A method and device for realizing authentication

An authentication and authentication vector technology, applied in the field of communication, can solve the problems of unfavorable terminals for normal communication, reduce user satisfaction, authentication failure, etc., and achieve benefits for normal communication, avoid authentication failure, and improve user satisfaction Effect

Inactive Publication Date: 2015-09-16
ZTE CORP
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0022] Visible, in figure 2 In the scenario shown, during the terminal authentication process, an unnecessary authentication failure will be caused due to failure to obtain a suitable authentication vector
This is obviously not conducive to the normal communication of the terminal and reduces user satisfaction

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for realizing authentication
  • A method and device for realizing authentication
  • A method and device for realizing authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] In practical applications, under the condition of mixed networking, if the authentication vector obtained by 2G&3G MSC / VLR from 2GMSC / VLR is a triplet, in order to reduce the probability of subsequent authentication failure, 2G&3GMSC / VLR can follow the following principles for The authentication vector is processed:

[0049] When the terminal is a 3G terminal and accesses through the 2G network, the 2G&3G MSC / VLR can set the authentication vector acquisition flag related to the user to indicate that the terminal has stored the authentication vector due to the 2G network access. When a terminal roams to a 3G network and accesses a 2G&3G MSC / VLR, it can be judged whether the terminal is set with an authentication vector acquisition flag. If so, it means that the authentication vector stored for the terminal is an inapplicable triplet. Therefore, the authentication vector is directly deleted, and the authentication vector acquisition flag can be cleared, and then the authe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a method and device for realizing authentication, each of them can append an authentication vector obtaining tag to a terminal which has been allocated with a low grade authentication vector; when the terminal accesses to a high level network, a high grade authentication vector applicable to the high level network is obtained according to the authentication vector obtaining tag of the terminal. Both of the method and device for realizing authentication in the present invention can avoid meaningless authentication failure, contribute to the normal communication of the terminal, and improve the user satisfaction.

Description

technical field [0001] The invention relates to the communication field, in particular to a method and device for realizing authentication. Background technique [0002] Although 3G networks are gradually becoming popular, operators usually adopt a gradual transition strategy due to market and cost considerations, resulting in the joint networking of 2G&3G Mobile Switching Center / Visitor Location Register (MSC / VLR). In the transitional mobile communication network, the original 2G MSC / VLR and the new 2G&3G MSC / VLR hybrid network usually appear. [0003] Under the above network conditions, the terminal can roam from 2G MSC / VLR to 2G&3G MSC / VLR, and also can roam from 2G network to 3G network in 2G&3G MSC / VLR. During roaming, the MSC / VLR needs to handle the authentication process. There are two key points in handling the authentication process: the first is to obtain and save the authentication vector, and the second is to select the correct authentication vector to initiate...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/06
CPCH04W12/06H04W12/08H04L63/105
Inventor 胡帅来
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products