Unlock instant, AI-driven research and patent intelligence for your innovation.

Private network cross-network authentication method and device

An authentication method and private network technology, applied in the communication field, can solve problems such as poor user service experience and low efficiency of fast authentication, and achieve the effect of improving efficiency and user service experience

Active Publication Date: 2022-02-18
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, the efficiency of fast user authentication between different networks is low, and the user service experience is poor.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Private network cross-network authentication method and device
  • Private network cross-network authentication method and device
  • Private network cross-network authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The technical solutions in the embodiments of the present invention will be described below with reference to the drawings in the embodiments of the present invention.

[0029] In the description of the present invention, unless otherwise specified, " / " means "or", for example, A / B may mean A or B. The "and / or" in this article is just an association relationship describing associated objects, which means that there can be three relationships, for example, A and / or B, which can mean: A exists alone, A and B exist at the same time, and B exists alone These three situations. In addition, "at least one" and "plurality" mean two or more. Words such as "first" and "second" do not limit the number and order of execution, and words such as "first" and "second" do not necessarily limit the difference.

[0030]5G non-public network (Non-public network, NPN), sometimes also called private network or private network, provides 5G network to provide services to certain user organiz...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a private network cross-network authentication method and a private network cross-network authentication device, relates to the technical field of communication and are used for safely and effectively performing user identity authentication among a plurality of private networks, improving the efficiency of performing quick authentication among different networks by a user and improving the service experience of the user. The method comprises the steps: under the condition that an initial service network of the electronic equipment is a first private network, if the electronic equipment is located in a service range of a second private network, enabling the electronic equipment to send a registration query request to the second private network; after the second private network receives a registration query request sent by the electronic equipment, sending a target message to the first private network through the block chain cross-network authentication gateway platform; after the first private network receives the target message, acquiring subscription information and identity registration information of the electronic equipment according to the target message, and verifying whether the identity of the electronic equipment is legal or not; and when the first private network determines that the identity of the electronic equipment is legal, sending a response message to the second private network through the block chain cross-network authentication gateway platform, and completing cross-network authentication of the private network.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a private network cross-network authentication method and device. Background technique [0002] Due to the data security and privacy requirements of the network, an independent 5G private network needs to be deployed in industrial parks, large office parks, campuses, shopping malls and other scenarios. The internal network of the private network is isolated from the external network to achieve independent management of internal networks and data And maintenance. [0003] However, due to the complete isolation between the private network and the public network, and between the private network and the private network, when non-locally registered private network users enter the network area, they will face problems such as being unable to obtain network services, or unable to perform network registration efficiently and quickly. For example, public network users use private ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40
CPCH04L63/02
Inventor 任梦璇
Owner CHINA UNITED NETWORK COMM GRP CO LTD