Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for identifying authority of user

An authentication and user technology, applied in the field of authentication, can solve problems such as inflexible authentication methods

Active Publication Date: 2012-03-21
HUAWEI TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, the way the system authenticates users in the prior art is extremely inflexible. With this authentication method, operators cannot implement the function of authenticating specific users according to their own needs.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for identifying authority of user
  • Method for identifying authority of user
  • Method for identifying authority of user

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] In order to make the object, technical solution and advantages of the present invention clearer, the following examples are given and the present invention is further described in detail with reference to the accompanying drawings.

[0021] The core content of the present invention is: by configuring the user number requiring authentication on the SGSN, after the SGSN receives the activation request sent by the user when executing the service, it can judge the Whether the user needs to be authenticated, and the user who needs to be authenticated should be authenticated.

[0022] Such as figure 1 as shown, figure 1 It is a flow chart of the method of the overall technical solution for user authentication in the present invention, the method at least includes the following steps:

[0023] Step 101: configure the user number to be authenticated on the SGSN;

[0024] Step 102: After receiving the service activation request sent by the user, the SGSN judges whether the us...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The method includes steps: (1) user's number needed to authenticate is configured on wireless service support node of serving general packet; (2) after receiving request for activating service sent by user, the said support node determines whether user's number is included in said numbers needed to authenticate; if yes, authenticate is carried out for user; otherwise, the flow is ended. Using thedisclosed method, the system possesses flexible mode for carrying authentication for users. Based on need, operation manager realizes function of authentication for specific user.

Description

technical field [0001] The invention relates to authentication technology in a mobile communication network system, in particular to a method for authenticating a user. Background technique [0002] Authentication is a technology widely used in existing mobile communication network systems. Utilizing this technology, the system can generally determine whether a user in a Packet Switched (PS) domain is a legitimate user, and prevent illegal users from using the clone card to steal calls. In addition, the system can also use this technology to judge whether users in the PS domain can realize some service functions provided by the system. [0003] At present, in the existing mobile communication network system, the operator decides whether to authenticate the users in the PS domain by controlling the authentication switch configured on the operation and maintenance station. In this way of authenticating users, if the authentication switch is turned on, the system will authent...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32
Inventor 王广伟罗鹏
Owner HUAWEI TECH CO LTD