Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authentication processing method and device thereof, storage medium and electronic device

A processing method and technology for storage media, which are applied in security devices, security communication devices, electrical components, etc., can solve problems such as no solutions, and achieve the effect of improving security and confidentiality

Active Publication Date: 2020-07-28
ZTE CORP
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] For the above-mentioned problems in related technologies, there is no effective solution yet

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication processing method and device thereof, storage medium and electronic device
  • Authentication processing method and device thereof, storage medium and electronic device
  • Authentication processing method and device thereof, storage medium and electronic device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0037] The method embodiment provided in Embodiment 1 of the present application may be executed in a terminal (including a mobile terminal, a computer terminal, or a similar computing device). Taking running on a mobile terminal as an example, figure 1 It is a hardware structural block diagram of a mobile terminal of an authentication processing method in an embodiment of the present invention. Such as figure 1 As shown, the mobile terminal 10 may include one or more ( figure 1 Only one is shown in the figure) a processor 102 (the processor 102 may include but not limited to a processing device such as a microprocessor MCU or a programmable logic device FPGA) and a memory 104 for storing data. Optionally, the above-mentioned mobile terminal also A transmission device 106 for communication functions as well as input and output devices 108 may be included. Those of ordinary skill in the art can understand that, figure 1 The shown structure is only for illustration, and does...

Embodiment 2

[0061] In this embodiment, an authentication processing device is also provided, which is used to implement the above embodiments and preferred implementation modes, and what has already been described will not be repeated. As used below, the term "module" may be a combination of software and / or hardware that realizes a predetermined function. Although the devices described in the following embodiments are preferably implemented in software, implementations in hardware, or a combination of software and hardware are also possible and contemplated.

[0062] Figure 6 is a structural block diagram of an authentication processing device according to Embodiment 2 of the present invention, such as Figure 6 As shown, the device is applied to a terminal, and the device may include:

[0063] The receiving module 62 is configured to receive the first authentication request message from the network side;

[0064] A judging module 64, configured to judge whether the number of times th...

Embodiment 3

[0081] An embodiment of the present invention also provides a storage medium, in which a computer program is stored, wherein the computer program is set to execute the steps in any one of the above method embodiments when running.

[0082] Optionally, in this embodiment, the above-mentioned storage medium may be configured to store a computer program for performing the following steps:

[0083] S1. The terminal receives a first authentication request message from the network side;

[0084] S2. The terminal judges whether the number of times of receiving the first authentication request message is greater than a predetermined threshold;

[0085] S3. If the number of times is greater than the predetermined threshold, the terminal stops responding to the first authentication request message.

[0086] Optionally, in this embodiment, the above-mentioned storage medium may include but not limited to: U disk, read-only memory (Read-Only Memory, ROM for short), random access memory (Ra...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an authentication processing method and a device thereof, a storage medium and an electronic device. The method comprises the steps that a terminal receives a first authentication request message from a network side; the terminal judges whether the frequency of receiving the first authentication request message is greater than a preset threshold value or not; and when the number of times is greater than the predetermined threshold, the terminal stops responding to the first authentication request message. According to the method and the device, the problem that the terminal can be tracked by replaying a legal authentication request message for multiple times under an AKA authentication mechanism in the related technology is solved, and the security and confidentiality of the authentication process are effectively improved.

Description

technical field [0001] The present invention relates to the communication field, in particular, to an authentication processing method, device, storage medium and electronic device. Background technique [0002] The 3rd Generation Partnership Project (3rd Generation Partnership Project, referred to as 3GPP) has formulated various mobile network specifications, including an authentication and key agreement process (Authentication and Key Agreement, referred to as AKA process), which is used for terminals ( For example, a user equipment (User Equipment, UE for short) and a network authenticate each other and establish a common key. [0003] In the AKA process scheme, when the terminal receives an authentication request message from the network, it will verify the message. If the verification fails, the terminal will respond with an authentication failure message (failure message), which carries the reason for the failure. parameter(CAUSE). If the authentication request messa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04W12/04H04W12/06
CPCH04W12/04H04W12/06H04L63/1441H04W12/12H04W12/106H04W12/0431H04W12/122
Inventor 彭锦游世林谢振华余万涛林兆骥曹炜
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products