修改的步骤包括 - 用户代理客户端获取新鉴权密码的加密类型;
用户代理客户端根据新鉴权密码的加密类型对新鉴权密码进行加密, 并将加密后的 鉴权密码、 或者将修改鉴权密码操作类型和加密后的鉴权密码传输至用户代理服务器; 用户代理服务器将旧鉴权密码修改为新鉴权密码, 保存新鉴权密码的加密类型, 并 向用户代理客户端返回鉴权密码修改成功的消息。
所述获取新鉴权密码的加密类型的步骤包括- 用户代理客户端将修改鉴权密码操作类型承载于注册请求消息中传输至用户代理 服务器;
用户代理服务器在接收到修改鉴权密码操作类型时, 将新鉴权密码的加密类型、 或 者将修改鉴权密码操作类型和新鉴权密码的加密类型承载于注册请求消息的响应消息 中传输至用户代理客户端。
所述将旧鉴权密码修改为新鉴权密码的步骤具体为: 用户代理服务器根据新鉴权密码的加密类型对新鉴权密码进行解密, 将旧鉴权密码 修改为解密后的新鉴权密码; 或
用户代理服务器将旧鉴权密码修改为加密后的新鉴权密码。
所述修改鉴权密码操作类型、 旧鉴权密码、 新鉴权密码承载于鉴权头域的鉴权挑战 参数、 或者鉴权挑战响应参数中。
所述方法还包括- 用户代理服务器在确认旧鉴权密码鉴权失败时, 向用户代理客户端返回鉴权密码修 改失败的消息;
在鉴权密码修改失败后, 且需要对用户代理客户端进行鉴权处理时, 用户代理服务 器根据原有鉴权密码进行鉴权。
本发明还提供一种用户代理服务器, 所述用户代理服务器中设置有鉴权密码修改模 块; 或者所述用户代理服务器中设置有鉴权密码修改模块和鉴权模块;
鉴权密码修改模块: 用于接收用户代理客户端传输来的鉴权修改信息, 并根据鉴权 修改信息对鉴权密码进行修改;
鉴权模块: 用于根据鉴权密码修改模块修改后的鉴权密码对用户代理客户端进行鉴 权处理。
下述用户代理服务器的技术方案为可选技术方案。
鉴权模块根据鉴权修改信息对用户代理客户端传输来的鉴权修改信息中的旧鉴权 密码进行鉴权, 并在确认旧鉴权密码鉴权成功后, 通知鉴权密码修改模块; 鉴权密码修 改模块接收到鉴权模块的通知后,将旧鉴权密码修改为用户代理客户端传输来的鉴权修 改信息中的新鉴权密码; 或者
鉴权密码修改模块在确定用户代理客户端在线时, 根据用户代理客户端传输来的鉴 权修改信息将用户代理客户端的旧鉴权密码修改为用户代理客户端传输来的鉴权修改 信息中的新鉴权密码。
本发明还提供一种用户代理客户端, 所述用户代理客户端中设置有请求修改模块; 请求修改模块: 用于将鉴权修改信息发送至用户代理服务器。
下述用户代理客户端的技术方案为可选技术方案。
请求修改模块获取旧鉴权密码的加密密钥、 新鉴权密码的加密类型, 并根据旧鉴权 密码的加密密钥对旧鉴权密码进行加密、根据新鉴权密码的加密类型对新鉴权密码进行 加密, 并将加密后的鉴权密码、 或者将修改鉴权密码操作类型和加密后的鉴权密码传输 至用户代理服务器; 或者
请求修改模块获取新鉴权密码的加密类型, 并根据新鉴权密码的加密类型对新鉴权 密码进行加密, 并将加密后的鉴权密码、或者将修改鉴权密码操作类型和加密后的鉴权 密码传输至用户代理服务器。 通过上述技术方案的描述可知,本发明通过用户代理客户端与用户代理服务器之间 的鉴权密码修改信息的传输,使用户代理客户端能够对用户代理服务器中存储的鉴权密 码进行修改, 明确了用户代理客户端鉴权通过后、对用户代理服务器的鉴权密码进行修 改的流程, 满足了用户修改鉴权密码的需求; 在修改鉴权密码过程中, 通过在用户代理 客户端与用户代理服务器之间传输加密后的旧鉴权密码、新鉴权密码, 保证了鉴权密码 修改过程中的安全性; 本发明的鉴权密码修改信息承载于消息的鉴权头域中, 方便了鉴 权密码的修改实现过程; 从而通过本发明提供的技术方案实现了完善 SIP的鉴权流程、 提高用户满意度的目的。 附图简要说明
图 1是 SIP域的组网图示意图;
图 2是本发明实施方式一的在 SIP注册过程中的鉴权密码修改的流程图; 图 3是本发明实施方式二的鉴权密码修改的流程图。 实施本发明的方式
下面对本发明实施方式提供的技术方案做进一步的描述。
在本发明实施方式中, 用户代理客户端和用户代理服务器之间可以釆用直接连接方 式、 也可以釆用间接连接方式。
本发明实施方式的用户代理服务器在修改鉴权密码时, 首先需要将鉴权修改信息传 输至用户代理服务器, 鉴权修改信息包括: 修改鉴权密码操作类型、 旧鉴权密码和新鉴 权密码。 当新鉴权密码为加密的新鉴权密码时, 鉴权修改信息还包括: 新鉴权密码的加 密类型。这里的修改是广义含义中的修改, 不仅仅指将原来设置的多位鉴权密码修改为 其它多位鉴权密码, 还包括: 在原有设置了鉴权密码的情况下, 删除原有设置的鉴权密 码, 在原有没有设置鉴权密码的情况下, 增加设置鉴权密码等。
