A network authentication method, device and system
A technology of network authentication and authentication vector, which is applied in the field of network authentication methods, devices and systems, and can solve the problems that pre-shared keys cannot be applied to users and limit the application range of keys.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0075] The following will clearly and completely describe the technical solution of the present invention in conjunction with the accompanying drawings of the present invention. Obviously, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.
[0076] see figure 1 , is a schematic flow diagram of the network authentication provided by the embodiment of the present invention, the flow includes:
[0077] Step 101, acquire the authentication vector sent by the authentication server.
[0078] Receiving the client greeting message sent by the terminal, obtaining the ID information carried in the message, and sending a request message to the authentication server according to the ID information, requesting to obtain the authent...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


