User authentication method and user authentication device

An authentication and user technology, applied in the field of communication, can solve the problems of illegal access to the network, inability to detect cloned terminals, etc., and achieve the effect of avoiding illegal theft

Inactive Publication Date: 2010-03-17
ZTE CORP
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0016] The present invention is proposed in view of the problem that the current SSD update process cannot detect whether there is a clone terminal illegally accessing the network. Therefore, the present invention aims to provide a user authentication method and device to solve the above problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User authentication method and user authentication device
  • User authentication method and user authentication device
  • User authentication method and user authentication device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0048] According to an embodiment of the present invention, a user authentication device is provided. figure 2 is a structural block diagram of a user authentication device according to an embodiment of the present invention, such as figure 2 As shown, the device includes: a first setting module 202, a second setting module 204, a first judging module 206, a second judging module 208, a receiving module 210, an authentication module 212, and an arbitration module 214. The above-mentioned structure is carried out below A detailed description.

[0049] The first setting module 202 is used for setting the SSD automatic update period of the calling user in advance.

[0050] The second setting module 204 is configured to set the calling user to cancel the SSD sharing after the last update time of the calling user's SSD exceeds the update period.

[0051] The first judging module 206 is connected to the first setting module 202, and is used for judging whether the last update ti...

Embodiment 2

[0064] According to an embodiment of the present invention, an HLR / AUC is also provided. Figure 4 is a structural block diagram of HLR / AUC according to an embodiment of the present invention, such as Figure 4 As shown, the HLR / AUC includes: a first setting module 402, a second setting module 404, a first judging module 406, a second judging module 408, a receiving module 410, an authentication module 412, an update instruction module 414, and an arbitration module 416 , the above structure will be described in detail below.

[0065] The first setting module 402 is used to preset the SSD automatic update period of the calling user;

[0066] The second setting module 404 is used to set the calling user to cancel SSD sharing after the last update time of the SSD of the calling user exceeds the update cycle;

[0067] The first judging module 406 is connected to the first setting module 402, and is used to judge whether the last update time of the calling user's SSD exceeds the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a user authentication method and a user authentication device, which are applied to a network environment comprising a home location register / authentication center, a mobile switching center / visited location register, and user equipment taken as a calling user. The method comprises that: an update period of the shared confidential data of the calling user is preset; after returning the position information about a called user to the calling user by the home location register / authentication center, and if the last update time of the shared confidential data of the calling user exceeds the update period and the calling user is preset to cancel the share of the shared confidential data after the last update time exceeds the update period, the home location register / authentication center receives an authentication request transmitted by the calling user via the mobile switching center / visited location register, and authenticates the calling user; and if the callinguser does not pass the authentication and does not access a network for the first time, the calling user is determined to be illegally cloned. The user authentication method and the user authentication device prevent the user from being illegally embezzled for a long time.

Description

technical field [0001] The present invention relates to the communication field, in particular to a user authentication method and device. Background technique [0002] In a Code Division Multiple Access (CDMA for short) network, the Home Location Register (Home Location Register, HLR for short) / Authentication Center (AUC for short) and the terminal device record the / AUC The shared secret data (Shared SecretData, referred to as SSD) of the mobile user who places the number, the SSD is used for the calculation of the authentication result (AUTHR) by the network and the terminal device in the authentication process (AUTHREQ), and for the terminal device Carry out legality checks and reject illegal users from accessing the network. [0003] For the SSD, when the terminal device accesses the network for the first time and the authentication fails, it can be selectively updated, or the network side can actively trigger the SSD update. In the case of successful authentication, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/02H04W12/06H04W12/63
Inventor 陈继华张田生张振华
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products