Unlock instant, AI-driven research and patent intelligence for your innovation.

Network access authentication processing method and device

A processing method, a technology of token authentication, applied in the field of communication, can solve the problem of not specifying signature authentication and so on

Active Publication Date: 2018-03-20
ZTE CORP
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0016] The embodiment of the present invention provides a network access authentication processing method and device, to at least solve the problem of how the home network handles when the signature authentication fails in the network access process of the related art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network access authentication processing method and device
  • Network access authentication processing method and device
  • Network access authentication processing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0052] The method embodiment provided in Embodiment 1 of the present application may be executed in a computer terminal or a similar computing device. Take running on a computer terminal as an example, image 3 It is a block diagram of the hardware structure of a computer terminal of a network access authentication processing method according to an embodiment of the present invention. Such as image 3 As shown, the computer terminal 30 may include one or more (only one is shown in the figure) processor 302 (the processor 302 may include but not limited to a processing device such as a microprocessor MCU or a programmable logic device FPGA, etc.), for A memory 304 for storing data, and a transmission device 306 for communication functions. Those of ordinary skill in the art can understand that, image 3 The shown structure is only for illustration, and it does not limit the structure of the above-mentioned electronic device. For example, computer terminal 30 may also includ...

Embodiment 2

[0108] In this embodiment, a network access authentication processing device is also provided, which is used to implement the above embodiments and preferred implementation modes, and what has already been described will not be repeated. As used below, the term "module" may be a combination of software and / or hardware that realizes a predetermined function. Although the devices described in the following embodiments are preferably implemented in software, implementations in hardware, or a combination of software and hardware are also possible and contemplated.

[0109] Figure 7 is a structural block diagram of a network access authentication processing device according to an embodiment of the present invention, such as Figure 7 As shown, the device includes:

[0110] The first receiving module 72 is configured to receive a confirmation message sent by the user equipment, where the confirmation message carries the first signature token generated by the user equipment accord...

Embodiment 3

[0125] The embodiment of the invention also provides a storage medium. Optionally, in this embodiment, the above-mentioned storage medium may be configured to store program codes for performing the following steps:

[0126] S1. Receive a confirmation message sent by the user equipment, where the confirmation message carries a first signature token generated by the user equipment according to the first initial privacy-enhanced mobile identity PMSI;

[0127] S2, verify whether the first signature token is legal;

[0128] S3. If the verification result is negative, obtain the PMSI and perform network access authentication processing on the user equipment.

[0129] Optionally, the storage medium is also configured to store program codes for performing the following steps: obtaining the PMSI and performing network access authentication processing for the user equipment includes:

[0130] S1. Send the first signature token authentication failure message to the user equipment, and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a network access authentication processing method and device. The method comprises the following steps: receiving an acknowledgement message sent by user equipment, wherein theacknowledgement message carries a first signature token generated by the user equipment according to a first Privacy enhanced Mobile Subscriber Identifier PMSI; verifying whether the first signature token is legal; and if the first signature token is illegal, then acquiring the PMSI and performing network access authentication processing on the user equipment. According to the network access authentication processing method provided by the invention, the problem of how to deal with a home network when the signature authentication fails is not stated in a network access process of the related technology can be solved.

Description

technical field [0001] The present invention relates to the communication field, in particular to a network access authentication processing method and device. Background technique [0002] Mobile communication has developed rapidly in more than 20 years, which has brought a huge impact on people's life style, work style, social politics, economy and other aspects. Human society has entered an efficient information age, and the demand for various business applications has shown explosive growth, which has brought huge challenges to the future wireless mobile broadband system in terms of frequency, technology, and operation. [0003] In addition to providing services for everyone's communication, the future mobile network will also provide access services for more and more IoT terminals. IoT access brings new challenges and opportunities to mobile networks. Different types of IoT have different demands on the network. Some require the network to provide high real-time and h...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04W12/084
CPCH04W12/069H04W12/72H04W12/02H04L63/0414
Inventor 游世林蔡继燕梁爽彭锦林兆骥赵孝武
Owner ZTE CORP