本发明实施方式中的用户代理客户端和用户代理服务器之间可利用鉴权挑战请求 参数和鉴权挑战响应参数来实现鉴权密码的修改。这样, 上述鉴权修改信息可承载于鉴 权头域中。 当一个消息中携带有鉴权挑战请求参数时, 该消息可以称为鉴权挑战请求消 息。 当一个消息中携带有鉴权挑战响应参数时, 该消息可以称为鉴权挑战响应消息。 本 发明实施方式可以对鉴权头域中的鉴权挑战参数和鉴权挑战响应参数进行扩展, 即在鉴 权挑战参数中增加修改鉴权密码操作类型和新鉴权密码的加密类型,在鉴权挑战响应参 数中增加修改鉴权密码操作类型、 新鉴权密码的加密类型和新鉴权密码。
鉴权头域中, 扩展后的鉴权挑战参数可以为如下形式- challenge = "Digest" digest-challenge
digest-challenge = 1#( realm | [ domain ] | nonce ]
[ opaque ] |[ stale ] | [ algorithm ] |
[ qop-options ] | [auth-param] )
[passwordop] | [ passwordencmethod])
其中: passwordop为修改鉴权密码操作类型, passwordencmethod为新鉴权密码的加 密类型。 Passwordop和 passwordencmethod为新增加的参数。
鉴权头域中, 扩展后的鉴权挑战响应参数可以为如下形式:
credentials = "Digest" digest-response
digest-response = 1#( username | realm | nonce | digest-uri
I response | [ algorithm ] | [cnonce] ]
[opaque] | [message-qop] |
[nonce-count] | [auth-param] |
[passwordop] |[ passwordnew])
passwordop = "passwordop" ' -" operation-tags
operation-tags = "add" I "change" /"delete"
passwordencmethod = " passwordencmethod " "=" encryption-method
encryption-method = "XOR"/"DES"/"3DES "RC5 "AES'V"NONEM
passwordnew = "passwordnew " "=" quoted-string
其中, passwordop为修改鉴权密码操作类型, passwordencmethod为新鉴权密码的加 密类型, passwordnew表示力口密后的新鉴权密码。 Passwordop、 passwordencmethod和 passwordnew为新增力 Π的参数。
Passwordop的取值可以为增加(add)、 修改(change)、 删除(delete)等; passwordencmethod的取值只能为 UAC与 UAS都能支持的加密类型,当新鉴权密码的加密 类型为不加密时, passwordencmethod的取值为 NONE。
下面以注册流程为例, 结合附图 2对本发明实施方式一的修改鉴权密码的流程进行 描述。
在步骤 3-1、 UAC在 REGISTER请求消息中携带参数 passwordop, 表示需要修改鉴权 密码。
REGISTER请求消息中的鉴权参数可以为如下格式:
Authorization: Digest username="7770000"5realm="huawei.com",
uri="sip: 182.20.90.100:5060" ,integrity-protected=no ,
passwordop=change
UAC将 REGISTER请求消息传输至 UAS。
到步骤 3-2、 UAS根据 REGISTER请求消息中的 passwordop-change确定 UAC需要修 改密码, UAS将承载有 passwordop和 passwordencmethod的鉴权挑战参数传输至 UAC。 Passwordop的取值为 change, 表示确认对鉴权密码的修改, passwordencmethod参数携带 有新鉴权密码的加密类型。
