General power authentication frame and method of realizing power auttientication
An authentication and network technology, applied in user identity/authority verification, wireless communication, security devices, etc., can solve problems such as non-existence of negotiation, inability of the application server to request business services as a user, and inability to make full use of various resources , to achieve a wide range of applications
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0043] The technical solution of the present invention will be described in detail below in conjunction with the accompanying drawings.
[0044] figure 2 Shown is a schematic diagram of the general authentication network structure of the present invention. In the universal authentication network of the present invention, it not only includes: an entity 201 that only uses services, an entity 204 that only provides services, an entity authentication center (EAC, Entity Authentication Center) 202, and an entity subscription information database server (ESD, Entity Subscription Database) 203, also includes entities 205 that both use and provide services.
[0045] The service-only entity 201 is directly connected to the entity authentication center 202, the service-only entity 204, and the service-using entity 205, and initiates an authentication request to the entity authentication center 202, or sends an authentication request to the service-only entity 202. An entity 204 or a...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 