INTERNET PROTOCOL MULTIMEDIA SUBSYSTEM (IMS) AUTHENTICATION FOR NON-IMS SUBSCRIBERS
First Claim
Patent Images
1. A method, comprising:
- receiving, by a network device and from a user device, an authentication request, the user device being associated with a first network that is different from a second network associated with the network device;
identifying, by the network device, a home subscriber server (“
HSS”
) associated with the first network;
requesting, by the network device, an authentication vector from the HSS;
receiving, by the network device, the authentication vector from the HSS, wherein the authentication vector does not include authentication credentials associated with an Internet Protocol Multimedia Subsystem (“
IMS”
);
generating, by the network device, an authentication challenge based on the authentication vector;
outputting, by the network device, the authentication challenge to the user device;
receiving, by the network device and from the network device, a response to the authentication challenge; and
authenticating, by the network device and based on the response, the user device for an IMS core network associated with the second network.
2 Assignments
0 Petitions
Accused Products
Abstract
A call session control function (“CSCF”), of an Internet Protocol Multimedia Subsystem (“IMS”) core network, may receive a set of authentication credentials that do not include IMS authentication credentials; and may use the set of authentication credentials, which do not include IMS authentication credentials, to authenticate a user device for the IMS core network.
14 Citations
20 Claims
-
1. A method, comprising:
-
receiving, by a network device and from a user device, an authentication request, the user device being associated with a first network that is different from a second network associated with the network device; identifying, by the network device, a home subscriber server (“
HSS”
) associated with the first network;requesting, by the network device, an authentication vector from the HSS; receiving, by the network device, the authentication vector from the HSS, wherein the authentication vector does not include authentication credentials associated with an Internet Protocol Multimedia Subsystem (“
IMS”
);generating, by the network device, an authentication challenge based on the authentication vector; outputting, by the network device, the authentication challenge to the user device; receiving, by the network device and from the network device, a response to the authentication challenge; and authenticating, by the network device and based on the response, the user device for an IMS core network associated with the second network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A network device, comprising:
-
a memory device configured to store a set of processor-executable instructions; and a processor configured to execute the stored processor-executable instructions, wherein executing the stored processor-executable instructions causes the processor to; identify, based on receiving an authentication request from a user device, a home subscriber server (“
HSS”
) associated with a first network that is associated with the user device, the first network being different from a second network associated with the network device;request an authentication vector from the HSS; receive the authentication vector from the HSS, wherein the authentication vector does not include authentication credentials associated with an Internet Protocol Multimedia Subsystem (“
IMS”
);output an authentication challenge, that is based on the authentication vector, to the user device; receive, from the network device, a response to the authentication challenge; and authenticate, based on the response, the user device for an IMS core network associated with the second network. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A method, comprising:
-
receiving, by a call session control function (“
CSCF”
) of an Internet Protocol Multimedia Subsystem (“
IMS”
) core network, a set of authentication credentials that do not include IMS authentication credentials; andusing, by the CSCF, the set of authentication credentials to authenticate a user device for the IMS core network. - View Dependent Claims (20)
-
Specification