Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authentication method, system and equipment for network access

A network access and authentication method technology, applied in the field of network access authentication methods, systems and equipment, can solve the problems of easy leakage of authentication information, cumbersome and other problems

Inactive Publication Date: 2012-07-18
HUAWEI TECH CO LTD
View PDF4 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The premise of the above-mentioned existing authentication is that both the authentication terminal and the user equipment need to be configured with authentication information. For example, the premise of WPA-PSK authentication is that the same shared key and the same Algorithm and other authentication information, so it is easier to leak authentication information; and if the authentication information is leaked, it is necessary to manually reconfigure the authentication terminal and user equipment, which is cumbersome

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method, system and equipment for network access
  • Authentication method, system and equipment for network access
  • Authentication method, system and equipment for network access

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0037] An embodiment of the present invention provides an authentication method for network access, which can authenticate user equipment supporting multiple types of wireless access networks, where the multiple types of wireless access networks, for example, can include cellular networks and WLANs. network. The cellular network, for example, may be a network such as Universal Mobile Telecommunications System (Universal Mobile Telecommunications System, UMTS), Glob...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses an authentication method for network access, an authentication system for network access and a piece of authentication equipment for network access, which are applied to the technical field of communication. In the authentication method for network access disclosed by the embodiment, a data transmission passage is built between a piece of first wireless access network equipment and a first wireless access network of a piece of user equipment (UE), after the identification information of the UE at a second wireless access network is acquired, the authentication information of the second wireless access network corresponding to the identification information is generated, wherein the authentication information comprises the authentication information of the second wireless access network which is used by the UE and a piece of second wireless access network equipment; the authentication information used by the UE is transmitted to the UE, and the corresponding relation between the identification information and the authentication information which is used by the second wireless access network equipment is transmitted to the second wireless access network equipment. Therefore the authentication information for network access authentication is difficult to be disclosed, and the safety of network access authentication is improved.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to an authentication method, system and equipment for network access. Background technique [0002] In a wireless access network such as a wireless local area network (Wireless Local Area Network, WLAN), in order to solve the problem of network security, a unified authentication method is generally used to authenticate users in the wireless access network, so that the user equipment can use the user name and Token login access to the network system that is allowed to log in. Existing unified authentication methods include an authentication method based on an Extensible Authentication Protocol Method for GSM Subscriber Identity Module (EAP-SIM), a Portal authentication method, and a wireless-based authentication method based on an extensible authentication protocol. A pre-shared key (Wi-Fi Protected Access, Pre-Shared Key, WPA-PSK) authentication method for protecting...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04W12/08
CPCH04W12/06H04W84/12H04L2463/121H04L63/0876H04W12/61H04W12/0431
Inventor 刘启明
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products