Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Access authentication method and device

An access authentication and access request technology, applied in security devices, electrical components, wireless communications, etc., can solve the problem of complex access authentication process of user equipment, and achieve the goal of improving access authentication efficiency and shortening access authentication process. Effect

Active Publication Date: 2010-11-03
HUAWEI TECH CO LTD
View PDF1 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] In order to solve the problem of complicated user equipment access authentication process in the prior art, the embodiment of the present invention provides a kind of user equipment when the gateway requests access authentication again under the management of the same authentication and authentication server, the authentication and authentication server implements Method for rapid authentication and device for realizing the method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access authentication method and device
  • Access authentication method and device
  • Access authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The embodiment of the present invention provides an access authentication method and a device for realizing the method. In order to better understand the technical solutions of the embodiments of the present invention, the embodiments provided by the present invention will be described in detail below in conjunction with the accompanying drawings.

[0023] see figure 1 , figure 1 It is a flow chart of the first embodiment of the access authentication method of the present invention.

[0024] When the user equipment requests services from the packet data network under the management of the authentication and authorization server for the first time, an extended authentication protocol is used between the user equipment and the authentication and authorization server to carry out a complete authentication process.

[0025] Step 101: After the user equipment successfully passes the extended protocol authentication, assign an authorization code to the user equipment, the a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses access authentication method and device, wherein the access authentication method comprises the following steps of: after user equipment successfully passes extension protocol authentication, distributing an authorization code corresponding to user identification information to the user equipment, and sending successful extension protocol authentication information containing the authorization code to the user equipment; receiving the access request information of the user equipment, and authenticating the user equipment according to the authorization code contained in the access request information and the to user identification information. Thus, the quick authentication of the user equipment is realized, and the efficiency of access authentication is increased.

Description

technical field [0001] The invention relates to the technical field of mobile communication, in particular to an access authentication method and a device for realizing the method. Background technique [0002] In an existing mobile communication network, a user equipment (UE, User Equipment) can access the Internet through a packet data network, and browse information on the Internet. In order to ensure that only authorized user equipment can access the Internet through the packet data network, the mobile communication network needs to authenticate and authorize the user equipment. [0003] In the prior art, an Evolved Packet System (EPS, Evolved Packet System) provides a connection between user equipment and a packet data network. When a user equipment requests a packet data service through the S2c interface, it needs to be authenticated by a packet data network gateway (PDN GW, Packet Data Network Gateway) and an authentication authentication server (AAA Server, Authenti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/04H04W12/06H04W88/02H04W88/18H04L29/06H04W12/0431H04W12/069H04W12/08
Inventor 毕晓宇许怡娴陈璟赵曙光
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products