Access authentication method and device
An access authentication and access request technology, applied in security devices, electrical components, wireless communications, etc., can solve the problem of complex access authentication process of user equipment, and achieve the goal of improving access authentication efficiency and shortening access authentication process. Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0022] The embodiment of the present invention provides an access authentication method and a device for realizing the method. In order to better understand the technical solutions of the embodiments of the present invention, the embodiments provided by the present invention will be described in detail below in conjunction with the accompanying drawings.
[0023] see figure 1 , figure 1 It is a flow chart of the first embodiment of the access authentication method of the present invention.
[0024] When the user equipment requests services from the packet data network under the management of the authentication and authorization server for the first time, an extended authentication protocol is used between the user equipment and the authentication and authorization server to carry out a complete authentication process.
[0025] Step 101: After the user equipment successfully passes the extended protocol authentication, assign an authorization code to the user equipment, the a...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com