Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authentication verification method, system and device

A verification method and authentication technology, which is applied in the communication field, can solve problems such as low use efficiency and complicated authentication process, and achieve the effects of improving use efficiency, quickly completing authentication verification, and solving the complicated authentication process

Pending Publication Date: 2022-04-12
CHINA TELECOM CORP LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The embodiment of the present application provides an authentication verification method, system and device to at least solve the technical problems of complex authentication process and low efficiency due to the need to rely on network-side equipment to perform authentication and verification on users alone in related technologies

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication verification method, system and device
  • Authentication verification method, system and device
  • Authentication verification method, system and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] In order to enable those skilled in the art to better understand the solution of the present application, the technical solution in the embodiment of the application will be clearly and completely described below in conjunction with the accompanying drawings in the embodiment of the application. Obviously, the described embodiment is only It is an embodiment of a part of the application, but not all of the embodiments. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the scope of protection of this application.

[0022] It should be noted that the terms "first" and "second" in the description and claims of the present application and the above drawings are used to distinguish similar objects, but not necessarily used to describe a specific sequence or sequence. It is to be understood that the data so used are interchangeable under appropriate circumstances such...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an authentication verification method, system and device. The method comprises the following steps: receiving a target request and a first hash value from a data bearing network, and performing hash operation on a first user identifier and a target key to obtain the first hash value; performing hash operation on the first user identifier and the target key to obtain a second hash value; comparing the first hash value with the second hash value, determining the target request as a legal message under the condition that a comparison result indicates that the first hash value is consistent with the second hash value, and generating a response message of the target request; a response message is returned to the terminal, the response message at least carries an authentication file, and the authentication file is used for marking the identity of the terminal so that the rich media communication suite equipment management system can recognize the terminal. According to the method and the device, the technical problems of complex authentication process and low use efficiency caused by the fact that authentication verification needs to be carried out on a user independently by depending on network side equipment in related technologies are solved.

Description

technical field [0001] The present application relates to the communication field, in particular, to an authentication verification method, system and device. Background technique [0002] Under the RCS native terminal, in order to ensure the convenience and user experience of the user, the terminal generally does not actively obtain the user ID from the user, but in order to ensure network security, the RCS network side must identify the user and complete the authentication verification. The existing technology Among them, on the RCS network side, for example, the RCS device management system needs to separately authenticate and verify the user, and the user needs to complete the authentication manually. The authentication process is complicated and the use efficiency is low. [0003] For the above problems, no effective solution has been proposed yet. Contents of the invention [0004] Embodiments of the present application provide an authentication verification method,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40H04L9/06H04L9/08
Inventor 郭江柳赵斌
Owner CHINA TELECOM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products