鉴权挑战参数可以为如下形式:
WWW- Authenticate: Digest realnr="huawei.com'',
nonce="073fcad97db5e337495e0a91bb2faafe",domain:="sip:huawei.com",
stale=false,algorithm=MD5,passwordop=change,passwordencmethod=XOR
其中: 新鉴权密码的加密类型为 XOR (异或) 。
. 在上述步骤 3-2中, UAS传输至 UAC的鉴权挑战参数中也可以不包含 Passwordop。
到步骤 3-3、 UAC根椐 nonce对旧鉴权密码进行加密, 根椐 passwordencmethod对新鉴 权密码进行加密, 并将携带有 nonce和 passwordencmethod等鉴权挑战响应参数的 REGISTER请求消息再次发送至 UAS。 该步骤中的 REGISTER请求消息可以称为鉴权挑 战响应消息。
' REGISTER请求消息中的鉴权挑战响应参数可以为如下形式- Authorization: Digest usemame='7770000'',realm="huawei.com",
nonce="073fcad97db5e337495e0a91bb2faafe",uri="sip: 182.20.90.100:5060", response="96e6a45b003alf32e496a9b72354b2br',mtegrity-protected=no,
passwordop=change,passwordnew="09090909"
其中, 加密后的新鉴权密码为 09090909。
在上述步骤 3-3中, UAC传输至 UAS的鉴权挑战响应参数中也可以不包含 Passwordop。
到步骤 3-4、 UAS再次接收到 REGISTER请求消息时, 对这个 REGISTER请求消息进 行鉴权处理, 即先验证旧鉴权密码是否正确, 在旧鉴权密码验证正确后, 同意对鉴权密 码的修改。 UAS可以直接根据新鉴权密码的加密类型对新鉴权密码进行解密, 用解密后 的新鉴权密码替代旧鉴权密码, 并保存新鉴权密码的加密类型, UAS也可以在修改鉴权 密码的过程中不对新鉴权密码进行解密, 直接用加密后的新鉴权密码替代旧鉴权密码, 并保存新鉴权密码的加密类型,在以后的鉴权过程中再根据新鉴权密码的加密类型对新 鉴权密码进行解密。
UAS在鉴权密码修改成功后, 向 UAC响应 200消息。
UAC在接收到 200消息后, 鉴权密码修改的过程结束。 此后, 当 UAC和 UAS再次需 要鉴权时, 应根据修改后的鉴权密码进行鉴权处理。
在步骤 3-4中,如果由于旧鉴权密码验证失败等原因,使 UAS拒绝对旧鉴权密码进行 修改时, UAS可以向 UAC发送鉴权密码修改失败的信息, 此后, 当 UAC和 UAS再次需要 鉴权时, 仍根据原设置的、 未修改的鉴权密码进行鉴权处理。
上面的实施例中是以 REGISTER消息为例对实现鉴权密码修改过程进行说明的, 本 发明实施方式中的 UAC和 UAS之间也可以通过其他消息中携带鉴权修改信息,并通过一 个或多个请求消息的交互实现鉴权密码的修改过程, 而且, 本发明实施方式也可以通过 扩展其他头域参数来承载鉴权修改信息, 其基本实现原理均相同, 在此仅以旧鉴权密码 校验过程和鉴权密码修改过程分离为例对本发明实施方式进行说明,对其他实施方式不 再详细描述。
在上面的实施方式中,旧鉴权密码校验过程与鉴权密码的修改过程是基于同一个消 息的传输实现的。在下面的实施方式二中, 旧鉴权密码校验过程和鉴权密钥修改过程是 分成两步完成的, 即先对旧鉴权密码进 校验, 校验成功表示用户代理客户端在线, 然 后, 在用户代理客户端在线的情况下, 再对旧鉴权密码进行修改。 本发明实施方式二的 具体实现流程如图 3所示。
图 3中, 步骤 4-1、 UAC发送 REGISTER请求消息, REGISTER请求消息中没有 携带参数 passwordop, 或者 REGISTER请求消息中不携带 Authorization (鉴权) 头域。
REGISTER请求消息中的鉴权挑战响应参数可以为如下格式 -
Authorization: Digest username="7770000",realm="huawei.com",
urH'sip:182.20.90.100:5060M.
