Method and device for authorizing userí»s terminal in CDMA system

A user terminal, authentication technology, applied in the field of communication, can solve the problem of not finding relevant methods and so on

Active Publication Date: 2007-12-26
ZTE CORP
View PDF0 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] Through searching, no relevant methods to solve the above problems have been found so far

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for authorizing userí»s terminal in CDMA system
  • Method and device for authorizing userí»s terminal in CDMA system
  • Method and device for authorizing userí»s terminal in CDMA system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] Please refer to FIG. 1 , which is a network structure diagram of an existing CDMA system. The structure includes: user terminal MS (Mobile Station) 11, Radio Access Network / Packet Control Function (Radio AccessNetwork / Packet Control Function, RAN / PCF) 12, Mobile Switch Center / Visit Location Register (Mobile Switch Center / Visit Location Register) , MSC / VLR) 13, packet data serving node PDSN 14, authentication, authorization and accounting server AAA 15.

[0035] MS 11 uses a public account to access the CDMA packet domain.

[0036] RAN / PCF 12 forwards the user's data service access request to PDSN 14 .

[0037] PDSN 14 provides data access service for MS 11, and provides authentication for the user when MS 11 accesses. At the same time, PDSN 14 collects user charging information when providing data access service for MS 11. The PDSN 14 is connected to a home agent HA (HomeAgent) 18 through an IP (Internal Protocol, Internet Protocol) network 19 .

[0038] MSC / VLR 13 pro...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The method comprises: user end requests to access the general packet radio service (GPRS) network; the GPRS node determines what authentication treatment will be made for the user end, and sends request message containing the ID of user's access network and the ID of user to authentication, authorization and accounting (AAA) server; said AAA server looks up the account information about relevant UE according to user's ID, and based on the ID of user's access network makes authentication process for the UE, and returns the authentication result to said GPRS node; according to the authentication result, said GPRS node determines whether or not providing the data service for the UE.

Description

technical field [0001] The invention relates to a user authentication method in the communication field, in particular to a method and a device for authenticating a user accessing with a public account in a CDMA (Code Division Multiple Access, Code Division Multiple Access) system. Background technique [0002] The CDMA system has been developed for more than 20 years and is now widely used all over the world. Because of its high bandwidth and smooth transition characteristics, the CDMA system has great advantages in the development of data services. With the development of data services, various demands have emerged, such as BREW (Binary Runtime Environment for Wireless, wireless binary operating environment) services, WAP (Wireless Application Protocol, wireless application protocol) services, and the like. Carrying out these services involves the authentication problem of user terminal data service access. [0003] In the field of data communication, NAI (Network Access...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04M17/00H04Q7/38H04W12/06
CPCH04L63/08
Inventor 许秀莉
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products