Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authentication method and device for user equipment

A user equipment and user authentication technology, which is applied in the communication field, can solve the problems of poor authentication flexibility of user equipment, and achieve the effect of improving authentication flexibility

Inactive Publication Date: 2016-11-23
BAICELLS TECH CO LTD
View PDF9 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0012] The main purpose of the present invention is to provide a user equipment authentication method and device to solve the problem of poor user equipment authentication flexibility in wireless communication systems in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method and device for user equipment
  • Authentication method and device for user equipment
  • Authentication method and device for user equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0047] According to the embodiment of the present invention, a method embodiment that can be used to implement the embodiment of the device of the present application is provided. It should be noted that the steps shown in the flow charts of the drawings can be performed on a computer such as a set of computer-executable instructions system, and, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0048] According to an embodiment of the present invention, an authentication method for user equipment is provided. figure 2 is a flowchart of an authentication method for user equipment according to an embodiment of the present invention, such as figure 2 As shown, the method includes the following steps S202 to S208, specifically as follows:

[0049] Step S202: Obtain the authentication vector in the core network device, and store the authentication vector. ...

Embodiment 2

[0112] According to an embodiment of the present invention, there is also provided an authentication device for user equipment for implementing the authentication method for user equipment described above. The authentication device is mainly used to implement the authentication method provided in the foregoing content of the embodiment of the present invention. The following implements the present invention The authentication device of the user equipment provided by the example is introduced in detail:

[0113] Figure 5 is a schematic diagram of an authentication device for user equipment according to an embodiment of the present invention. Such as Figure 5 As shown, the authentication device of the user equipment mainly includes: an acquisition unit 10, a first judgment unit 20, an authentication unit 30 and a provision unit 40, wherein:

[0114] The acquiring unit 10 is configured to acquire the authentication vector in the core network device, and store the authenticati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an authentication method and device for user equipment. The authentication method for the user equipment comprises the steps of: acquiring an authentication vector in core network equipment, and storing the authentication vector; judging whether a target situation occurs; in the case of judging that the target situation occurs, carrying out authentication on the user equipment by a base station through utilizing the authentication vector; and in the case that an authentication result of the user equipment is that authentication is passed, providing a wireless communication service to the user equipment. By the authentication method and device disclosed by the invention, the problem of poor flexibility of authenticating the user equipment in a wireless communication system in the prior art is solved, so that an effect of improving flexibility of authenticating the user equipment is achieved.

Description

technical field [0001] The present invention relates to the communication field, in particular, to an authentication method and device for user equipment. Background technique [0002] In the current wireless communication system, people (users) obtain wireless communication services through user equipment (User Equipment, UE for short), for example, enjoy the service of wirelessly accessing the Internet network. Specifically, the UE directly performs wireless communication with the base station, and then connects to the network through the base station, thereby realizing the connection between the UE and the network. In order to realize the management of the UE, an authentication center is set up to connect with the base station, and the authentication center determines the legitimacy of the UE's access to wireless communication services, for example, whether the UE is in arrears. [0003] In a Long-Term Evolution (LTE for short) system, a UE is connected to a core network...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/06H04L29/06
CPCH04W12/069
Inventor 周明宇白炜
Owner BAICELLS TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products