An authentication method, device and system
A technology of authentication and terminal equipment, which is applied in the field of communication and can solve problems such as inapplicability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0057] The implementation of the embodiments of the present application will be described in detail below in conjunction with the accompanying drawings.
[0058] The embodiment of this application can be applied to figure 1 The network shown, such as figure 1 As shown, the network may include a first terminal device, a second terminal device, a management node, an access network device, and a core network device. Wherein, the first terminal device and the second terminal device can access the network through the management node, and the first terminal device can manage the second terminal device through the management node. Understandably, figure 1 Exemplary architecture diagrams only, except figure 1 In addition to the nodes shown, the system may also include other nodes without limitation.
[0059] Wherein, the first terminal device may be a user equipment (user equipment, UE), such as: a smart phone, a personal digital assistant (personal digital assistant, PDA), a lapt...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