到步骤 4-2、 UAS接收到 REGISTER请求消息、 并确定 REGISTER请求消息中没 有携带鉴权信息后, 向 UAC返回 401未鉴权的响应消息, 要求 UAC进行鉴权。 401未 鉴权的响应消息中携带有加密算法 (algorithm参数)、 加密随机数 (nonce参数)。 401未鉴权的响应消息中的鉴权参数可以为如下格式:
WW W- Authenticate: Digest realm="huawei.com"5
nonce="073fcad97db5e337495e0a91bb2faafe",domain="sip: uawei.com",
stale=false,algorithm=MD5
到步骤 4-3、 UAC接收到 401未鉴权的响应消息后,将旧鉴权密码进行加密,然后, 将加密后的旧鉴权密码通过 REGISTER请求消息发送给 UAS。
此时, REGISTER请求消息中的鉴权参数可以为如下格式:
Authorization: Digest username="7770000",realm="huawei. com",
nonce="073fcad97db5e337495e0a91bb2faafe",uri="sip:182.20.90.100:5060", response="96e6a45b003alD2e496a9b72354b2bl"
其中, response参数是加密后的旧鉴权密码。
到步骤 4-4、 UAS再次接收到 REGISTER请求消息后, 对旧鉴权密码进行校验, 密 码校验成功后, 向 UAC返回校验成功的 200消息, UAC注册成功。
在 UAC注册成功且 UAC在线的情况下, UAC可直接对鉴权密码进行修改。
到步骤 4-5、 UAC发送 REGISTER请求消息, 该 REGISTER请求消息中携带有参 数 passwordop, 以表示需要修改鉴权密码。 REGISTER请求消息中的 Call-ID与步骤 4-1 的 REGISTER请求消息中的 Call-ID—致, 以表示 UAC在线。
REGISTER请求消息中的鉴权挑战响应参数可以为如下格式:
Authorization: Digest username="7770000",realm="huawei. com",
uri="sip: 182.20.90.100:5060",
passwordop=change
Call-ID: eal 5d9a8110b07786af504b01fbdal 8b
到步骤 4-6、 UAS根据接收的 REGISTER请求消息中的 passwordop=change确定 UAC 需要修改鉴权密码, 在 UAC在线的情况下, UAS将承载有 passwordop和 passwordencmethod的鉴权挑战参数传输至 UAC。 其中, Passwordop的取值为 change, 表 示确认对鉴权密码的修改, passwordencmethod参数携带有新鉴权密码的加密类型。
鉴权挑战参数可以为如下形式:
WW W- Authenticate: Digest realm="huawei.com" ,
domain="sip:huawei.com",stale=false, passwordop=change,passwordencmethod=XOR 在上述步骤 4-6中, UAS传输至 UAC的鉴权挑战参数中也可以不包含 PaSSWOrdop。 到步骤 4-7、 UAC根据鉴权挑战消息中的 passwordencmethod对新鉴权密码进行加 密, 并将 REGISTER请求消息再次发送至 UAS, REGISTER请求消息中携带有加密后的 新鉴权密码 passwordnew。
REGISTER请求消息中的鉴权挑战响应参数可以为如下形式:
Authorization: Digest username="7770000",realm="huawei.com",
uri="sip: 182.20.90.100:5060",
passwordop=change,passwordnew="09090909"
在上述步骤 4-7中, UAC传输至 UAS的鉴权挑战响应参数中也可以不包含 Passwordop
到步骤 4-8、 UAS从接收的 REGISTER请求消息中获取新鉴权密码, 在 UAC在线 的情况下, 将新鉴权密码保存下来, 完成对鉴权密码的修改, 向 UAC响应 200消息。 UAS保存的新鉴权密码可以为解密后的新鉴权密码, 也可以为加密后的新鉴权密码。
