Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and terminal unit for launching re-authentication answering to network side equipment

A technology of network side equipment and terminal equipment, which is applied in the field of communication, can solve problems such as interruption of data service connections, and achieve the effect of avoiding data connection interruption and improving user experience

Active Publication Date: 2011-04-13
HUAWEI DEVICE CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In some carrier network environments, after the network-side device establishes a data service connection, if it detects that the IP address of the host-side device is abnormal, it will initiate re-authentication of the host-side device. In the above-mentioned prior art solution, The host-side device will not respond to the re-authentication initiated by the network-side device, and the network-side device may interrupt the data service connection when the re-authentication request is not responded to. At this time, if the user wants to continue surfing the Internet, You need to re-initiate the dial-up connection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and terminal unit for launching re-authentication answering to network side equipment
  • Method and terminal unit for launching re-authentication answering to network side equipment
  • Method and terminal unit for launching re-authentication answering to network side equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0048] Embodiment 3 of the method for initiating re-authentication for network-side devices in the present invention; this embodiment provides a detailed implementation of the method for initiating re-authentication for network-side devices in the present invention. The method in this embodiment includes the following process:

[0049] C1. The terminal device receives a point-to-point protocol (Point-to-Point Protocol, PPP for short) packet from the network side device.

[0050]C2. The terminal device judges whether the protocol field of the PPP packet is a PPP challenge handshake authentication protocol (Challenge-Handshake Authentication Protocol, referred to as CHAP) authentication packet, if so, then execute C3; if not, then end the process of this method.

[0051] C3. The terminal device further judges whether the authentication packet received this time is an authentication request for the first time, and if so, execute step C4; if the authentication packet received this ...

Embodiment 4

[0064] Embodiment 4 of the method for initiating re-authentication for network-side devices in the present invention; the method of this embodiment includes the following procedures:

[0065] D1. The terminal device receives the authentication request from the network side device.

[0066] The authentication request received by the terminal device can be the first authentication request sent by the network side device according to the dial-up connection request initiated by the host side device, or it can be sent by the network side device after the first authentication of the host side device is passed. Re-authentication request.

[0067] D2. The terminal device judges whether the received authentication request is the first authentication request, if yes, execute step D3; if not, execute step D8.

[0068] In this embodiment, an authentication flag indicating whether it is the first authentication request can be maintained in the terminal device, and the terminal device can ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a communication technical filed, and discloses a method for re-authentication starting of a network lateral device and a terminal device thereof. The method of the invention includes that: an authentication request from the network lateral device is received; and stored authentication information is obtained if the authentication request is not a first authentication request; an authentication request response carrying the authentication information is generated and sent to the network lateral device. The method and the terminal device of the embodiment of the invention can avoid data connection interruption caused by failing to respond a re-authentication request started by the network lateral device, thus improving user experiences.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to a method and a terminal device for initiating re-authentication for a network side device. Background technique [0002] In recent years, it has become a very common application for a host-side device (such as a PC, etc.) to perform data services such as Internet access through a terminal device (such as a mobile phone, etc.). In this application, the user usually initiates a dial-up connection from the host-side device, and sends authentication information to the network-side device through the terminal device for the authentication request from the network-side device, and the network-side device Perform authentication, if the authentication is successful, establish a corresponding data service connection, and the host side device can access the Internet through the data service connection; after the data service connection is established, if there is no traffic ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L12/28
Inventor 汤昊
Owner HUAWEI DEVICE CO LTD