Supercharge Your Innovation With Domain-Expert AI Agents!

A user authentication method, device and system

A user authentication and user terminal technology, applied in the field of devices and systems, and user authentication methods

Inactive Publication Date: 2015-12-09
CHINA MOBILE COMM GRP CO LTD
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, after all, the Cookie-based solution requires the user to enter account information once when logging in for the first time to obtain the Cookie. Web authentication mechanism for user authentication, that is, for the cookie-based periodic authentication-free mechanism, the authentication efficiency and user experience still need to be further improved

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A user authentication method, device and system
  • A user authentication method, device and system
  • A user authentication method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0037] Embodiment 1 of the present invention provides a user authentication method, such as figure 2 shown, including:

[0038] Step S201, after the user terminal is powered on, it interacts with the network entity in the cellular mobile communication network to perform a SIM authentication process, and after completing the HLR authentication, it sends an indication message to the RADIUS server in the WLAN through the cellular mobile communication network. The indication message carries the unique terminal identifier of the user terminal, for example, the unique terminal identifier is an International Mobile Equipment Identity (IMEI), or may also be a MAC address.

[0039] The indication message can be specifically installed in the user terminal by installing a client in the user terminal. After the user terminal completes the HLR authentication, the client automatically obtains the unique terminal identifier of the user terminal, generates an indication message and sends it ...

Embodiment 2

[0055] Embodiment 2 of the present invention also provides a user authentication method, such as image 3 shown, including:

[0056] Step S301, after the user terminal is powered on, it interacts with the network entity in the cellular mobile communication network to perform a SIM authentication processing flow, and after completing the HLR authentication, it sends an indication message to the RADIUS server in the WLAN through the cellular mobile communication network. The indication message carries the unique terminal identifier of the user terminal, for example, the unique terminal identifier is an International Mobile Equipment Identity (IMEI), or may also be a MAC address.

[0057] The indication message can be specifically installed in the user terminal by installing a client in the user terminal. After the user terminal completes the HLR authentication, the client automatically obtains the unique terminal identifier of the user terminal, generates an indication message a...

Embodiment 3

[0075] Embodiment 3 of the present invention also provides a user authentication method, such as Figure 4 shown, including:

[0076] Step S401, after the user terminal is turned on, it interacts with the network entity in the cellular mobile communication network to perform a SIM authentication processing flow, and after completing the HLR authentication, it sends an indication message to the RADIUS server in the WLAN through the cellular mobile communication network. The indication message carries the unique terminal identifier of the user terminal, for example, the unique terminal identifier is an International Mobile Equipment Identity (IMEI), or may also be a MAC address.

[0077] The indication message can be specifically installed in the user terminal by installing a client in the user terminal. After the user terminal completes the HLR authentication, the client automatically obtains the unique terminal identifier of the user terminal, generates an indication message a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a user authorization method, device and system. The user authorization method comprises the steps of: receiving an indication message carrying a terminal unique identification and being sent by a first user terminal through a honeycomb mobile communication network by a wireless local area network side, storing the terminal unique identification in the indication message; and when subsequently receiving a first access request carrying the terminal unique identification and being sent by a second user terminal, after querying that the terminal unique identification carried in the first access request is stored locally, determining that the authorization of the second user terminal is passed. By adopting the scheme provided by the embodiment of the invention, efficiency of authorizing the user in a WLAN (Wireless Local Area Network) is increased.

Description

technical field [0001] The present invention relates to the technical field of wireless communication, in particular to a user authentication method, device and system. Background technique [0002] In the current Web authentication mechanism of the wireless local area network WLAN, user authentication is jointly completed by the access controller AC, the portal server, and the RADIUS (RemoteAuthenticationDialInUserService) authentication server. During user authentication, after the user terminal establishes a connection with the access point AP, the DHCP address allocation is completed with the AC, that is, the AC allocates an address for the user terminal, and the AC notifies the Portal server to send an authentication page to the user terminal. Send the user name and user password to the Portal server, and then the AC, the Portal server and the RADIUS authentication server jointly complete the authentication of the user. After the authentication is passed, the Portal sen...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/08H04L12/28H04W12/06
Inventor 侯志强刘利军刘大鹏王兵王静
Owner CHINA MOBILE COMM GRP CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More