A method for realizing terminal secondary authentication
A secondary authentication and terminal technology, applied in the field of communication security, can solve the problem of not giving, and achieve the effect of preventing theft of user privacy
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0080] Please refer to figure 1 The embodiment of the present invention provides a method of implementing the secondary authentication of the terminal, which includes the steps of:
[0081] S101, after checking the primary authentication, the terminal initiates a secondary authentication request to the AAA server through the EAP channel of the 5G network, the secondary authentication request to trigger the AAA server to determine the second authentication data corresponding to the terminal. And the second authentication data is sent to the terminal in the form of a message;
[0082] It should be noted that when the symmetric algorithm is authenticated, only the second authentication data corresponding to the terminal can determine the secondary authentication data corresponding to the terminal, and when the non-symmetric algorithm is authenticated. Between the AAA server and the terminal need to return to each other until the handshake protocol can determine the second authenticat...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


