Summary of the invention
The embodiment of the invention provides a kind of identity identifying method, device and system, is used to realize that IMS uses and unified certification and the state synchronized of non-IMS between using.
The embodiment of the invention provides a kind of identity identifying method, may further comprise the steps:
Receive the identify label of the subscriber equipment that non-internet protocol multi-media sub-system IMS territory application server submits to, whether have the key information of described identify label correspondence and described key information before the deadline according to described identify label inquiry;
If have the key information of described identify label correspondence and described key information before the deadline, whether then inquire about described subscriber equipment is registered state in the IMS territory, if Query Result is for being, then return the term of validity of described key information and described key information, make described non-IMS territory application server use the term of validity of described key information and described key information and described subscriber equipment to carry out authentication to described non-IMS territory application server.
Preferably, before the identify label of the subscriber equipment that the non-IMS of described reception territory application server is submitted to, also comprise:
Reception is obtained the registration parameter of carrying in the described sip message from the Session initiation Protocol sip message of subscriber equipment, and described registration parameter is generated according to Public key by described subscriber equipment;
Use the private cipher key of self preserving that the described registration parameter of obtaining is decrypted, if successful decryption, then preserve the key information of the identify label correspondence of described subscriber equipment, return the message that succeeds in registration to described subscriber equipment, make described subscriber equipment preserve described key information and visit non-IMS territory application server according to described key information.
Preferably, before the sip message of described reception from subscriber equipment, also comprise:
Described subscriber equipment is carried out the IMS authorizing procedure, registers in the IMS territory;
When use in the non-IMS of user equipment access territory, check whether this locality exists key information, if there is no, then generates key information at random, and generate the registration parameter, and send described registration parameter by sip message according to described key information and Public key.
Preferably, described subscriber equipment also comprises according to before key information and the Public key generation registration parameter:
Generate public private key pair, preserve the private cipher key in the described public private key pair, and disclose Public key in the described public private key pair to described subscriber equipment.
Preferably, described subscriber equipment is visited non-IMS territory application server according to key information, specifically comprises:
Described subscriber equipment sends access request to described non-IMS territory application server, and receives the challenge message that described non-IMS territory application server returns;
Described subscriber equipment returns challenge responses message according to self identify label and described key information to described non-IMS territory application server.
Preferably, described non-IMS territory application server uses the term of validity and the subscriber equipment of key information and key information to carry out authentication, specifically comprises:
Whether described non-IMS territory application server uses described key information checking correct from the challenge responses message of described subscriber equipment, if correct, then to described subscriber equipment return authentication success message;
Described subscriber equipment receives the authentication success message from described non-IMS territory application server, verify whether the authentication information that comprises in the described authentication success message is correct, if it is correct, then finish the two-way authentication with described non-IMS territory application server, undertaken alternately by escape way and described non-IMS territory application server.
The embodiment of the invention also provides a kind of authentication gateway, comprising:
Receiver module is used to receive the identify label of the subscriber equipment that non-IMS territory application server submits to;
Enquiry module, whether the identify label inquiry that is used for receiving according to described receiver module exists the key information of described identify label correspondence and described key information before the deadline, whether inquiring the key information that there is described identify label correspondence and described key information before the deadline the time, inquiring about described subscriber equipment is registered state in the IMS territory;
Sending module, be used for inquiring described subscriber equipment when being registered state in the IMS territory at described enquiry module, return the term of validity of described key information and described key information to described non-IMS territory application server, make described non-IMS territory application server use the term of validity of described key information and described key information and described subscriber equipment to carry out authentication.
Preferably, described receiver module also is used to receive the sip message from subscriber equipment, obtains the registration parameter of carrying in the described sip message, and described registration parameter is generated according to Public key by described subscriber equipment;
Described authentication gateway also comprises:
Deciphering module is used to use the private cipher key of self preserving that the registration parameter that described receiver module obtains is decrypted;
Described sending module, also be used for when described deciphering module successful decryption, preserve the key information of the identify label correspondence of described subscriber equipment, return the message that succeeds in registration to described subscriber equipment, make described subscriber equipment preserve described key information and visit non-IMS territory application server according to described key information.
