Authentication method, system and related device
An authentication and authentication request technology, applied in security devices, wireless communications, electrical components, etc., can solve the problems of cumbersome implementation and reduce user experience, and achieve the effect of simplifying user operations and improving user experience
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0089] This embodiment transforms the AF into an API platform (i.e. API device), and the transformed API platform can accept requests initiated by Internet servers (servers) and convert them into Diameter messages that can be recognized by the original core network; this embodiment is based on Figure 8 The system structure shown is realized.
[0090] Figure 9 It is a schematic diagram of the authentication process described in Embodiment 1 of the present invention, as Figure 9 As shown, the process includes:
[0091] Step 901: When the user activates, the PCRF determines that the user's subscription to the one-time authorization service is legal and triggers the generation of an authentication identification code, which is sent to the GGSN / PGW.
[0092] Step 902: The user initiates a service request to the service platform, and the GGSN / PGW detects the user's service request, and judges whether the user's service request requires user authentication provided by the networ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 