Method for identifying authority of user
An authentication and user technology, applied in the field of authentication, can solve problems such as inflexible authentication methods
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0020] In order to make the object, technical solution and advantages of the present invention clearer, the following examples are given and the present invention is further described in detail with reference to the accompanying drawings.
[0021] The core content of the present invention is: by configuring the user number requiring authentication on the SGSN, after the SGSN receives the activation request sent by the user when executing the service, it can judge the Whether the user needs to be authenticated, and the user who needs to be authenticated should be authenticated.
[0022] Such as figure 1 as shown, figure 1 It is a flow chart of the method of the overall technical solution for user authentication in the present invention, the method at least includes the following steps:
[0023] Step 101: configure the user number to be authenticated on the SGSN;
[0024] Step 102: After receiving the service activation request sent by the user, the SGSN judges whether the us...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 