User authorization method, device and system
A technology of user authentication and user terminal, applied in the field of user authentication method, device and system
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0037] Embodiment 1 of the present invention provides a user authentication method, such as figure 2 shown, including:
[0038] Step S201, after the user terminal is powered on, it interacts with the network entity in the cellular mobile communication network to perform a SIM authentication process, and after completing the HLR authentication, it sends an indication message to the RADIUS server in the WLAN through the cellular mobile communication network. The indication message carries the unique terminal identifier of the user terminal, for example, the unique terminal identifier is an International Mobile Equipment Identity (IMEI), or may also be a MAC address.
[0039] The instruction message can specifically be installed in the user terminal by installing a client in the user terminal. After the user terminal completes the HLR authentication, the client automatically obtains the terminal unique identifier of the user terminal, generates an instruction message and sends i...
Embodiment 2
[0055] Embodiment 2 of the present invention also provides a user authentication method, such as image 3 shown, including:
[0056] Step S301, after the user terminal is powered on, it interacts with the network entity in the cellular mobile communication network to perform a SIM authentication processing flow, and after completing the HLR authentication, it sends an indication message to the RADIUS server in the WLAN through the cellular mobile communication network. The indication message carries the unique terminal identifier of the user terminal, for example, the unique terminal identifier is an International Mobile Equipment Identity (IMEI), or may also be a MAC address.
[0057] The instruction message can specifically be installed in the user terminal by installing a client in the user terminal. After the user terminal completes the HLR authentication, the client automatically obtains the terminal unique identifier of the user terminal, generates an instruction message...
Embodiment 3
[0075] Embodiment 3 of the present invention also provides a user authentication method, such as Figure 4 shown, including:
[0076] Step S401, after the user terminal is turned on, it interacts with the network entity in the cellular mobile communication network to perform a SIM authentication processing flow, and after completing the HLR authentication, it sends an indication message to the RADIUS server in the WLAN through the cellular mobile communication network. The indication message carries the unique terminal identifier of the user terminal, for example, the unique terminal identifier is an International Mobile Equipment Identity (IMEI), or may also be a MAC address.
[0077] The instruction message can specifically be installed in the user terminal by installing a client in the user terminal. After the user terminal completes the HLR authentication, the client automatically obtains the terminal unique identifier of the user terminal, generates an instruction message...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 