Preferably, described authentication gateway also comprises:
Generation module is used to generate public private key pair, preserves the private cipher key in the described public private key pair, uses for described deciphering module, and discloses Public key in the described public private key pair to described subscriber equipment.
The embodiment of the invention also provides a kind of identity authorization system, comprising:
Subscriber equipment is used for sending access request to non-IMS territory application server, and receives the challenge message that described non-IMS territory application server returns; Identify label and described key information according to self return challenge responses message to described non-IMS territory application server;
Non-IMS territory application server, be used for submitting to the identify label of subscriber equipment to authentication gateway, reception uses the term of validity of described key information and described key information and described subscriber equipment to carry out authentication from the term of validity of the key information and the described key information of described authentication gateway;
Authentication gateway is used to receive the identify label of the subscriber equipment that described non-IMS territory application server submits to, whether has the key information of described identify label correspondence and described key information before the deadline according to described identify label inquiry; If have the key information of described identify label correspondence and described key information before the deadline, whether then inquire about described subscriber equipment is registered state in the IMS territory, if Query Result is for being then to return the term of validity of described key information and described key information to described non-IMS territory application server.
Preferably, described authentication gateway also is used to receive the Session initiation Protocol sip message from subscriber equipment, obtains the registration parameter of carrying in the described sip message, and described registration parameter is generated according to Public key by described subscriber equipment; Use the private cipher key of self preserving that the described registration parameter of obtaining is decrypted, if successful decryption, then preserve the key information of the identify label correspondence of described subscriber equipment, return the message that succeeds in registration to described subscriber equipment, make described subscriber equipment preserve described key information and visit non-IMS territory application server according to described key information.
Preferably, described subscriber equipment also is used to carry out the IMS authorizing procedure, registers in the IMS territory; When use in the non-IMS of visit territory, check whether this locality exists key information, if there is no, then generates key information at random, and generate the registration parameter, and send described registration parameter by sip message according to described key information and Public key.
Compared with prior art, the embodiment of the invention has the following advantages: the embodiment of the invention is utilized the existing security mechanism of IMS, for operation layer provides security service, has strengthened the fail safe between UE and the AS, and can not become the security bottleneck of system; In the term of validity of key information, do not need to repeat registration process, improved professional execution efficient.
Embodiment
In the technical scheme that the embodiment of the invention provides, there is the SIP interface in its core concept for to increase AUG (authentication gateway) network element in system between the CSCF in this AUG network element and IMS territory, and has the HTTP interface between the AS in non-IMS territory.The AUG network element receives the identify label of the subscriber equipment that non-IMS territory application server submits to, whether has the key information of described identify label correspondence and described key information before the deadline according to described identify label inquiry; If have the key information of described identify label correspondence and described key information before the deadline, whether then inquire about described subscriber equipment is registered state in the IMS territory, if Query Result is for being, then return the term of validity of described key information and described key information, make described non-IMS territory application server use the term of validity of described key information and described key information and described subscriber equipment to carry out authentication to described non-IMS territory application server.
Below in conjunction with the accompanying drawing in the embodiment of the invention, the technical scheme of the embodiment of the invention is clearly and completely described, obviously, described embodiment is the present invention's part embodiment, rather than whole embodiment.Based on the embodiment among the present invention, those of ordinary skills belong to the scope of protection of the invention not making the every other embodiment that is obtained under the creative work prerequisite.
As shown in Figure 1, a kind of identity identifying method flow chart in the embodiment of the invention may further comprise the steps:
Step 101 receives the identify label of the subscriber equipment that non-IMS territory application server submits to, whether has the key information of described identify label correspondence and described key information before the deadline according to described identify label inquiry.If have the key information of described identify label correspondence and described key information before the deadline, then execution in step 103; Otherwise, execution in step 102.
Particularly, authentication gateway generates public private key pair in advance, preserves the private cipher key in this public private key pair, and the Public key in the open public private key pair of subscriber equipment.
Described subscriber equipment is carried out the IMS authorizing procedure, registers in the IMS territory; When use in the non-IMS of user equipment access territory, check whether this locality exists key information, if there is no, then generates key information at random, and generate the registration parameter, and send described registration parameter by sip message according to described key information and Public key.
