Method of authenticating request message and related equipment
A request message and authentication technology, applied in the field of communication, can solve the problems of increasing application response delay and many interactive messages, and achieve the effect of improving the speed and simplifying the authentication process.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0033] An embodiment of the present invention provides an authentication scheme for a request message, which will be described in detail below from the perspectives of an authentication service device, an application server, and a terminal.
[0034] The authentication method of the authentication service device for the request message in the embodiment of the present invention refers to FIG. 2 , including:
[0035] A1. Negotiate key information with the terminal, and assign an authentication transaction identifier and an authentication random number corresponding to the key information to the terminal.
[0036]This embodiment does not limit the key negotiation method between the authentication service device and the terminal, as long as the two parties can obtain the shared key information through negotiation, it is only necessary to expand the negotiation method used so that the authentication service can be The authentication random number allocated by the device is delivere...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 