Network authentication method and device, computer equipment and storage medium

A network authentication, computer program technology, applied in security devices, wireless communications, electrical components, etc., can solve problems such as difficulty in ensuring the stability and reliability of mobile communication networks

Pending Publication Date: 2020-05-12
COMBA TELECOM SYST CHINA LTD
View PDF13 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the above-mentioned authentication method is difficult to

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network authentication method and device, computer equipment and storage medium
  • Network authentication method and device, computer equipment and storage medium
  • Network authentication method and device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0042] In order to make the purpose, technical solutions, and advantages of this application clearer, the following further describes this application in detail with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the application, and not used to limit the application.

[0043] The network authentication method provided in this application can be applied to figure 1 In the application environment shown, the base station and the server are connected through a network. Among them, the server may be implemented by an independent server or a server cluster composed of multiple servers, and the base station may be various types of base stations, for example, a macro base station, a micro base station, and a home micro base station.

[0044] Hereinafter, the technical solution of the present application and how the technical solution of the present application solves the above-mentioned ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a network authentication method and device, computer equipment and a storage medium. The method comprises the following steps: monitoring a communication state of a communication link between a base station and a server; if the communication state is abnormal, executing authentication operation, wherein the authentication operation comprises the steps that an authentication parameter with the highest preset priority is selected from an authentication parameter set, and network authentication is conducted on a communication link between the base station and the server;and if the authentication is not successful, the priority of each authentication parameter is updated in the authentication parameter set, and the authentication operation is continued to execute based on the updated priority of each authentication parameter in the authentication parameter set until the authentication is successful. According to the authentication method, an automatic authentication process is realized, and compared with an existing network authentication method needing manual intervention for manual operation, the network authentication method provided by the invention greatly shortens the link recovery time of network interruption between the base station and the server, so that the stability of network operation is ensured.

Description

technical field [0001] The present application relates to the technical field of mobile communication, and in particular to a network authentication method, device, computer equipment and storage medium. Background technique [0002] With the development of mobile communication network technology and the increasing number of mobile communication network users, the coverage area of ​​the communication network is getting wider and wider, and the requirements for network security and stability are getting higher and higher. How to ensure the security of the mobile communication network at the same time And stability has become a key issue in the existing network architecture. [0003] Mobile communication networks usually use network authentication methods to ensure network security, and network authentication methods refer to which encryption method the base station uses when establishing a network communication link with the server. For example, the existing authentication me...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/06H04W12/08
CPCH04W12/06H04W12/08
Inventor 林振铝黄金伙黄文昌
Owner COMBA TELECOM SYST CHINA LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products