Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Terminal authentication method, network side equipment and storage medium

A network-side device and terminal authentication technology, applied in the field of communication, can solve the problems of easy cracking, network system protection cannot meet the security requirements of network access, etc., to achieve the effect of enhanced protection capability, diverse user needs, and flexible deployment

Pending Publication Date: 2022-02-11
CHINA TELECOM CORP LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, the second authentication method of the AAA server is relatively simple and easy to be cracked, and the network system protection cannot meet the growing network access security needs of industry users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal authentication method, network side equipment and storage medium
  • Terminal authentication method, network side equipment and storage medium
  • Terminal authentication method, network side equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The present disclosure will be described more fully hereinafter with reference to the accompanying drawings, in which exemplary embodiments of the present disclosure are illustrated. The following will clearly and completely describe the technical solutions in the embodiments of the present disclosure with reference to the accompanying drawings in the embodiments of the present disclosure. Apparently, the described embodiments are only some of the embodiments of the present disclosure, not all of them. Based on the embodiments in the present disclosure, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present disclosure.

[0032] The "first", "second" and so on in the following are only used to describe the difference, and have no other special meanings.

[0033] figure 1 It is a schematic flow chart according to an embodiment of a terminal authentication method, such as figure...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a terminal authentication method, network side equipment and a storage medium. The method comprises the steps that the network side equipment receives a second identity authentication request sent by a terminal APP, and judges whether an authentication customization strategy corresponding to the terminal APP is set or not; if so, the network side equipment carries out secondary identity authentication on the terminal APP based on the authentication customization strategy; if not, the network side equipment performs second identity authentication on the terminal APP based on the authentication default strategy; and the network side equipment allocates resources to the terminal APP based on the second identity authentication result. According to the method, the equipment and the storage medium disclosed by the invention, the protection capability of a network system is enhanced through a user-customized secondary authentication algorithm and protocol, and the method has the characteristics of flexible deployment of industry slicing services, diverse user requirements and the like; and the protection capability of the network system is enhanced, and end-to-end network access based on network slices is provided for users more safely and reliably.

Description

technical field [0001] The present invention relates to the field of communication technologies, and in particular to a terminal authentication method, network side equipment and storage media. Background technique [0002] At present, the 5G industry private network conducts two identity authentications for terminal access. The first authentication is completed with UDM (Unified Data Management, unified data management function) / ARPF (Authentication credential Repository and Processing Function, authentication credential storage and processing function) and AUSF (Authentication Server Function, authentication server function) between the network access authentication, the second authentication in the AAA (Authentication, Authorization, Accounting, authentication, authorization, accounting) server to perform network slicing service authority authentication in the form of user name + password, Restrict illegal access of unauthorized terminals. At present, the second authenti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/37H04W12/30H04L9/40
CPCH04W12/35H04W12/30H04L63/0892H04L63/0861H04L63/105
Inventor 戴国华吴海波谭华刁永平赵强
Owner CHINA TELECOM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products