Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Application service access authentication method and application service access authentication agent

A technology for application services and authentication, applied in the field of communications, can solve problems such as unfavorable development of telecom value-added services, restricting the openness of telecom business capabilities, major security risks and performance pressures, etc., to reduce performance burden, expand scope, and improve security. Effect

Inactive Publication Date: 2013-01-23
深圳市智通天下科技服务有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, limit the number of times the SP or the application service of the SP can be used within a specified time, etc.
[0008] In the process of realizing the present invention, the inventor finds that there are at least the following problems in the above prior art: according to the existing authentication method, only the access of the SP can be authenticated, so the application service developer (or individual) must first Applying to become an SP can access the telecommunications network, which largely limits the openness of telecommunications business capabilities and is not conducive to the development of telecommunications value-added services
In addition, exposing the telecommunications service capability interface functional entity (such as OSG) directly to the public network also has great security risks and performance pressures.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application service access authentication method and application service access authentication agent
  • Application service access authentication method and application service access authentication agent
  • Application service access authentication method and application service access authentication agent

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] First, the application service access authentication method in the embodiment of the present invention is described:

[0023] After registering the application service and obtaining the password of the application service, the method includes:

[0024] Receive the access request sent by the provider of the registered application service, the access request carries the password of the application service, and perform access authentication on the application service according to the password of the application service.

[0025] Embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0026] figure 1 Shown is the flow chart of the method provided by the embodiment of the present invention, which specifically includes the following steps:

[0027] S101. The application service provider sends an application service registration request to the application service access authentication agent, where the registrati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An application service accessing authenticity method and an application service accessing authenticity agent server are provided. The application service accessing authenticity method includes: an access request transmitted from the registered application service provider terminal is received after registering an application service and obtaining the password of the application service, the password of the application service is carried on the access request, and access authenticity to the application service is preformed based on the password of the application service. The application of the above technique scheme can realize the access authenticity of the single application service, extend the scope of the access authenticity, and increase the open size of the telecommunication service ability.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to an application service access authentication method and an access authentication agent. Background technique [0002] With the development of telecommunication technology, the increasingly open telecommunication service market is constantly entering new competitors. In order to find new business development space, telecommunication operators have begun to provide ICT (Information Communication Technology, information and communication technology) services. ICT is a new concept and a new technical field formed by the integration of information technology and communication technology. The development of ICT business has become the consensus of information service providers and telecom operators. The key to ICT services is how to better open up telecommunication capabilities, so that telecommunication capabilities can be more conveniently and easily combined with rich applic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/08H04L29/06H04L29/12
CPCH04L63/083
Inventor 王伟
Owner 深圳市智通天下科技服务有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products