Authentication gateway receives the Session initiation Protocol sip message from subscriber equipment, obtains the registration parameter of carrying in the described sip message, and described registration parameter is generated according to Public key by described subscriber equipment; Use the private cipher key of self preserving that the described registration parameter of obtaining is decrypted, if successful decryption, then preserve the key information of the identify label correspondence of described subscriber equipment, return the message that succeeds in registration to described subscriber equipment, make described subscriber equipment preserve described key information and visit non-IMS territory application server according to described key information.
Above-mentioned subscriber equipment is visited non-IMS territory application server according to key information, specifically comprises: subscriber equipment sends access request to described non-IMS territory application server, and receives the challenge message that described non-IMS territory application server returns; Subscriber equipment returns challenge responses message according to self identify label and described key information to described non-IMS territory application server.
Step 102, application server returns error message to non-IMS territory.
Whether step 103, inquiring about described subscriber equipment is registered state in the IMS territory.
If Query Result is for being that then execution in step 104; Otherwise, execution in step 102.
Step 104 to the term of validity of non-IMS territory application server " return " key" information and this key information, makes non-IMS territory application server use the term of validity and the subscriber equipment of key information and this key information to carry out authentication.
Particularly, above-mentioned non-IMS territory application server uses the term of validity and the subscriber equipment of key information and key information to carry out authentication, specifically comprise: whether non-IMS territory application server uses described key information checking correct from the challenge responses message of described subscriber equipment, if correct, then to described subscriber equipment return authentication success message; Subscriber equipment receives the authentication success message from described non-IMS territory application server, verify whether the authentication information that comprises in the described authentication success message is correct, if it is correct, then finish the two-way authentication with described non-IMS territory application server, undertaken alternately by escape way and described non-IMS territory application server.
The embodiment of the invention is utilized the existing security mechanism of IMS, for operation layer provides security service, has strengthened the fail safe between UE and the AS, and can not become the security bottleneck of system; In the term of validity of key information, do not need to repeat registration process, improved professional execution efficient.
Below in conjunction with concrete application scenarios the identity identifying method in the embodiment of the invention is described in detail.
As shown in Figure 2, the flow for authenticating ID figure in the embodiment of the invention application scenarios specifically may further comprise the steps:
Step 201, UE starts the non-IMS of non-IMS client-access territory application server AS 2, sends HTTP Request (request) message to AS2.
Wherein, non-IMS territory application server AS 2 can be http server, and HTTP Request message is without IMS core.
Step 202, AS2 initiates HTTP Digest two-way authentication, returns challenge information to UE.
Particularly, after AS2 receives HTTP Request message, requirement is carried out HTTP Digest two-way authentication to UE, returns the HTTP Digest challenge message of 401 unauthorized, and the WWW-Authenticate Header parameter in this challenge message comprises the challenge information of AS2 to UE.
Step 203, UE returns challenge responses message to AS2.
Particularly, UE is with IMPU (IP Multimedia Public Identity, the internet protocol multi-media public identifier) as username (user name), key (key) calculates response (response) as password (password), return the challenge responses message that comprises response by HTTP request, the Authorization in this response message (authentication) Parameter H eader comprises the challenge responses of UE.
Step 204, AS2 submits IMPU to AUG, the state of UE in the IMS territory and relevant key information of inquiry IMPU correspondence.
Step 205, whether AUG is by IMPU inquiry UE at this locality registration and key before the deadline.If Query Result is for being that then execution in step 206; Otherwise, return error message to AS2.
Step 206, whether AUG is registered to the login state of HSS inquiry UE.If Query Result is for being, then execution in step 207, if Query Result then returns error message to AS2 for not.
Step 207, AUG returns the key and the key term of validity to AS2.
Step 208, whether AS2 uses the key checking correct from the response in the challenge responses message of UE, if correct, then execution in step 210; Otherwise return error message to UE.
Step 209, AS2 is to UE return authentication success message.
Particularly, if AS2 checking response is correct, shows then and passed through the UE access that AS2 calculates challenge responses, returns 200OK message to UE, the Authentication-InfoHeader parameter in the 200OK message comprises the challenge responses of AS2.
