Method for performing mobile equipment local authentication in third-generation mobile communication system

A mobile communication system and mobile device technology, applied in the field of local authentication of mobile devices, can solve problems such as waste of resources, network congestion, etc., achieve the effects of saving costs, meeting user needs, and avoiding the number of times of local authentication

Active Publication Date: 2012-06-27
SPREADTRUM COMM (SHANGHAI) CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Because UTRAN performs local authentication for many users at the same time, network resources will be greatly wasted at this time, making the network suddenly congested and putting a lot of pressure on the network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for performing mobile equipment local authentication in third-generation mobile communication system
  • Method for performing mobile equipment local authentication in third-generation mobile communication system
  • Method for performing mobile equipment local authentication in third-generation mobile communication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] In order to understand the technical content of the present invention more clearly, the following examples are given in detail.

[0048] see Figure 2 to Figure 4 As shown, the method for performing local authentication of mobile equipment in the third generation mobile communication system includes the following steps:

[0049] (1) Establish a part of the observable Markov decision process system model according to the local authentication process, and determine the information state space of the system model and the information state of the system at each discrete time point, including the following steps:

[0050] (a) Determine the information state π of the system model according to the following formula n :

[0051] π n (i)=P(ξ n =i|Y(n)), i=1, 2,..., N,

[0052] π n (1)+π n (2)+...+π n (N)=1,0≤π n (i)≤1,

[0053] Among them, n is the time point, ξ n is the state of the mobile device at time point n, i is a vector in the state space {1, 2, ..., N}, N is ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method for performing mobile equipment local authentication in a third-generation mobile communication system, which comprises the following steps: building a partially observable Markovian decision process system model and determining information state space and information states at all discrete time points; building an accumulated cost model and calculating a mappingrelationship between the information states and an optimal local authentication policy; obtaining the optimal local authentication policy based on historical information and scheduling to perform thenext time of authentication; observing result information on the next time point; and updating a system information state and judging authentication result accordingly. The method for performing the mobile equipment local authentication in the third-generation mobile communication system optimizes system performance, satisfies the demands of clients having high requirements on the safety of mobile equipment, optimally determines whether to perform a local authentication process, saves system resources and system operation cost, has stable and reliable operation performance and wide application range, and lays a firm foundation for the further development of information safety technology of the mobile equipment.

Description

technical field [0001] The present invention relates to the field of mobile communication system information security, in particular to the technical field of mobile equipment information security management in the mobile communication system, and specifically refers to a method for performing local authentication of mobile equipment in the third generation mobile communication system. Background technique [0002] Authentication is used to identify the identity of the user, and one or more identification methods can be used: such as passwords, tokens, and user biometrics. Biometrics are divided into static biometrics and dynamic biometrics, such as fingerprints, retina, etc. It belongs to static biological characteristics, while facial expressions, body movements, etc. belong to dynamic biological characteristics. Password authentication is relatively simple and easy to use. Since there is no direct relationship between the password and the user itself, it cannot be sure th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/06H04W76/04G06F17/50
Inventor 于非宁涛鞠亮吴天明王韬喻仲文
Owner SPREADTRUM COMM (SHANGHAI) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products