Unlock instant, AI-driven research and patent intelligence for your innovation.

General power authentication frame and method of realizing power auttientication

An authentication and network technology, applied in user identity/authority verification, wireless communication, security devices, etc., can solve problems such as non-existence of negotiation, inability of the application server to request business services as a user, and inability to make full use of various resources , to achieve a wide range of applications

Active Publication Date: 2010-04-14
HUAWEI TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

After adding so many authentication methods, the user and the network side need to be able to negotiate which authentication method they use to complete the mutual authentication process, and there is no negotiation process in the prior art
[0008] Furthermore, in the existing universal authentication network, only the most common user terminals can request service applications, even if they have the ability to provide some simple services for other users. It is also impossible to provide services through the general authentication network system, because in the existing general authentication network system, the application server (AS) cannot be used as a user to request business services. Correspondingly, the application function server can only serve the user Provide business services, but cannot request business services from other servers
It can be seen from this that the existing general authentication network cannot make full use of various resources in the network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • General power authentication frame and method of realizing power auttientication
  • General power authentication frame and method of realizing power auttientication
  • General power authentication frame and method of realizing power auttientication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The technical solution of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0044] figure 2 Shown is a schematic diagram of the general authentication network structure of the present invention. In the universal authentication network of the present invention, it not only includes: an entity 201 that only uses services, an entity 204 that only provides services, an entity authentication center (EAC, Entity Authentication Center) 202, and an entity subscription information database server (ESD, Entity Subscription Database) 203, also includes entities 205 that both use and provide services.

[0045] The service-only entity 201 is directly connected to the entity authentication center 202, the service-only entity 204, and the service-using entity 205, and initiates an authentication request to the entity authentication center 202, or sends an authentication request to the service-only entity 202. An entity 204 or a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The key feature is: the entity certificate authority determines an authentication ways supported by both of the current network and the entity initiating the authentication request in term of the authentication ways supported by the current network and the entity initiating the authentication request; one authentication way is selected from the authentication ways supported by both said party to make authentication with said entity. In the method provided by the invention, an authentication way selecting process is added to extend the application of authentication framework. The invention alsoprovides a general authentication framework.

Description

technical field [0001] The invention relates to the technical field of third-generation wireless communication, in particular to a general authentication network and a method for realizing authentication in the general authentication network. Background technique [0002] In the third-generation wireless communication standard, the general authentication network is a general structure used by various application business entities to complete the verification of user identities. The application of the general authentication network can realize the inspection and verification of users of application services identity. The various application services mentioned above may be multicast / broadcast services, user certificate services, instant information provision services, etc., or proxy services. [0003] figure 1 Shown is a schematic structural diagram of an existing general authentication network. A general authentication network usually consists of a user terminal (UE) 101 ,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04W12/06
CPCH04W12/06H04L63/08H04L63/205H04L63/06
Inventor 黄迎新
Owner HUAWEI TECH CO LTD