Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for controlling smart authentication

A control method and authentication technology, applied in the field of communication, can solve the problems such as the inability to reduce the signaling load of frequent authentication sets and the failure of network security protection, so as to achieve flexible and scalable control methods, optimize resource usage, and reduce load Effect

Active Publication Date: 2007-06-20
HUAWEI TECH CO LTD
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0019] 1. When the control switch is turned off, the signature function is invalid for network security protection
[0020] 2. When the control switch is turned on, it cannot reduce the signaling load on the network caused by frequent access to authentication sets

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for controlling smart authentication
  • Method for controlling smart authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] The present invention provides a flexible authentication control method, including the following steps:

[0049] Step A: Set corresponding authentication interval times for various authentication trigger events and user categories;

[0050]Step B: Count the number of unauthenticated times of each user for various authentication trigger events;

[0051] Step C: When the number of times of non-authentication reaches the preset number of authentication intervals, the user is authenticated, otherwise no authentication is performed.

[0052] In order to understand the present invention better, below in conjunction with shown in Figure 1, the method of the present invention is described in further detail:

[0053] In this specific embodiment, the method of the present invention specifically includes the following steps:

[0054] Step 1. Set the corresponding number of authentication intervals for various types of authentication trigger events and user categories, and establ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention is concerned with the flexible identified-right control method, includes: 1) aims at each types of identified-right spring matters, the classification of users set correspondence identified-right interval degree respectively; 2) computes on every user aims at the times of unidentified-right for each type of identified-right spring matter; step C. when the times of unidentified-right reach the reserved identified-right interval degree, conduct the identified-right on the users, otherwise does not do. This control method is flexible in special identified-right matter, especially user's classification when sets the identified-right interval degree in 0, can achieve the conduction of the identified-right every time; when the interval degree is enough, could achieve unidentified-right every time. It combines the network in existence situation simultaneously, according to the special identified-right matter happens in the network (such as location renew, CM operation assessment), users classification statistic module, adjusts the strategic of the identified-right and make a better use of resources.

Description

technical field [0001] The invention belongs to the communication field, in particular to an authentication control method. Background technique [0002] In the mobile communication network, in order to prevent unauthorized users from accessing the system and preventing data theft in the wireless interface, authentication (AUTHENTICATE) is required to identify the user's identity to prevent illegal access. [0003] The storage entity related to user data and subscription data in the mobile communication network is HLR / AUC. The Home Location Register (HLR) is a static database that also stores dynamic data about the MSC area where some roaming mobile subscribers are located. The authentication center (AUC) stores authentication information and encryption keys to prevent unauthorized users from accessing the system and preventing data theft in the wireless interface. In actual network architecture, HLR and AUC are usually set together. [0004] The content of the SIM card i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/00H04L12/24
Inventor 杨建洲
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products