Authentication method and system based on 5G power
An authentication and power technology, applied in the field of data security, can solve problems such as vulnerability to attack, low authentication efficiency and reliability, and achieve high authentication reliability and high authentication efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0040] An embodiment of the present invention provides an authentication method based on 5G power, such as figure 1 As shown, the method may specifically include the following steps:
[0041] In step S101, the gateway receives a service establishment request from a user terminal.
[0042] In the embodiment of the present invention, the service establishment request carries encrypted data of the user terminal identity. It is exemplarily applied to a service access system including user terminals, routers, servers, and service systems. The user terminals can send service bearer allocation requests carrying user information such as device identifiers, address locations, etc. through wired or wireless communication. Routers, routers, The server sequentially obtains the service bearer allocation request sent by the user terminal, and finally accesses the service system. Executors of the steps in this embodiment may specifically be various devices with access functions.
[0043] ...
Embodiment 2
[0049] An embodiment of the present invention provides an authentication system based on 5G power, such as figure 2 As shown, the system can specifically include the following modules:
[0050] The receiving module is used for the gateway to receive the service establishment request of the user terminal.
[0051] In the embodiment of the present invention, the service establishment request carries encrypted data of the user terminal identity. It is exemplarily applied to a service access system including user terminals, routers, servers, and service systems. The user terminals can send service bearer allocation requests carrying user information such as device identifiers, address locations, etc. through wired or wireless communication. Routers, routers, The server sequentially obtains the service bearer allocation request sent by the user terminal, and finally accesses the service system. Executors of the steps in this embodiment may specifically be various devices with ac...
Embodiment 3
[0058] An embodiment of the present invention provides an authentication device based on 5G power, such as image 3 As shown, the device may specifically include the following modules:
[0059] The communication bus is used to realize the connection and communication between the processor and the memory;
[0060] The memory is used to store computer programs; the memory may include a high-speed RAM memory, and may also include a non-volatile memory, such as at least one disk memory. The memory may optionally comprise at least one storage device.
[0061] A processor, configured to execute the above computer program to achieve the following steps:
[0062] First, the gateway receives a service establishment request from a user terminal.
[0063] In the embodiment of the present invention, the service establishment request carries encrypted data of the user terminal identity. It is exemplarily applied to a service access system including user terminals, routers, servers, and...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


