Method for performing mobile equipment local authentication in third-generation mobile communication system

A mobile communication system and mobile device technology, applied in the field of local authentication of mobile devices, can solve problems such as network congestion and resource waste, and achieve the effects of satisfying user needs, saving costs, and having stable and reliable performance.

Active Publication Date: 2010-01-20
SPREADTRUM COMM (SHANGHAI) CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Because UTRAN performs local authentication for many users at the same time, network resources will be grea

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for performing mobile equipment local authentication in third-generation mobile communication system
  • Method for performing mobile equipment local authentication in third-generation mobile communication system
  • Method for performing mobile equipment local authentication in third-generation mobile communication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] In order to understand the technical content of the present invention more clearly, the following embodiments are given for detailed description.

[0048] see Figure 2 to Figure 4 As shown, the method for local authentication of mobile equipment in the third-generation mobile communication system includes the following steps:

[0049] (1) Establish a partial observable Markov decision process system model according to the local authentication process, and determine the information state space of the system model and the information state of the system at each discrete time point, including the following steps:

[0050] (a) Determine the information state π of the system model according to the following formula n :

[0051] pi n (i)=P(ξ n =i|Y(n)), i=1,2,...,N,

[0052] pi n (1)+π n (2)+…+π n (N)=1, 0≤π n (i)≤1'

[0053] where n is the time point, ξ n is the mobile device state at time point n, i is a vector in the state space {1, 2, ..., N}, N is the total n...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method for performing mobile equipment local authentication in a third-generation mobile communication system, which comprises the following steps: building a partially observable Markovian decision process system model and determining information state space and information states at all discrete time points; building an accumulated cost model and calculating a mapping relationship between the information states and an optimal local authentication policy; obtaining the optimal local authentication policy based on historical information and scheduling to perform the next time of authentication; observing result information on the next time point; and updating a system information state and judging authentication result accordingly. The method for performing the mobile equipment local authentication in the third-generation mobile communication system optimizes system performance, satisfies the demands of clients having high requirements on the safety of mobile equipment, optimally determines whether to perform a local authentication process, saves system resources and system operation cost, has stable and reliable operation performance and wide application range, and lays a firm foundation for the further development of information safety technology of the mobile equipment.

Description

technical field [0001] The invention relates to the field of information security of mobile communication systems, in particular to the technical field of information security management of mobile devices in mobile communication systems, and particularly to a method for local authentication of mobile devices in a third-generation mobile communication system. Background technique [0002] Authentication is used to identify the user's identity and can use one or more identification methods: such as passwords, tokens, and the user's biometrics. Biometrics are divided into static biometrics and dynamic biometrics, such as fingerprints, retina, etc. It belongs to static biometrics, while facial expressions, body movements, etc. belong to dynamic biometrics. Password authentication is relatively simple and easy to use. Since there is no direct correlation between the password and the user itself, it cannot be determined that the user who entered the password is the user himself. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/06H04W76/04G06F17/50
Inventor 于非宁涛鞠亮吴天明王韬喻仲文
Owner SPREADTRUM COMM (SHANGHAI) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products