下面对本发明实施方式的用户代理服务器和用户代理客户端进行描述。
用户代理服务器中设置有鉴权密码修改模块和鉴权模块, 用户代理客户端中设置有 请求修改模块。
请求修改模块主要用于将鉴权修改信息发送至用户代理服务器。请求修改模块发送 的鉴权修改信息可以包括: 修改鉴权密码操作类型、 旧鉴权密码和新鉴权密码; 在某些 情况下, 如当用户代理客户端在线的时候, 鉴权修改信息也可以包括: 修改鉴权密码操 作类型和新鉴权密码。
请求修改模块可以将鉴权修改信息通过注册请求消息传输至用户代理服务器。请求 修改模块可以将鉴权修改信息一起发送至用户代理服务器,也可以将鉴权修改信息分次 传输至用户代理服务器。
鉴权密码修改模块主要用于接收请求修改模块传输来的鉴权修改信息, 并根据接收 的鉴权修改信息对用户代理客户端的鉴权密码进行修改。在鉴权密码修改模块对鉴权密 码成功修改后, 鉴权模块根据修改后的鉴权密码对用户代理客户端进行鉴权处理; 在鉴 权密码修改模块对鉴权密码修改失败后,鉴权模块根据未修改的鉴权密码对用户代理客 户端进行鉴权处理。
下面以两个具体的修改鉴权密码的流程为例对本发明实施方式中的各模块进行说 明。
实施方式一: 首先, 请求修改模块将携带有 passwordop=change的 REGISTER请求消 息发送至鉴权密码修改模块。
鉴权密码修改模块根据 REGISTER请求消息中的 passwordop=change确定 UAC需要 修改密码, 鉴权密码修改模块将承载有 passwordop和 passwordencmethod等鉴权挑战参数 的 REGISTER请求消息的响应消息传输至 UAC。 其中, Passwordop的取值为 change, 表 示确认对鉴权密码的修改, passwordencmethod参数携带有新鉴权密码的加密类型。鉴权 密码修改模块发送至用户代理客户端的 REGISTER请求消息的响应消息中也可以不包含 passwordop
请求修改模块在用户代理客户端接收后鉴权挑战参数后, 对旧鉴权密码进行加密, 并根椐 passwordencmethod对新鉴权密码进行加密, 然后, 请求修改模块将携带有 nonce 和 passwordencmethod等鉴权挑战响应参数的 REGISTER请求消息发送至 UAS。
鉴权模块在 UAS接收到 REGISTER请求消息后, 对 REGISTER请求消息进行鉴权处 理, 即先验证旧鉴权密码是否正确, 在旧鉴权密码验证正确后, 通知鉴权密码修改模块 对鉴权密码进行修改。
鉴权密码修改模块在接收到鉴权模块的通知后, 根据 REGISTER请求消息中的新鉴 权密码的加密类型对新鉴权密码进行解密, 用解密后的新鉴权密码替代旧鉴权密码, 并 保存新鉴权密码的加密类型; 鉴权密码修改模块也可以在修改鉴权密码的过程中不对新 鉴权密码进行解密, 直接用加密后的新鉴权密码替代旧鉴权密码, 并保存新鉴权密码的 加密类型, 这样, 在鉴权模块以后的鉴权过程中, 由鉴权模块根据新鉴权密码的加密类 型对新鉴权密码进行解密。
鉴权密码修改模块在鉴权密码修改成功后, 向用户代理客户端响应 200消息。 此后, 当鉴权模块需要对用户代理客户端进行鉴权时, 应根据鉴权密码修改模块修改后的鉴权 密码进行鉴权处理。
如果由于旧鉴权密码验证失败等原因, 使鉴权密码修改模块拒绝对旧鉴权密码进行 修改, 则鉴权密码修改模块向用户代理客户端发送鉴权密码修改失败的信息, 此后, 鉴 权模块需要对用户代理客户端进行鉴权时, 仍根据原设置的、 未修改的鉴权密码进行鉴 权处理。
实施方式二: 在用户代理客户端在线的情况下, 修改鉴权密码。
在用户代理客户端在线的情况下,请求修改模块向用户代理服务器发送 REGISTER 请求消息, 该 REGISTER请求消息中携带有参数 passwordop, 以表示需要修改鉴权密 码。 REGISTER请求消息中的 Call-ID表示用户代理客户端在线。
鉴权密码修改模块根据用户代理服务器接收的 REGISTER请求消息中的 passwordop-change确定 UAC需要修改鉴权密码,鉴权密码修改模块在确定用户代理客户 在线的情况下, 将承载有 passwordop和 passwordencmethod的鉴权挑战参数传输至用户 代理客户端。 其中, Passwordop的取值为 change , 表示确认对鉴权密码的修改, passwordencmethod参数携带有新鉴权密码的加密类型。鉴权密码修改模块发送至用户代 理客户端的 REGISTER请求消息的响应消息中也可以不包含 passwordop。
