Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authentication method, device and equipment and computer readable storage medium

An authentication method and an authentication device technology, which are applied in the communication field and can solve the problems of waste of signaling resources and complicated authentication process, etc.

Active Publication Date: 2020-09-11
CHINA MOBILE COMM LTD RES INST +1
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Embodiments of the present invention provide an authentication method, device, device, and computer-readable storage medium to solve the problem of waste of signaling resources caused by the complexity of the existing authentication process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method, device and equipment and computer readable storage medium
  • Authentication method, device and equipment and computer readable storage medium
  • Authentication method, device and equipment and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0110] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0111] see figure 1 , figure 1 is a flow chart of the authentication method provided by the embodiment of the present invention, which is applied to AAuF, such as figure 1 shown, including the following steps:

[0112] Step 101. Obtain an authentication result of the terminal from the AUSF when the first authentication request sent by the AMF is received. Wherein, the authentication result is obtained by the AUSF authenticating the terminal; the fir...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an authentication method, device and equipment, and a computer readable storage medium, relates to the technical field of communication, and aims to solve the problem of signaling resource waste caused by a complex authentication process in the prior art. The method comprises the steps of obtaining an authentication result of a terminal from an AUSF under the condition thata first authentication request sent by an AMF is received. The embodiments of the present invention can save signaling resources.

Description

technical field [0001] The present invention relates to the technical field of communication, and in particular to an authentication method, device, equipment and computer-readable storage medium. Background technique [0002] A major feature of 5G networks is capability openness, that is, to use the advantages and capabilities of operator networks to provide open services for vertical industries to call. NEF (Network Exposure Function, network open function) uses open API (Application Programming Interface, Application programming interface) is provided to vertical industry application developers, and application developers can call it on demand in business logic. [0003] The network's authentication of users is a basic capability provided by the operator's network, which can open the authentication results and further session keys to third-party applications. Among them, the GBA (Generic Bootstrapping Architecture, general bootstrapping architecture) defined by 3GPP (3rd...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/04H04W12/06
CPCH04W12/04H04W12/06Y02D30/70
Inventor 黄晓婷
Owner CHINA MOBILE COMM LTD RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products