A user authentication method, device and system
A user authentication and user terminal technology, applied in the field of devices and systems, and user authentication methods
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0037] Embodiment 1 of the present invention provides a user authentication method, such as figure 2 shown, including:
[0038] Step S201, after the user terminal is powered on, it interacts with the network entity in the cellular mobile communication network to perform a SIM authentication process, and after completing the HLR authentication, it sends an indication message to the RADIUS server in the WLAN through the cellular mobile communication network. The indication message carries the unique terminal identifier of the user terminal, for example, the unique terminal identifier is an International Mobile Equipment Identity (IMEI), or may also be a MAC address.
[0039] The indication message can be specifically installed in the user terminal by installing a client in the user terminal. After the user terminal completes the HLR authentication, the client automatically obtains the unique terminal identifier of the user terminal, generates an indication message and sends it ...
Embodiment 2
[0055] Embodiment 2 of the present invention also provides a user authentication method, such as image 3 shown, including:
[0056] Step S301, after the user terminal is powered on, it interacts with the network entity in the cellular mobile communication network to perform a SIM authentication processing flow, and after completing the HLR authentication, it sends an indication message to the RADIUS server in the WLAN through the cellular mobile communication network. The indication message carries the unique terminal identifier of the user terminal, for example, the unique terminal identifier is an International Mobile Equipment Identity (IMEI), or may also be a MAC address.
[0057] The indication message can be specifically installed in the user terminal by installing a client in the user terminal. After the user terminal completes the HLR authentication, the client automatically obtains the unique terminal identifier of the user terminal, generates an indication message a...
Embodiment 3
[0075] Embodiment 3 of the present invention also provides a user authentication method, such as Figure 4 shown, including:
[0076] Step S401, after the user terminal is turned on, it interacts with the network entity in the cellular mobile communication network to perform a SIM authentication processing flow, and after completing the HLR authentication, it sends an indication message to the RADIUS server in the WLAN through the cellular mobile communication network. The indication message carries the unique terminal identifier of the user terminal, for example, the unique terminal identifier is an International Mobile Equipment Identity (IMEI), or may also be a MAC address.
[0077] The indication message can be specifically installed in the user terminal by installing a client in the user terminal. After the user terminal completes the HLR authentication, the client automatically obtains the unique terminal identifier of the user terminal, generates an indication message a...
PUM

Abstract
Description
Claims
Application Information

- R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com