鉴权密码修改模块根据鉴权挑战消息中的 passwordencmethod对新鉴权密码进行加 密, 并将 REGISTER请求消息再次发送至用户代理服务器, REGISTER请求消息中携带 有加密后的新鉴权密码 passwordnew。
鉴权密码修改模块从用户代理服务器再次接收的 REGISTER请求消息中获取新鉴 权密码, 将新鉴权密码保存下来, 完成对鉴权密码的修改, 向用户代理客户端响应 200 消息。 鉴权密码修改模块保存的新鉴权密码可以为解密后的新鉴权密码, 也可以为加密 后的新鉴权齊码。 此后, 当鉴权模块需要对用户代理客户端进行鉴权时, 应根据鉴权密 码修改模块修改后的鉴权密码进行鉴权处理。
虽然通过实施例描绘了本发明,本领域普通技术人员知道, 本发明有许多变形和变 化而不脱离本发明的精神, 本发明的申请文件的权利要求包括这些变形和变化。

Claims

权利要求
1、 一种基于 SIP的鉴权密码修改方法, 其特征在于, 包括- 用户代理客户端将鉴权修改信息传输至用户代理服务器;
用户代理服务器根据用户代理客户端传输来的鉴权修改信息进行鉴权密码的修改。
2、 如权利要求 1所述的方法, 其特征在于:
所述鉴权修改信息包括: 修改鉴权密码操作类型、 旧鉴权密码和新鉴权密码, 且所 述用户代理服务器进行鉴权密码修改的步骤包括:
用户代理服务器根据用户代理客户端传输来的修改鉴权密码操作类型对用户代理 客户端传输来的旧鉴权密码进行鉴权, 并在确认旧鉴权密码鉴权成功后, 将旧鉴权密码 修改为用户代理客户端传输来的新鉴权密码;
或者所述鉴权修改信息包括: 修改鉴权密码操作类型和新鉴权密码, 且所述用户代 理服务器进行鉴权密码修改的步骤包括- 用户代理服务器在确定用户代理客户端传输来修改鉴权密码操作类型信息、且用户 代理客户端在线时,将用户代理客户端的旧鉴权密码修改为用户代理客户端传输来的新 鉴权密码。
3、 如权利要求 2所述的方法, 其特征在于- 所述鉴权修改信息中的旧鉴权密码为: 加密后的旧鉴权密码; 和 /或
所述鉴权修改信息中的新鉴权密码为: 加密后的新鉴权密码;
当所述新鉴权密码为: 加密后的新鉴权密码时, 所述鉴权修改信息还包括: 新鉴权 密码的加密类型。
4、 如权利要求 3所述的方法, 其特征在于:
所述用户代理服务器进行鉴权密码修改的步骤包括:
用户代理客户端获取旧鉴权密码的加密密钥、 新鉴权密码的加密类型;
用户代理客户端根据旧鉴权密码的加密密钥对旧鉴权密码进行加密、根据新鉴权密 码的加密类型对新鉴权密码进行加密, 并将加密后的鉴权密码、或者将修改鉴权密码操 作类型和加密后的鉴权密码传输至用户代理服务器;
用户代理服务器在确认旧鉴权密码鉴权正确后, 将旧鉴权密码修改为新鉴权密码, 保存新鉴权密码的加密类型, 并向用户代理客户端返回鉴权密码修改成功的消息; 或者所述用户代理服务器进行鉴权密码修改的步骤包括- 用户代理客户端获取新鉴权密码的加密类型; 用户代理客户端根据新鉴权密码的加密类型对新鉴权密码进行加密, 并将加密后的 鉴权密码、 或者将修改鉴权密码操作类型和加密后的鉴权密码传输至用户代理服务器; 用户代理服务器将旧鉴权密码修改为新鉴权密码, 保存新鉴权密码的加密类型, 并 向用户代理客户端返回鉴权密码修改成功的消息。
5、 如权利要求 4所述的方法, 其特征在于, 所述获取新鉴权密码的加密类型的步 骤包括:
用户代理客户端将修改鉴权密码操作类型承载于注册请求消息中传输至用户代理 服务器;
用户代理服务器在接收到修改鉴权密码操作类型时, 将新鉴权密码的加密类型、 或 者将修改鉴权密码操作类型和新鉴权密码的加密类型承载于注册请求消息的响应消息 中传输至用户代理客户端。
6、 如权利要求 4所述的方法, 其特征在于, 所述将旧鉴权密码修改为新鉴权密码 的步骤具体为:
用户代理服务器根据新鉴权密码的加密类型对新鉴权密码进行解密, 将旧鉴权密码 修改为解密后的新鉴权密码; 或
用户代理服务器将旧鉴权密码修改为加密后的新鉴权密码。
7、 如权利要求 2所述的方法, 其特征在于, 所述修改鉴权密码操作类型、 旧鉴权 密码、 新鉴权密码承载于鉴权头域的鉴权挑战参数、 或者鉴权挑战响应参数中。
8、 如权利要求 2所述的方法, 其特征在于, 所述方法还包括- 用户代理服务器在确认旧鉴权密码鉴权失败时, 向用户代理客户端返回鉴权密码修 改失败的消息;
在鉴权密码修改失败后, 且需要对用户代理客户端进行鉴权处理时, 用户代理服务 器根据原有鉴权密码进行鉴权。
