Authentication method, equipment and server
An application server and security server technology, applied in the fields of authentication methods, equipment and servers, can solve problems such as inability to meet user needs
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
example 1
[0206] Example 1: The statement information of the Profile certificate (that is, the signature data of the certificate issued by the certificate issuer) carries the identification of the profile's phone number.
[0207] Figure 7 It is a flow chart of another authentication method provided by the embodiment of this application. Such as Figure 7 As shown, the method includes:
[0208] S301. The application sends a login request message for logging in using the eUICC to the LPA.
[0209] Wherein, the login request message may carry R1. In this example, the login request message is the aforementioned initial authentication request message. The login request message may be a login request message triggered by the user clicking a registration or login button of the application.
[0210] Optionally, before step S301, the application negotiates with the application server which authentication method to use for authentication after the user clicks the registration or login butto...
example 2
[0228] Example 2: The statement information of the Profile certificate (that is, the signature data of the certificate issued by the certificate issuer) does not carry the identification of the profile's phone number.
[0229] Figure 8 It is a flow chart of another authentication method provided by the embodiment of this application. Such as Figure 8 As shown, the method includes:
[0230] S401. The application sends a login request message for logging in using the eUICC to the LPA.
[0231] Wherein, the login request message may carry R1. In this example, the login request message is the aforementioned initial authentication request message. The login request message may be a login request message triggered by the user clicking a registration or login button of the application.
[0232] Optionally, before step S401, the application may negotiate with the application server which authentication method to use for authentication after the user clicks the registration or l...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com