User authorization method, device and system
A technology of user authentication and user terminal, applied in the field of user authentication method, device and system
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0037] Embodiment 1 of the present invention provides a user authentication method, such as figure 2 shown, including:
[0038] Step S201, after the user terminal is powered on, it interacts with the network entity in the cellular mobile communication network to perform a SIM authentication process, and after completing the HLR authentication, it sends an indication message to the RADIUS server in the WLAN through the cellular mobile communication network. The indication message carries the unique terminal identifier of the user terminal, for example, the unique terminal identifier is an International Mobile Equipment Identity (IMEI), or may also be a MAC address.
[0039] The instruction message can specifically be installed in the user terminal by installing a client in the user terminal. After the user terminal completes the HLR authentication, the client automatically obtains the terminal unique identifier of the user terminal, generates an instruction message and sends i...
Embodiment 2
[0055] Embodiment 2 of the present invention also provides a user authentication method, such as image 3 shown, including:
[0056] Step S301, after the user terminal is powered on, it interacts with the network entity in the cellular mobile communication network to perform a SIM authentication processing flow, and after completing the HLR authentication, it sends an indication message to the RADIUS server in the WLAN through the cellular mobile communication network. The indication message carries the unique terminal identifier of the user terminal, for example, the unique terminal identifier is an International Mobile Equipment Identity (IMEI), or may also be a MAC address.
[0057] The instruction message can specifically be installed in the user terminal by installing a client in the user terminal. After the user terminal completes the HLR authentication, the client automatically obtains the terminal unique identifier of the user terminal, generates an instruction message...
Embodiment 3
[0075] Embodiment 3 of the present invention also provides a user authentication method, such as Figure 4 shown, including:
[0076] Step S401, after the user terminal is turned on, it interacts with the network entity in the cellular mobile communication network to perform a SIM authentication processing flow, and after completing the HLR authentication, it sends an indication message to the RADIUS server in the WLAN through the cellular mobile communication network. The indication message carries the unique terminal identifier of the user terminal, for example, the unique terminal identifier is an International Mobile Equipment Identity (IMEI), or may also be a MAC address.
[0077] The instruction message can specifically be installed in the user terminal by installing a client in the user terminal. After the user terminal completes the HLR authentication, the client automatically obtains the terminal unique identifier of the user terminal, generates an instruction message...
PUM

Abstract
Description
Claims
Application Information

- R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com