9、 一种用户代理服务器, 其特征在于, 所述用户代理服务器中设置有鉴权密码修 改模块; 或者所述用户代理服务器中设置有鉴权密码修改模块和鉴权模块;
鉴权密码修改模块: 用于接收用户代理客户端传输来的鉴权修改信息, 并根据鉴权 修改信息对鉴权密码进行修改;
鉴权模块: 用于根据鉴权密码修改模块修改后的鉴权密码对用户代理客户端进行鉴 权处理。
10、 如权利要求 9所述的用户代理服务器, 其特征在于: 鉴权模块根据鉴权修改信息对用户代理客户端传输来的鉴权修改信息中的 I日鉴权 密码进行鉴权, 并在确认旧鉴权密码鉴权成功后, 通知鉴权密码修改模块; 鉴权密码修 改模块接收到鉴权模块的通知后,将旧鉴权密码修改为用户代理客户端传输来的鉴权修 改信息中的新鉴权密码; 或者
鉴权密码修改模块在确定用户代理客户端在线时, 根据用户代理客户端传输来的鉴 权修改信息将用户代理客户端的旧鉴权密码修改为用户代理客户端传输来的鉴权修改 信息中的新鉴权密码。
11、 一种用户代理客户端, 其特征在于, 所述用户代理客户端中设置有请求修改模 块;
请求修改模块: 用于将鉴权修改信息发送至用户代理服务器。
12、 如权利要求 11所述的用户代理客户端, 其特征在于:
请求修改模块获取旧鉴权密码的加密密钥、 新鉴权密码的加密类型, 并根据旧鉴权 密码的加密密钥对旧鉴权密码进行加密、根据新鉴权密码的加密类型对新鉴权密码进行 加密, 并将加密后的鉴权密码、 或者将修改鉴权密码操作类型和加密后的鉴权密码传输 至用户代理服务器; 或者
请求修改模块获取新鉴权密码的加密类型, 并根据新鉴权密码的加密类型对新鉴权 密码进行加密, 并将加密后的鉴权密码、 或者将修改鉴权密码操作类型和加密后的鉴权 密码传输至用户代理服务器。
PCT/CN2006/002978 2005-11-07 2006-11-07 Procede de modification de mot de passe d’authentification, serveur d’agent utilisateur et client d’agent utilisateur base sur sip WO2007051430A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN200510115578.2 2005-11-07
CN200510115578 2005-11-07

Publications (1)

Publication Number Publication Date
WO2007051430A1 true WO2007051430A1 (fr) 2007-05-10

Family

ID=38005454

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2006/002978 WO2007051430A1 (fr) 2005-11-07 2006-11-07 Procede de modification de mot de passe d’authentification, serveur d’agent utilisateur et client d’agent utilisateur base sur sip

Country Status (1)

Country Link
WO (1) WO2007051430A1 (zh)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001043189A (ja) * 1999-07-27 2001-02-16 Pfu Ltd ネットワーク認証システムの制御方法およびその記録媒体
CN1494253A (zh) * 2002-10-31 2004-05-05 华为技术有限公司 一种信息提供端数据保护的方法
US20040128510A1 (en) * 2002-02-01 2004-07-01 Larsen Vincent Alan Key exchange for a process-based security system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001043189A (ja) * 1999-07-27 2001-02-16 Pfu Ltd ネットワーク認証システムの制御方法およびその記録媒体
