Authentication processing method and device
A processing method and business technology, applied in the field of communication, can solve problems such as waste of resources, and achieve the effect of saving resources
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0032] The technical solutions of the embodiments of the present invention will be described in further detail below with reference to the drawings and embodiments.
[0033] figure 1 It is a flowchart of an authentication processing method according to an embodiment of the present invention. Such as figure 1 As shown, this embodiment specifically includes the following steps:
[0034] Step 101, when the non-access stratum count value is close to the maximum value, detect the local information;
[0035] Step 102. Determine whether to trigger an authentication and key agreement process with the user equipment according to local information.
[0036] Wherein, when the NAS count value is close to the maximum value, it means that the NAS count value is about to wrap around, and the authentication and key agreement process may be an EPS AKA process.
[0037] The executor of the above two steps may be the MME. When the downlink or uplink NAS count value is about to wrap around, t...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


