Authentication implementing method and device

An implementation method and authentication technology, applied in the field of communication, can solve the problems of unsafe login, easy to steal of business accounts, etc., to achieve the effect of improving security and preventing easy to be stolen.

Active Publication Date: 2012-12-19
ZTE CORP
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] The present invention aims to provide a method and device for implementing authentication to solve the problem in the prior art that the business account is easily stolen, resulting in insecure login

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication implementing method and device
  • Authentication implementing method and device
  • Authentication implementing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The preferred embodiments of the present invention will be described below in conjunction with the accompanying drawings. It should be understood that the preferred embodiments described here are only used to illustrate and explain the present invention, and are not intended to limit the present invention.

[0031] Functional Overview

[0032] The main idea of ​​the present invention is: the AAA (Authentication Authorization and Accounting, authentication, authorization and accounting) server identifies the MS through the binding of the MS (Mobile Station, mobile terminal) and the service account, and then through the binding of the service account and the service certificate The service ordered by the user is identified by establishing a relationship, and the AAA server assigns the corresponding service to the MS.

[0033] method embodiment

[0034] According to an embodiment of the present invention, an authentication implementation method is provided.

[0035] fig...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an authentication realization method and device. The method comprises: AAA server receives access request from user device and authenticates the user device; on condition that user device passes authentication, AAA server authenticates service required by user device according to prestoring user equipment service. The invention can promotes safety of service account number.

Description

technical field [0001] The present invention relates to the communication field, in particular to a method and device for realizing authentication. Background technique [0002] The Worldwide Interoperability for Microwave Access (WiMAX for short) technology is based on a series of broadband wireless standards of IEEE802.16. On October 19, 2007, WiMAX was officially approved as the fourth global 3G standard after WCDMA, CDMA2000 and TD-SCDMA. [0003] WiMAX has the following advantages: [0004] 1. Achieve longer transmission distance. The wireless signal transmission distance that WiMAX can realize is unmatched by wireless local area networks. Only a few base stations can be built to cover the whole city, which greatly expands the scope of wireless network applications. [0005] 2. Provide higher-speed broadband access. It is understood that the highest access speed that WiMAX can provide is 70M. For wireless networks, this is indeed an amazing advancement. [0006] 3...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/06H04L9/32
Inventor 陈柱成
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products