US20040128510A1 (en) * 2002-02-01 2004-07-01 Larsen Vincent Alan Key exchange for a process-based security system
CN1494253A (zh) * 2002-10-31 2004-05-05 华为技术有限公司 一种信息提供端数据保护的方法

Similar Documents

Publication Publication Date Title
JP5123209B2 (ja) モバイルネットワークに基づくエンドツーエンド通信での認証の方法、システム、および認証センタ
US6993652B2 (en) Method and system for providing client privacy when requesting content from a public server
KR100978052B1 (ko) 일반 부트스트래핑 아키텍처(gba)의 인증 환경 설정관련 모바일 노드 아이디 제공 장치, 방법 및 컴퓨터프로그램 생성물
KR101343039B1 (ko) 인증 시스템, 방법 및 장치
WO2017185913A1 (zh) 一种无线局域网认证机制的改进方法
WO2006032214A1 (fr) Procede de transmission de donnees synchrones syncml
WO2009155813A1 (zh) 一种在客户端保存加密数据的方法及系统
WO2010012203A1 (zh) 鉴权方法、重认证方法和通信装置
WO2013004112A1 (zh) 数据传输的方法及装置
US20070143614A1 (en) Method, system and devices for protection of a communication or session
WO2010091563A1 (zh) Wapi终端证书的管理方法、装置及系统
Pritikin et al. Enrollment over secure transport
WO2007104248A1 (en) Method, system, apparatus and bsf entity for preventing bsf entity from attack
WO2007000115A1 (fr) Procede d'authentification de dispositif recevant un message de demande sip
WO2008025272A1 (fr) Système de protocole d'ouverture de session, moyen pour établir un canal de sécurité et procédé correspondant
Tschofenig et al. The extensible authentication protocol-Internet key exchange protocol version 2 (EAP-IKEv2) method
WO2015180399A1 (zh) 一种认证方法及装置系统
CN102215235B (zh) 可修改鉴权密码的sip安全认证方法
WO2011035579A1 (zh) Wapi终端接入ims网络的认证方法、系统和终端
WO2007051430A1 (fr) Procede de modification de mot de passe d’authentification, serveur d’agent utilisateur et client d’agent utilisateur base sur sip
Doherty et al. Dynamic symmetric key provisioning protocol (dskpp)
CN115314278B (zh) 可信网络连接身份认证方法、电子设备及存储介质
Pritikin et al. RFC 7030: Enrollment over secure transport
CN117915322A (zh) 一种基于密钥完整性检测的切片二次认证方法及系统
WO2012129985A1 (zh) 单点登录方法及系统

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 06805176

Country of ref document: EP

Kind code of ref document: A1