Unlock instant, AI-driven research and patent intelligence for your innovation.

User authentication using connection information provided by a blockchain network

A technology for connecting information and blockchain, which is applied to the authentication server to authenticate users in the visited network, which can solve the problems of not being authorized to access the visited network, and roaming users not being authenticated by the home network.

Active Publication Date: 2020-08-14
LENOVO (SINGAPORE) PTE LTD
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, without a roaming agreement between the visited mobile network and the home mobile network, the roaming user cannot be authenticated by the home network and cannot be authorized to access the visited network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User authentication using connection information provided by a blockchain network
  • User authentication using connection information provided by a blockchain network
  • User authentication using connection information provided by a blockchain network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] As will be appreciated by those skilled in the art, aspects of the embodiments may be embodied as a system, apparatus, method or program product. Accordingly, an embodiment may take the form of an entirely hardware embodiment, an entirely software embodiment (including firmware, resident software, microcode, etc.), or an embodiment combining software and hardware aspects.

[0017] For example, the disclosed embodiments may be implemented as hardware circuits comprising custom very large scale integration ("VLSI") circuits or gate arrays, off-the-shelf semiconductors such as logic chips, transistors, or other discrete components. The disclosed embodiments may also be implemented in programmable hardware devices such as field programmable gate arrays, programmable array logic, programmable logic devices, and the like. As another example, the disclosed embodiments may comprise one or more physical or logical blocks of executable code, which may, for example, be organized a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Apparatuses, methods, and systems are disclosed for user authentication using a connection information package provided by a blockchain network (160). One apparatus (400) includes a processor (405) and a transceiver (425) that receives (705), from a first address on a blockchain network (160), a plurality of connection information packages and also receives (710), from a first function (215), a request to authenticate a user (205). The processor (405) determines (715) whether the first function (215) is associated with one of the plurality of connection information packages. In response to thefirst function (215) being associated with a valid one of the plurality of connection information package, the processor (405) accepts (720) the request to authenticate a user (205).

Description

technical field [0001] The subject matter disclosed herein relates generally to wireless communications, and more specifically to authenticating users in a visited network via an authentication server in a home network using a connection information package from a blockchain network. Background technique [0002] Accordingly, the following abbreviations and acronyms are defined, at least some of which are referenced in the following description. [0003] Third Generation Partnership Project (“3GPP”), Authentication, Authorization and Accounting (“AAA”), Access and Mobility Management Function (“AMF”), Carrier Aggregation (“CA”), Clear Channel Assessment ( "CCA"), Control Channel Element ("CCE"), Channel State Information ("CSI"), Common Search Space ("CSS"), Downlink Control Information ("DCI"), Downlink ("DL" ), Enhanced Clear Channel Assessment (“eCCA”), Enhanced Mobile Broadband (“eMBB”), Evolved Node B (“eNB”), European Telecommunications Standards Institute (“ETSI”), F...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04L29/06G06Q20/36H04W8/06H04W12/04
CPCH04L63/06H04L63/08H04L63/0869H04L63/0892H04W12/04H04W12/06G06Q20/3674G06Q20/38215H04L65/1069
Inventor 阿波斯陶里斯·索尔金茨
Owner LENOVO (SINGAPORE) PTE LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More