Step 210, whether UE authentication verification success message is correct, if correct, then execution in step 211; Otherwise, return error message to AS2.
Particularly, whether UE checking Authentication-Info Header parameter is correct.
Step 211, UE and AS2 finish two-way authentication, and escape way and AS2 by HTTP Digest carry out alternately.
The embodiment of the invention is utilized the existing security mechanism of IMS, for operation layer provides security service, has strengthened the fail safe between UE and the AS, and can not become the security bottleneck of system; In the term of validity of key information, do not need to repeat registration process, improved professional execution efficient.
Before above-mentioned application scenarios, UE needs earlier to the AUG registration, so that visit non-IMS territory application server.As shown in Figure 3, the AUG register flow path figure in the embodiment of the invention application scenarios specifically may further comprise the steps:
Step 301, UE starts the IMS client, carries out the IMS authorizing procedure, carries out the IMS registration.
Particularly, the user opens the IMS client, login IMS net, and the IMS client can be carried out the IMS authorizing procedure between UE, CSCF, HSS, and finishes the IMS registration.
Step 302, UE and IMS application service AS1 carry out alternately.
Step 303, the IMS client of UE trigger the non-IMS of visit and use.
Step 304, UE checks whether this locality exists key and key before the deadline, if check result is for being that then execution in step 310; Otherwise execution in step 305.
Step 305, UE generates key at random, PubKey (Public key) the encryption generation Ekey=E of use AUG (PubKey, key).
Wherein, E is the cryptographic algorithm of RSA, AUG generates the RSA (Rivest-Shamir-Adleman of 1024bits in advance, public key algorithm) public private key pair, this public private key pair comprises PriKey (private cipher key) and PubKey, the secret PriKey that preserves of AUG, and openly give the IMS client with PubKey and be preset among the UE.
Step 306, UE sends to AUG with Ekey as the parameter of AUG registration message by sip message, request AUG registration.
Step 307, AUG uses PriKey deciphering Ekey, if successful decryption, then execution in step 309; Otherwise, return error message to UE.
Step 308, AUG preserves the key of the IMPU correspondence of UE, and returns sip 200OK message to UE.
Step 309, UE preserves key as the interim secret parameter of communicating by letter with AUG.
Step 310, UE starts non-IMS client-access AS2, sends HTTP Request message to AS2.
The embodiment of the invention is utilized the existing security mechanism of IMS, for operation layer provides security service, has strengthened the fail safe between UE and the AS, and can not become the security bottleneck of system; In the term of validity of key information, do not need to repeat registration process, improved professional execution efficient.
The embodiment of the invention provides identity identifying method and application scenarios in the above-described embodiment, and correspondingly, the embodiment of the invention also provides device and the system that uses above-mentioned identity identifying method.
As shown in Figure 4, a kind of authentication gateway structural representation in the embodiment of the invention comprises:
Receiver module 410 is used to receive the identify label of the subscriber equipment that non-IMS territory application server submits to.
Above-mentioned receiver module 410 also is used to receive the sip message from subscriber equipment, obtains the registration parameter of carrying in the described sip message, and described registration parameter is generated according to Public key by described subscriber equipment.
Enquiry module 420, whether the identify label inquiry that is used for receiving according to receiver module 410 exists the key information of described identify label correspondence and described key information before the deadline, whether inquiring the key information that there is described identify label correspondence and described key information before the deadline the time, inquiring about described subscriber equipment is registered state in the IMS territory.
Sending module 430, be used for inquiring described subscriber equipment when being registered state in the IMS territory at enquiry module 420, return the term of validity of described key information and described key information to described non-IMS territory application server, make described non-IMS territory application server use the term of validity of described key information and described key information and described subscriber equipment to carry out authentication.
Above-mentioned sending module 430, also be used for when described deciphering module 440 successful decryptions, preserve the key information of the identify label correspondence of described subscriber equipment, return the message that succeeds in registration to described subscriber equipment, make described subscriber equipment preserve described key information and visit non-IMS territory application server according to described key information.Generation module generates public private key pair, preserves the private cipher key in the described public private key pair, for described deciphering module use, and discloses Public key in the described public private key pair to described subscriber equipment.
