Supercharge Your Innovation With Domain-Expert AI Agents!

User authorization method, device and system

A technology of user authentication and user terminal, applied in the field of user authentication method, device and system

Active Publication Date: 2012-04-18
CHINA MOBILE COMM GRP CO LTD
View PDF3 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, after all, the Cookie-based solution requires the user to enter account information once when logging in for the first time to obtain the Cookie. Web authentication mechanism for user authentication, that is, for the cookie-based periodic authentication-free mechanism, the authentication efficiency and user experience still need to be further improved

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User authorization method, device and system
  • User authorization method, device and system
  • User authorization method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0037] Embodiment 1 of the present invention provides a user authentication method, such as figure 2 shown, including:

[0038] Step S201, after the user terminal is powered on, it interacts with the network entity in the cellular mobile communication network to perform a SIM authentication process, and after completing the HLR authentication, it sends an indication message to the RADIUS server in the WLAN through the cellular mobile communication network. The indication message carries the unique terminal identifier of the user terminal, for example, the unique terminal identifier is an International Mobile Equipment Identity (IMEI), or may also be a MAC address.

[0039] The instruction message can specifically be installed in the user terminal by installing a client in the user terminal. After the user terminal completes the HLR authentication, the client automatically obtains the terminal unique identifier of the user terminal, generates an instruction message and sends i...

Embodiment 2

[0055] Embodiment 2 of the present invention also provides a user authentication method, such as image 3 shown, including:

[0056] Step S301, after the user terminal is powered on, it interacts with the network entity in the cellular mobile communication network to perform a SIM authentication processing flow, and after completing the HLR authentication, it sends an indication message to the RADIUS server in the WLAN through the cellular mobile communication network. The indication message carries the unique terminal identifier of the user terminal, for example, the unique terminal identifier is an International Mobile Equipment Identity (IMEI), or may also be a MAC address.

[0057] The instruction message can specifically be installed in the user terminal by installing a client in the user terminal. After the user terminal completes the HLR authentication, the client automatically obtains the terminal unique identifier of the user terminal, generates an instruction message...

Embodiment 3

[0075] Embodiment 3 of the present invention also provides a user authentication method, such as Figure 4 shown, including:

[0076] Step S401, after the user terminal is turned on, it interacts with the network entity in the cellular mobile communication network to perform a SIM authentication processing flow, and after completing the HLR authentication, it sends an indication message to the RADIUS server in the WLAN through the cellular mobile communication network. The indication message carries the unique terminal identifier of the user terminal, for example, the unique terminal identifier is an International Mobile Equipment Identity (IMEI), or may also be a MAC address.

[0077] The instruction message can specifically be installed in the user terminal by installing a client in the user terminal. After the user terminal completes the HLR authentication, the client automatically obtains the terminal unique identifier of the user terminal, generates an instruction message...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a user authorization method, device and system. The user authorization method comprises the steps of: receiving an indication message carrying a terminal unique identification and being sent by a first user terminal through a honeycomb mobile communication network by a wireless local area network side, storing the terminal unique identification in the indication message; and when subsequently receiving a first access request carrying the terminal unique identification and being sent by a second user terminal, after querying that the terminal unique identification carried in the first access request is stored locally, determining that the authorization of the second user terminal is passed. By adopting the scheme provided by the embodiment of the invention, efficiency of authorizing the user in a WLAN (Wireless Local Area Network) is increased.

Description

technical field [0001] The present invention relates to the technical field of wireless communication, in particular to a user authentication method, device and system. Background technique [0002] In the current Web authentication mechanism of the wireless local area network WLAN, user authentication is jointly completed by the access controller AC, the portal server, and the RADIUS (Remote Authentication Dial In User Service) authentication server. During user authentication, after the user terminal establishes a connection with the access point AP, the DHCP address allocation is completed with the AC, that is, the AC allocates an address for the user terminal, and the AC notifies the Portal server to send an authentication page to the user terminal. Send the user name and user password to the Portal server, and then the AC, the Portal server and the RADIUS authentication server jointly complete the authentication of the user. After the authentication is passed, the Porta...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/06
Inventor 侯志强刘利军刘大鹏王兵王静
Owner CHINA MOBILE COMM GRP CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More