Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Service authentication method and system

An authentication method and business technology, applied in the communication field, can solve problems such as easy forgetting, user inconvenience, frequent input of user information, etc., and achieve the effect of improving user experience and security

Inactive Publication Date: 2014-12-31
HUAWEI TECH CO LTD
View PDF4 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the process of using network services, users need to enter the user name and password registered with the third-party service provider in advance when using some third-party services, and each third-party service provider generally requires an independent user name and password. Password, so that users may need to remember multiple user names and passwords when accessing the network, which is not only easy to forget, but also requires frequent input of user information, which brings inconvenience to users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Service authentication method and system
  • Service authentication method and system
  • Service authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0061] The present invention provides a service authentication method. The network architecture involved in the method includes: a terminal, a BNG and an AAA server, such as figure 1 As shown, the method includes:

[0062] 101. The terminal receives an instruction to call shared user information for third-party service authentication sent by the user; the above shared user information is the user information used by the user in AAA (Authentication, Authorization, Accounting, authentication, authorization, and accounting) authentication;

[0063] For example, the shared user information can be the account name and password used by the network operator when the user accesses the network. For example, the user uses China Telecom ADSL (Asymmetric Digital Subscriber Line) to dial The account name and password entered when surfing the Internet;

[0064] In this embodiment, if a third-party service provides the function of using shared user information for third-party service authentication...

Embodiment 2

[0094] The present invention also provides a service authentication method. The network architecture involved in the method includes: a terminal, a security server and an AAA server, such as figure 2 As shown, the method includes:

[0095] 201. The terminal receives an instruction to invoke shared user information for third-party service authentication sent by a user; the above shared user information is the user information used by the user when performing AAA authentication;

[0096] For example, the shared user information can be the account name and password used by the network operator when the user accesses the network. For example, the user uses China Telecom ADSL (Asymmetric Digital Subscriber Line) to dial The account name and password entered when surfing the Internet;

[0097] In this embodiment, if a third-party service provides the function of using shared user information for third-party service authentication, the webpage or interface of the third-party service displa...

Embodiment 3

[0135] The invention also provides a business authentication system, such as Figure 4 As shown, the system may include: a terminal 100, a BNG 200 and an AAA server 300, among which,

[0136] The terminal 100 can be used to receive an instruction sent by a user to invoke shared user information for third-party service authentication; the above shared user information is user information used by the user for authentication, authorization, and accounting AAA authentication; for example, the shared user information can be It is the account name and password entered when the user accesses the network and the network service provided by the network operator, such as the account name and password entered when the user uses China Telecom's ADSL (Asymmetric Digital Subscriber Line) dial-up Internet access; In this embodiment, if a third-party service provides the function of using shared user information for third-party service authentication, the webpage or interface of the third-party s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention, which relates to the technical field of communication, discloses a service authentication method and system. The method comprises: a terminal receives an instruction of invoking shared user information for third-party service authentication, wherein the instruction is sent by a user; the terminal sends a request message for obtaining a user token to a broadband network gateway (BNG); the BNG sends the request message for obtaining the user token to an authentication, authorization, accounting (AAA) server; the AAA server generates a user token and stores the user taken; the AAA server sends the user token to the BNG; the BNG sends the user token to the terminal; the terminal sends the user token to a server of the third-party service; the AAA server receives service request information sent by the server of the third-party service; and the AAA server determines whether the received user token is equal to the stored user token; if so, third-party service authentication is carried out. With implementation of the method and system, the user experience can be improved.

Description

Technical field [0001] The present invention relates to the field of communication technology, in particular to a business authentication method and system. Background technique [0002] At present, network users generally need to pass the authentication of AAA (Authentication, Authorization, Accounting, verification, authorization, accounting) server when accessing the network. During the authentication process, users generally need to enter a user name and password. After the authentication is passed, the user can use The network service provided by the operator. [0003] In the process of using network services, users also need to enter the user name and password previously registered with the third-party service provider when using certain third-party services, and each third-party service provider generally requires an independent user name and password. Password, so users may need to remember multiple user names and passwords when accessing the network, which is not only eas...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0892
Inventor 查敏
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products