Authentication method and device for user equipment
A user equipment and user authentication technology, which is applied in the communication field, can solve the problems of poor authentication flexibility of user equipment, and achieve the effect of improving authentication flexibility
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0047] According to the embodiment of the present invention, a method embodiment that can be used to implement the embodiment of the device of the present application is provided. It should be noted that the steps shown in the flow charts of the drawings can be performed on a computer such as a set of computer-executable instructions system, and, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.
[0048] According to an embodiment of the present invention, an authentication method for user equipment is provided. figure 2 is a flowchart of an authentication method for user equipment according to an embodiment of the present invention, such as figure 2 As shown, the method includes the following steps S202 to S208, specifically as follows:
[0049] Step S202: Obtain the authentication vector in the core network device, and store the authentication vector. ...
Embodiment 2
[0112] According to an embodiment of the present invention, there is also provided an authentication device for user equipment for implementing the authentication method for user equipment described above. The authentication device is mainly used to implement the authentication method provided in the foregoing content of the embodiment of the present invention. The following implements the present invention The authentication device of the user equipment provided by the example is introduced in detail:
[0113] Figure 5 is a schematic diagram of an authentication device for user equipment according to an embodiment of the present invention. Such as Figure 5 As shown, the authentication device of the user equipment mainly includes: an acquisition unit 10, a first judgment unit 20, an authentication unit 30 and a provision unit 40, wherein:
[0114] The acquiring unit 10 is configured to acquire the authentication vector in the core network device, and store the authenticati...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com