Check patentability & draft patents in minutes with Patsnap Eureka AI!

trigger user authentication in the communication network

A technology of communication network and communication equipment, which is applied in the field of user re-authentication, and can solve problems such as the inability to prevent unauthorized access

Inactive Publication Date: 2019-03-01
ALCATEL LUCENT SAS
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, periodic re-authentication using such communication devices may not prevent unauthorized access because fraudulent users can exploit network services to a large extent in the interval between re-authentication
For example, with large predetermined time intervals, a fraudulent user can download large amounts of data without any authentication, resulting in a great risk to the end user

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • trigger user authentication in the communication network
  • trigger user authentication in the communication network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] This topic relates to user reauthentication in communication networks. The method can be implemented in various communication devices communicating over various networks. Communication devices that can implement the methods include, but are not limited to, cellular phones, smart phones, personal digital assistants (PDAs), portable computers, desktop computers, wireless data cards, servers, and the like. Communication networks in which the method may be implemented include, but are not limited to, Code Division Multiple Access (CDMA) implementing Evolution Data Optimized or Evolution Data Unique (EVDO), Global System for Mobile Communications (GSM) networks, Universal Mobile Telecommunications System (UMTS) ) network, Wideband Code Division Multiple Access (W-CDMA) network, etc. Although the description herein refers to an EVDO system, those skilled in the art will understand that, albeit with some variations, the methods and systems may be implemented in other communic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The subject matter discloses a method for triggering re-authentication of a communication device connected to a communication network. In one implementation, the amount of data transferred between the communication device and the communication network is measured. Further, the measured data volume is compared with a re-authentication threshold. Then, based on the comparison, re-authentication of the communication device is triggered.

Description

technical field [0001] The present subject matter relates to authentication in communication networks and, in particular but not exclusively, to triggering user re-authentication in communication networks. Background technique [0002] Communication devices, such as cellular phones, smart phones, personal digital assistants (PDAs), notebook computers, and computers, provide users with a variety of communication services and network capabilities. End users of these communication devices have access to various network services provided by network operators in the communication network, most notably voice and data services. Typically, a communication network provides communication links between various communication devices for utilizing the network services. [0003] Communication networks typically use predefined standards and protocols to provide communication links between communication devices. In addition, as new standards continue to evolve and develop, network service...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04W12/12H04W24/08H04W88/12
CPCH04L63/108H04L63/1425H04W12/12H04W12/082H04W12/126H04L63/0892H04W12/06H04W12/08
Inventor P·提吉R·高什
Owner ALCATEL LUCENT SAS
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More