Method for applying general weight discrimination frame

An authentication and framework technology, applied in wireless communication, radio/inductive link selection arrangement, electrical components, etc., can solve the problems of spending storage resources and resource waste

Inactive Publication Date: 2007-12-12
HUAWEI TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to operations such as shutting down or reinserting the user identification card, the user identification card needs to repeatedly perform the operation of sending the key Ks_ext to the user terminal in mode 2, and the user terminal in mode 2 also needs to repeatedly perform the operat

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for applying general weight discrimination frame
  • Method for applying general weight discrimination frame

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] In order to make the technical solution of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0026] The idea of ​​the present invention is: after the user identification card calculates the required response value and key information for authentication, it judges whether the user terminal supports mode 2 according to the mode information supported by the user terminal that it has saved, and if not, it Actively send the key Ks_ext and the authentication response value to the user terminal, and continue the follow-up processing according to the mode 1, otherwise, only send the authentication response value to the user terminal, and when the user terminal needs to communicate with the NAF, the user identification The card clearly requests Ks_ext_NAF or Ks_int_NAF, and the corresponding calculation is completed by the user identification card, and the user terminal no longer partici...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention provides a method for applying the general authorization authentication frame including a user terminal tells a user ID card its won supported mode information, which judges if said user terminal supports mode 2, if not, it sends the cryptographic key information and authorization authentication response value to the used terminal actively and continues the succeeded process in terms of model, otherwise, it sends the response value to the user terminal only, when a user terminal needs to communicate with NAF, it tells the kind of the required cryptographic key to the user ID card, gets it from the card directly and will not participate in the computation, which reduces the redundant step between the user ID card and the user terminal supporting mode 2 to save resources of them.

Description

technical field [0001] The invention relates to the technical field of third-generation wireless communication, in particular to a method for applying a general authentication framework. Background technique [0002] In the third-generation wireless communication standard, the general authentication framework is a general structure used by various application business entities to complete the verification of user identities. The application of the general authentication framework can realize the inspection and verification of users of application services identity. The various application services mentioned above may be multicast / broadcast services, user certificate services, instant information provision services, etc., or proxy services. [0003] Figure 1 is a schematic structural diagram of a general authentication framework. The general authentication framework usually consists of a user 101 , an entity (BSF) 102 that performs initial check and verification of user ide...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04Q7/38H04W12/041H04W12/0431H04W12/06
Inventor 黄迎新
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products