Secondary authentication method and device

An authentication method and a technology for authenticating equipment, which are applied in the field of communication, can solve problems such as leakage, and achieve the effects of reducing waste, enhancing safety protection, and effectively protecting

Active Publication Date: 2020-12-18
HUAWEI TECH CO LTD
View PDF14 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the second-level authentication process, the third-party network needs to obtain the user's identity, but the user's identity is usually requested by the operator network from the terminal device and then forwarded to the third-party network. During the process, there is a risk of being leaked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secondary authentication method and device
  • Secondary authentication method and device
  • Secondary authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0074] The technical solution in this application will be described below with reference to the accompanying drawings.

[0075] The technical solution of the embodiment of the present application can be applied to various communication systems, for example: global system of mobile communication (globalsystem of mobile communication, GSM) system, code division multiple access (code division multiple access, CDMA) system, wideband code division multiple access (wideband code division multiple access (WCDMA) system, general packet radio service (general packet radio service, GPRS), long term evolution (long termevolution, LTE) system, LTE frequency division duplex (FDD) system, LTE time division duplex (time division duplex, TDD), universal mobile telecommunications system (universal mobile telecommunications system, UMTS), worldwide interconnection microwave access (worldwide interoperability for microwave access, WiMAX) communication system, fifth generation (5th generation, 5G)...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a secondary authentication method and device, and the method comprises the steps that a core network function entity obtains the identity of first terminal equipment, and the identity of the first terminal equipment is the identity of a first network; and the core network function entity sends the identity identifier of the first terminal device to an authentication device in a second network, the identity identifier of the first terminal device is used for determining an identity identifier of the second network for performing secondary authenticationon a first user, and the identity identifier of the first user is different from the identity identifier of the first terminal device. According to the method, the core network function entity can send the identity identifier of the first terminal device to the authentication device in the second network, and the identity identifier of the first user can be determined through the identity identifier of the first terminal device; the implicit transmission of the identity of the first user can enhance the security protection of the identity of the user in the secondary authentication process.

Description

technical field [0001] The present application relates to the communication field, and more specifically, relates to a method and device for secondary authentication. Background technique [0002] With the rapid development of communication technology, in order to meet the diverse needs of users, many network slices can be deployed in the operator's network to meet the needs of different applications and vertical industries. Before an end device is allowed to access a network or network slice, it needs to perform mutual authentication with the network and / or network slice and be authorized by the network and / or network slice. [0003] At present, the 3rd generation partnership project (3rd generation partnership project, 3GPP) network can support the first-level authentication mechanism and the second-level authentication mechanism at the same time, wherein the first-level authentication mechanism is the authentication between the terminal device and the operator network, an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/00H04W12/06H04W12/08
CPCH04W12/06H04W12/08H04W12/72H04W12/76H04L63/0869H04L63/0876
Inventor 雷中定王海光康鑫
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products