Method, device and system for preventing authentication vector from being abused
An authentication vector, user technology, applied in security devices, transmission systems, user identity/authority verification, etc., can solve problems such as user attacks and theft
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0025] Embodiment 1 of the present invention provides a method for preventing authentication vectors from being abused. It is assumed here that the user accesses the EPS through the Wimax network, such as figure 1 As shown, the method includes:
[0026] Step 101: When the user accesses the EPS through the Wimax network, connect to the AAA server through the interface between the trusted non-3GPP network and the AAA server. The AAA server reports the radio access technology (Radio Access Technology, RAT) of the non-3GPP network accessed by the user to the HSS. In this embodiment, the RAT indicates that the accessed non-3GPP network is a Wimax network.
[0027] In this embodiment, AAA may use letters or numbers to represent different RATs, or use other forms to represent. As long as it can represent the radio access technology of the non-3GPP network accessed by the user, there is no restriction on the specific form used to represent it.
[0028] In this embodiment, the AAA ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 