Unlock instant, AI-driven research and patent intelligence for your innovation.

A data processing method and device

A data processing and data technology, applied in the field of communication, can solve problems such as the inability to guarantee security in a unified manner, and the scattered storage of user authentication data.

Active Publication Date: 2017-05-03
CHINA MOBILE COMM GRP CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Under the cardless trend, service provisioning needs to configure the user code number, Authentication data, etc., access devices belong to different devices of multiple manufacturers, user authentication data storage is scattered and cannot be unified to ensure security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A data processing method and device
  • A data processing method and device
  • A data processing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] Aiming at the above-mentioned problems existing in the prior art, the embodiment of the present invention provides a technical solution for data processing. In this technical solution, the user authentication center stores the corresponding relationship between the encrypted user authentication data and the user code number, and the corresponding relationship between the access device ID and the key. When the user authentication center receives the When receiving an authentication request message, the user authentication center obtains the access device ID, key, and user code number carried in the authentication request message, and then according to the access device ID, key, and the access device ID and The corresponding relationship of the key authenticates the access device, and when the authentication is passed, the corresponding user authentication data is queried according to the user code number; the user authentication center decrypts the queried user authentica...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data processing method and equipment. The method comprises steps that: when a user authentication center receives an identification request message sent by access equipment, and the user authentication center acquires access equipment ID, a secret key and a user number which are contained in the identification request message; identification on the access equipment is carried out by the user authentication center according to the access equipment ID, the secret key and corresponding relations between a self-stored access equipment ID and a self-stored secret key, after identification, the corresponding user authentication data is queried according to the user number; decryption on the queried user authentication data is carried out by the user authentication center, and a user identification flow is initiated according to the user authentication data after decryption. According to the method, unified safety management of the user authentication data is realized, and a unified identification inlet of the user registration flow initiated from an access equipment side is provided.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to a data processing method and equipment. Background technique [0002] At present, when the terminal device of IMS (Internet Protocol Multimedia Subsystem, Internet Protocol Multimedia Subsystem) does not have an ISIM (IP Multimedia Service Identity Module, IP Multimedia Service Identity Module) card, the simple authentication form of Username and Password is used, that is, in End office side equipment (such as PBX (private branch exchange, private branch exchange), AG (access gateway, access gateway), PON (Passive Optical Network, passive optical network), etc.) directly write user identity information, including Code number (IMPI (IP Multimedia Private Identity, IP Multimedia Private Identity), IMPU (IP Multimedia Public Identity, IP Multimedia Public Identity)), authentication data (key), etc., directly initiate user identity authentication from the access device...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
Inventor 张琳程宇袁向阳
Owner CHINA MOBILE COMM GRP CO LTD