Method for authenticating user terminal in IP multimedia sub-system
First Claim
1. A method for authenticating a user equipment in an IP multimedia subsystem, comprising:
- generating, by a Serving-Call Session Control Function (S-CSCF) entity, an authentication challenge through a Digest Authentication Algorithm in response to a subscriber request, and sending the authentication challenge to a user equipment through a Proxy-Call Session Control Function (P-CSCF) entity;
generating, by the user equipment, an authentication response through the Digest Authentication Algorithm in accordance with a subscriber key as well as related parameters in the authentication challenge, and sending the authentication response to the S-CSCF entity through the P-CSCF entity; and
verifying, by the S-CSCF entity, the authentication response through the Digest Authentication Algorithm in accordance with information HA1 related to the subscriber key as well as related parameters, and if the verification has been passed, determining that the authentication for the user equipment succeeds, otherwise determining that the authentication for the user equipment fails.
8 Assignments
0 Petitions
Accused Products
Abstract
A method for authenticating user terminal in IMS network, the method includes: with regard to user request, Service-Call Session Control Function (S-CSCF) entity creates the authentication challenge utilizing Digest Authentication Algorithm, and sends the authentication challenge to user terminal through Proxy-Call Session Control Function (P-CSCF) entity; the user terminal creates the authentication response utilizing Digest Authentication Algorithm according to the user key and associated parameters with said authentication challenge, and sends the authentication response to S-CSCF entity through S-CSCF entity; S-CSCF entity authenticates said authentication response utilizing Digest Authentication Algorithm according to HA1 and associated parameters, if the authentication passes, determines that the user terminal is authenticated successfully, otherwise, determines that the user terminal is authenticated failure.
-
Citations
18 Claims
-
1. A method for authenticating a user equipment in an IP multimedia subsystem, comprising:
-
generating, by a Serving-Call Session Control Function (S-CSCF) entity, an authentication challenge through a Digest Authentication Algorithm in response to a subscriber request, and sending the authentication challenge to a user equipment through a Proxy-Call Session Control Function (P-CSCF) entity;
generating, by the user equipment, an authentication response through the Digest Authentication Algorithm in accordance with a subscriber key as well as related parameters in the authentication challenge, and sending the authentication response to the S-CSCF entity through the P-CSCF entity; and
verifying, by the S-CSCF entity, the authentication response through the Digest Authentication Algorithm in accordance with information HA1 related to the subscriber key as well as related parameters, and if the verification has been passed, determining that the authentication for the user equipment succeeds, otherwise determining that the authentication for the user equipment fails. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 17)
-
-
11. A method for authenticating a user equipment in an IP multimedia subsystem, comprising:
-
generating, by a Home Subscriber Server (HSS), parameters required during a Digest Authentication for generation of an authentication challenge in accordance with a subscriber identity in a request message sent from a Serving-Call Session Control Function (S-CSCF) entity, and sending the parameters to the S-CSCF entity;
generating, by the S-CSCF entity, an authentication challenge in accordance with the parameters, and sending the authentication challenge to a user equipment through a Proxy-Call Session Control Function (P-CSCF) entity;
generating, by the user equipment, an authentication response through a Digest Authentication Algorithm in accordance with a subscriber key as well as related parameters in the authentication challenge, and transferring the authentication response to the HSS through the P-CSCF entity and the S-CSCF entity; and
verifying, by the HSS, related contents in the authentication response through the Digest Authentication Algorithm in accordance with the subscriber key and related parameters, and if the verification has been passed, informing the S-CSCF entity that the authentication for the user equipment succeeds, otherwise informing the S-CSCF entity that the authentication for the user equipment fails. - View Dependent Claims (12, 13, 14, 15, 16, 18)
-
Specification