Unlock instant, AI-driven research and patent intelligence for your innovation.

Authentication method, system and related device

An authentication and authentication request technology, applied in security devices, wireless communications, electrical components, etc., can solve the problems of cumbersome implementation and reduce user experience, and achieve the effect of simplifying user operations and improving user experience

Active Publication Date: 2016-07-20
CHINA MOBILE COMM GRP CO LTD
View PDF10 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] Based on the existing authentication management scheme, the authentication and authentication of users by the core network is not known to the Internet service server, so users need to be authenticated when accessing services. For example, users who initiate the attach process and reach the PCRF have already passed the core network. However, if the user needs to access its own business or Internet business, it is still necessary to enter the user name and password set by the user again for authentication, which is cumbersome and reduces user experience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method, system and related device
  • Authentication method, system and related device
  • Authentication method, system and related device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0089] This embodiment transforms the AF into an API platform (i.e. API device), and the transformed API platform can accept requests initiated by Internet servers (servers) and convert them into Diameter messages that can be recognized by the original core network; this embodiment is based on Figure 8 The system structure shown is realized.

[0090] Figure 9 It is a schematic diagram of the authentication process described in Embodiment 1 of the present invention, as Figure 9 As shown, the process includes:

[0091] Step 901: When the user activates, the PCRF determines that the user's subscription to the one-time authorization service is legal and triggers the generation of an authentication identification code, which is sent to the GGSN / PGW.

[0092] Step 902: The user initiates a service request to the service platform, and the GGSN / PGW detects the user's service request, and judges whether the user's service request requires user authentication provided by the networ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiments in the present invention disclose an authentication method, system and related device, the method comprising: a business server obtaining a business request from a gateway GPRS support node / GGSN / PGW, the business request carrying an authentication identifier; the business server sending the authentication request to a policy and charging rules function (PCRF), the authentication request carrying the authentication identifier; the business server obtaining an authentication result from the PCRF, and providing corresponding service according to the business request when the authentication result is yes. According to the embodiments of the present invention, the network sides can communicate the authentication result with each other, thus it is unnecessary for a user to perform multiple times of authentication, thereby simplifying the operation for the user and improving user experiences.

Description

technical field [0001] The present invention relates to the field of user authentication, in particular to an authentication method, system and related devices. Background technique [0002] In order to achieve the goals of differentiated service capabilities, resource grooming capabilities, and network traffic optimization capabilities, according to the 3GPP (3rd Generation Partnership Project, Third Generation Partnership Project) standard specification, policy and charging control (Policy and Charging Control, PCC) is introduced into the existing packet network The system architecture performs QoS (Quality of Service, quality of service) control on packet data services. [0003] figure 1 Shown is a schematic diagram of the PCC architecture, refer to figure 1 , the main network elements in the PCC architecture include: PCRF (PolicyandChargingRulesFunction, policy control and charging rule functional entity), PCEF (PolicyandChargingEnforcementFunction, policy control and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06
Inventor 黄震宁
Owner CHINA MOBILE COMM GRP CO LTD