Unlock instant, AI-driven research and patent intelligence for your innovation.

Equipment, system and method using extensible authentication protocol (EAP) to carry out external authentication

A technology for external authentication and user equipment, applied in the field of communication, which can solve problems such as the process impact of user equipment connecting to EPS

Inactive Publication Date: 2013-04-24
ZTE CORP
View PDF7 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, compared to the one-round interaction of CHAP and PAP authentication methods, the EAP authentication method has two rounds of message interaction between the client and the server. will have an impact

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Equipment, system and method using extensible authentication protocol (EAP) to carry out external authentication
  • Equipment, system and method using extensible authentication protocol (EAP) to carry out external authentication
  • Equipment, system and method using extensible authentication protocol (EAP) to carry out external authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0060] This embodiment provides a user equipment using EAP for external authentication, which is used to transmit the EAP authentication information required by the EAP authentication method to the packet data network gateway when initially attaching to the EPS network through E-UTRAN, and is also used to receive After the EAP request information, a request bearer resource modification message including EAP response information is sent to the packet data network gateway.

[0061] Further, the user equipment sends the attach request message by including the EAP authentication information in the PCO protocol configuration selection or newly defined information elements; includes the EAP response information in the PCO or newly defined information elements and carries it in the request bearer resource modification message middle.

Embodiment 2

[0063] This embodiment provides a user equipment using EAP for external authentication, which is used to send the PDP context activation request to carry the EAP authentication information required for EAP authentication when initially attaching to the EPS network through UTRAN / GERAN; it is also used to receive the EAP authentication information containing After the PDP activation acceptance message of the EAP request information, send the modify PDP context request message carrying the EAP response information to the EAP request to the GGSN / packet data network gateway.

[0064] Further, the user equipment includes both the EAP authentication information and the EAP response information in the PCO or newly defined information elements.

Embodiment 3

[0066] This embodiment provides a network-side device using EAP for external authentication, including a packet data network gateway and an external authentication server;

[0067] The packet data network gateway is used to include the extracted EAP authentication information in the access request message and send it to the external authentication server after receiving the session establishment request message carrying the EAP authentication information, and to send the EAP request information in the access challenge message to the external authentication server. sent to the user equipment; also used to include the extracted EAP response information in the access request message and send it to the external authentication server after receiving the bearer resource command message carrying the EAP response message, and send the received authentication result to the user equipment ;

[0068] The external authentication server is used to return an access challenge message contain...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides user equipment, network side equipment, a system and a method using an extensible authentication protocol (EAP) to carry out external authentication. When the user equipment is initially attached to an electric power storage (EPS) network, EAP authentication information required by the EAP authentication method is transmitted to a grouped data network gateway. After the user equipment receives EAP request information, the user equipment sends request bearing resource modification information or modification programmed data processor (PDP) context request information containing EAP response information to the grouped data network gateway. By means of the technical scheme, the user equipment can be accessed to the EPS through the 3rd generation partnership project (3GPP) access. The EAP authentication method can use an external authentication server to finish authentication through gateway general packet radio service support node / public data network GW (GGSN / PDN GW).

Description

technical field [0001] The present invention relates to the communication field, in particular to a device, system and method for external authentication using the EAP extensible authentication protocol. Background technique [0002] Extensible Authentication Protocol (EAP, Extensible Authentication Protocol) is a general protocol for point-to-point authentication, which can support multiple authentication methods. EAP does not specify the authentication method in the link establishment phase, but defers this process to the authentication phase. In this way, the authenticator can decide what authentication method to use after obtaining more information. This mechanism also allows the point-to-point authenticator to simply transparently transmit the received authentication message to the rear authentication server, and the rear authentication server will actually implement various authentication methods. After the link phase is completed, the authenticator sends one or more...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04W12/06H04L63/083H04L63/0892H04L63/162
Inventor 周星月梁爽朱春晖
Owner ZTE CORP