Deciphering module 440 is used to use the private cipher key of self preserving that the registration parameter that described receiver module 410 obtains is decrypted.
Generation module 450 is used to generate public private key pair, preserves the private cipher key in the described public private key pair, uses for described deciphering module 440, and discloses Public key in the described public private key pair to described subscriber equipment.
The embodiment of the invention is utilized the existing security mechanism of IMS, for operation layer provides security service, has strengthened the fail safe between UE and the AS, and can not become the security bottleneck of system; In the term of validity of key information, do not need to repeat registration process, improved professional execution efficient.
As shown in Figure 5, a kind of identity authorization system structural representation in the embodiment of the invention comprises:
Subscriber equipment 510 is used for sending access request to non-IMS territory application server 520, and receives the challenge message that described non-IMS territory application server 520 returns; Identify label and described key information according to self return challenge responses message to described non-IMS territory application server 520.
Above-mentioned subscriber equipment 510 also is used to carry out the IMS authorizing procedure, registers in the IMS territory; When use in the non-IMS of visit territory, check whether this locality exists key information, if there is no, then generates key information at random, and generate the registration parameter, and send described registration parameter by sip message according to described key information and Public key.
Non-IMS territory application server 520, be used for submitting to the identify label of subscriber equipment to authentication gateway 530, reception uses the term of validity of described key information and described key information and described subscriber equipment 510 to carry out authentication from the term of validity of the key information and the described key information of described authentication gateway 530.
Authentication gateway 530 is used to receive the identify label of the subscriber equipment 510 that described non-IMS territory application server 520 submits to, whether has the key information of described identify label correspondence and described key information before the deadline according to described identify label inquiry; If have the key information of described identify label correspondence and described key information before the deadline, whether then inquire about described subscriber equipment 510 is registered state in the IMS territory, if Query Result is for being then to return the term of validity of described key information and described key information to described non-IMS territory application server 520.
Above-mentioned authentication gateway 530 also is used to receive the sip message from subscriber equipment 510, obtains the registration parameter of carrying in the described sip message, and described registration parameter is generated according to Public key by described subscriber equipment 510; Use the private cipher key of self preserving that the described registration parameter of obtaining is decrypted, if successful decryption, then preserve the key information of the identify label correspondence of described subscriber equipment 510, return the message that succeeds in registration to described subscriber equipment 510, make described subscriber equipment 510 preserve described key information and visit non-IMS territory application server according to described key information.
The embodiment of the invention is utilized the existing security mechanism of IMS, for operation layer provides security service, has strengthened the fail safe between UE and the AS, and can not become the security bottleneck of system; In the term of validity of key information, do not need to repeat registration process, improved professional execution efficient.
Through the above description of the embodiments, those skilled in the art can be well understood to the present invention and can realize by the mode that software adds essential general hardware platform, can certainly pass through hardware, but the former is better execution mode under a lot of situation.Based on such understanding, the part that the technical scheme of the embodiment of the invention contributes to prior art in essence in other words can embody with the form of software product, this computer software product is stored in the storage medium, comprise that some instructions are with so that a station terminal equipment (can be mobile phone, personal computer, server, the perhaps network equipment etc.) carry out the described method of each embodiment of the present invention.
The above only is a preferred implementation of the present invention; should be pointed out that for those skilled in the art, under the prerequisite that does not break away from embodiment of the invention principle; can also make some improvements and modifications, these improvements and modifications also should be looked protection scope of the present invention.
It will be appreciated by those skilled in the art that the module in the device among the embodiment can be distributed in the device of embodiment according to the embodiment description, also can carry out respective change and be arranged in the one or more devices that are different from present embodiment.The module of the foregoing description can be integrated in one, and also can separate deployment; A module can be merged into, also a plurality of submodules can be further split into.
The invention described above embodiment sequence number is not represented the quality of embodiment just to description.
More than disclosed only be several specific embodiment of the present invention, still, the present invention is not limited thereto, any those skilled in the art can think variation all should fall into protection scope of the present invention.