Unlock instant, AI-driven research and patent intelligence for your innovation.
User authentication method and user authentication device
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
An authentication and user technology, applied in the field of communication, can solve problems such as illegal access to the network, failure to detect clone terminals, etc., and achieve the effect of avoiding illegal embezzlement
Inactive Publication Date: 2013-03-27
ZTE CORP
View PDF0 Cites 0 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
[0016] The present invention is proposed in view of the problem that the current SSD update process cannot detect whether there is a clone terminal illegally accessing the network. Therefore, the present invention aims to provide a user authentication method and device to solve the above problems
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
Embodiment 1
[0048] According to an embodiment of the present invention, a user authentication device is provided. figure 2 is a structural block diagram of a user authentication device according to an embodiment of the present invention, such as figure 2 As shown, the device includes: a first setting module 202, a second setting module 204, a first judging module 206, a second judging module 208, a receiving module 210, an authentication module 212, and an arbitration module 214. The above-mentioned structure is carried out below A detailed description.
[0049] The first setting module 202 is used for setting the SSD automatic update period of the calling user in advance.
[0050] The second setting module 204 is configured to set the calling user to cancel the SSD sharing after the last update time of the calling user's SSD exceeds the update period.
[0051] The first judging module 206 is connected to the first setting module 202, and is used for judging whether the last update ti...
Embodiment 2
[0064] According to an embodiment of the present invention, an HLR / AUC is also provided. Figure 4 is a structural block diagram of HLR / AUC according to an embodiment of the present invention, such as Figure 4 As shown, the HLR / AUC includes: a first setting module 402, a second setting module 404, a first judging module 406, a second judging module 408, a receiving module 410, an authentication module 412, an update instruction module 414, and an arbitration module 416 , the above structure will be described in detail below.
[0065] The first setting module 402 is used to preset the SSD automatic update period of the calling user;
[0066] The second setting module 404 is used to set the calling user to cancel SSD sharing after the last update time of the SSD of the calling user exceeds the update period;
[0067] The first judging module 406 is connected to the first setting module 402, and is used to judge whether the last update time of the calling user's SSD exceeds th...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
PUM
Login to View More
Abstract
The invention discloses a user authentication method and a user authentication device, which are applied to a network environment comprising a home location register / authentication center, a mobile switching center / visited location register, and user equipment taken as a calling user. The method comprises that: an update period of the shared confidential data of the calling user is preset; after returning the position information about a called user to the calling user by the home location register / authentication center, and if the last update time of the shared confidential data of the calling user exceeds the update period and the calling user is preset to cancel the share of the shared confidential data after the last update time exceeds the update period, the home location register / authentication center receives an authentication request transmitted by the calling user via the mobile switching center / visited location register, and authenticates the calling user; and if the callinguser does not pass the authentication and does not access a network for the first time, the calling user is determined to be illegally cloned. The user authentication method and the user authentication device prevent the user from being illegally embezzled for a long time.
Description
technical field [0001] The present invention relates to the communication field, in particular to a user authentication method and device. Background technique [0002] In a Code Division Multiple Access (CDMA for short) network, the Home Location Register (Home Location Register, HLR for short) / Authentication Center (AUC for short) and the terminal device record the / AUC The shared secret data (Shared SecretData, referred to as SSD) of the mobile user who places the number, the SSD is used for the calculation of the authentication result (AUTHR) by the network and the terminal device in the authentication process (AUTHREQ), and for the terminal device Carry out legality checks and reject illegal users from accessing the network. [0003] For the SSD, when the terminal device accesses the network for the first time and the authentication fails, it can be selectively updated, or the network side can actively trigger the SSD update. In the case of successful authentication, ...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.