Unified authentication method and system based on subscriber identity module card

A user identification card and user authentication technology, applied in the field of unified authentication method and system based on user identification card, can solve the problem that the public mobile communication network does not grasp the mobile terminal login behavior and related information, and achieve the effect of improving the security level

Inactive Publication Date: 2017-02-22
CHINA TELECOM CORP LTD
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, when the client does not pass through the public mobile communication network, but connects to the service platform through the WiFi in the mobile terminal, since the user identification card and the public mobile communication network do not participate in the above-ment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Unified authentication method and system based on subscriber identity module card
  • Unified authentication method and system based on subscriber identity module card
  • Unified authentication method and system based on subscriber identity module card

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0045] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. The following description of at least one exemplary embodiment is merely illustrative in nature and in no way taken as limiting the invention, its application or uses. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0046] The relative arrangements of components and steps, numerical expressions and numerical values ​​set forth in these embodiments do not limit the scope of the present invention unless specifically stated otherwise.

[0047] At the same time, it should be understood that, for the convenience of d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a unified authentication method and system based on a subscriber identity module card. The method comprises the steps that a client terminal sends a logging-in request to a business platform, wherein the logging-in request comprises the authentication information based on the subscriber identity module card; the business platform transmits a subscriber authentication request to an authentication server, wherein the subscriber authentication request comprises the authentication information; the authentication server carries out the authentication of the identity of a subscriber according to the authentication information, and returns an authentication result to the business platform; and the business platform decides whether to pass the logging-in request of the client terminal or not according to the authentication result. According to the invention, when the client terminal logs in the business platform through a wireless local area network, the authentication service based on the subscriber identity module card can still be provided for the business platform, thereby improving the safety level of the authentication of the client terminal.

Description

technical field [0001] The invention relates to the Internet field, in particular to a unified authentication method and system based on a user identification card. Background technique [0002] At present, the unified authentication method based on the user identification card (referred to as the user card) can meet the high security level authentication requirements for the client to access the mobile operator network (2G / 3G / 4G) through the mobile terminal and log in to the service platform. An authentication system based on a subscriber identification card and a public mobile communication network is guaranteed. The principle is that when the client accesses the public mobile communication network through the subscriber identification card in the mobile terminal, the public mobile communication network will authenticate the subscriber identification card and the contract service type, and the 4G subscriber identification card will simultaneously authenticate the public mo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/0853
Inventor 庄永昌
Owner CHINA TELECOM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products