CN104735027A - Safety authentication method and authentication certification server - Google Patents

Safety authentication method and authentication certification server Download PDF

Info

Publication number
CN104735027A
CN104735027A CN201310711221.5A CN201310711221A CN104735027A CN 104735027 A CN104735027 A CN 104735027A CN 201310711221 A CN201310711221 A CN 201310711221A CN 104735027 A CN104735027 A CN 104735027A
Authority
CN
China
Prior art keywords
authentication
terminal
user
authentication server
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201310711221.5A
Other languages
Chinese (zh)
Other versions
CN104735027B (en
Inventor
孙枕戈
田锋
张军
岳旭鹏
陈亚红
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Zhongxing Software Co Ltd
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201310711221.5A priority Critical patent/CN104735027B/en
Priority to PCT/CN2014/078232 priority patent/WO2015089996A1/en
Publication of CN104735027A publication Critical patent/CN104735027A/en
Application granted granted Critical
Publication of CN104735027B publication Critical patent/CN104735027B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/068Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0884Network architectures or network communication protocols for network security for authentication of entities by delegation of authentication, e.g. a proxy authenticates an entity to be authenticated on behalf of this entity vis-à-vis an authentication entity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/72Subscriber identity

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention discloses a safety authentication method and an authentication certification server. The method includes the steps that when a terminal establishes bearing connection, the user state is activated through the authentication certification server; when a terminal user visits a campus network application, an application service conducts authentication on the user identity through the authentication certification server. By means of the safety authentication method, safety authentication is finished through equipment in a network, user participation is lowered, the authentication efficiency is improved obviously, the user authentication time is saved, most importantly, safety certification activation is conducted through the carrier-grade campus networks, such as, the government network, the enterprise network, the public service network and other organized networks, the carrier-grade safety certification level is achieved, that is, an SIM card plus an authentication certification server safety authentication mode is adopted, and user experience is improved obviously.

Description

A kind of safety certifying method and authentication server
Technical field
The present invention relates to network security technology, espespecially a kind of safety certifying method and authentication server.
Background technology
Along with global information and the communication technology (ICT, Information and CommunicationTechnology) fast development of industry (comprising the combination of telecommunications service, information service, IT service and application), network security and information security become one of key problem that people pay close attention to day by day.How to carry out reliable certification, carry out the safety of the key areas such as protection information, finance, trade secret, become one of most important technology of communication and information industry.
At present, the authentication that industry is popular has a variety of, following the most basic four kinds can be summarized as: one is the security mechanism of user name+password (Static and dynamic), wherein dynamic password generally includes short message password, dynamic token (usually based on time synchronizing method, generating new password in certain time interval), handset token (generating dynamic password by mobile phone client software) etc.; General internet business adopts static password authentication usually, and bank and payment class business adopt dynamic password usually; The second is digital certificate authentication (USBKEY), and the Internet bank takes this authentication mode usually; The third is the authentication mode based on shared key, such as universal guiding certification (GBA, Generic BootstrappingAuthentication), namely based on the authentication mode of mobile Universal Integrated Circuit Card (UICC) with shared key K in home subscriber server (HSS), such as China Mobile's mobile phone TV services adopt this authentication mode; 4th kind is the certification based on biological characteristic: as fingerprint, iris, face etc.Usually, system can use the combination of above-mentioned multiple authentication mode, and the dual factor anthentication namely often said, increases the security intensity of certification.
In traditional network OSI7 Rotating fields, network layer network element is logically separated completely with application layer network, the connection establishment of network layer primary responsibility network and deletion; The foundation of application layer primary responsibility service application and deletion, this two-layer agreement flow process having identification safety authentication respectively in traditional scheme, and not cross-reference.At present, above-mentioned all existing certificate schemes all realize in application layer.And there is the problem using complexity in existing authentication, such as, for USBKEY mode, just must additionally carry U shield; For another example, for the mode of dynamic short message password, realize more complicated, user needs the short message password of wait again according to SMS notification after 5 ~ 20 seconds to input, and reduces Consumer's Experience.
Based on above-mentioned authentication, the application of existing government and enterprises is all the authentication realized in application layer, and such as VPN (virtual private network) (VPN), digital certificate etc., safe class is lower, is easily cracked.And the existing certification for garden user, need generally to use in the various terminals of different hardware platforms and operating system, adaptive Comparision is loaded down with trivial details, and authentication efficiency is low, reduces Consumer's Experience.
Summary of the invention
In order to solve the problems of the technologies described above, the invention provides a kind of safety certifying method and authentication server, simply, efficiently can realize certification, and security classification being high.
In order to reach the object of the invention, the invention provides a kind of safety certifying method, comprising: set up in bearer connection in terminal, by authentication server excited users state;
When end-user access Campus Networks is applied, application server carries out certification by authentication server to user identity.
Describedly set up in bearer connection in terminal, comprised by authentication server excited users state:
The described packet gateway set up in terminal in bearer connection, for validated user monthly dynamics IP address, and judge whether the terminal of asking to set up bearer connection is Campus Networks user, if, send registration request to the authentication server in Campus Networks, and the international mobile subscriber identity IMSI of terminal and the IP address of distribution are carried to authentication server;
Described authentication server can activate according to IMSI completing user, stores this IP address.
Described authentication server can activate according to IMSI completing user and comprise:
Described authentication server is according to the IMSI of described terminal, determine whether terminal use belongs to the validated user of Campus Networks belonging to authentication server, if so, authentication username password, to confirm whether the terminal use that IMSI is corresponding mates with the user name in request; And whether the password of verified users name correspondence is correct.
After certification completes, if coupling and correct, then authentication success, described IP address associates with IMSI, employee information by described authentication server, and returns to register to described packet gateway and respond as the information of succeeding in registration.
Describedly by authentication server, certification is carried out to user identity and comprises:
The IP address received is carried in application access request and sends to authentication server by described application server; After described authentication server completes certification, by user profile corresponding for this IP address, return to application server;
Authentication server submitted to by the password of described application server self terminal user in future, and described authentication server is verified password and the result is returned to application server.
Described when terminal use disconnects Campus Networks, the method also comprises:
Described packet gateway sends de-registration request to authentication server, wherein carries the IMSI of terminal, IP address;
Described authentication server removes the IP address of this terminal that self preserves and the incidence relation of IMSI, user profile, and returns to nullify to described packet gateway and respond;
Described packet gateway returns to terminal and nullifies response, disconnects Campus Networks to make terminal.
The present invention also provides a kind of authentication server, for setting up in bearer connection in terminal, and excited users state; When end-user access Campus Networks is applied, certification is carried out to user identity.
Described authentication server at least comprises authentication module, authentication module, wherein,
Authentication module, for receiving the registration request from packet gateway, activating according to terminal IMSI completing user and storing the IP address with shadow, carries out safety certification and to packet gateway return authentication result to user terminal;
Authentication module, for when receiving the application access request from application server, according to the authentication result of authentication module, after completing further certification, returns user profile corresponding to this IP address to application server; When receiving the password submitted to from application server, verify that backward application server returns the result.
Described authentication module, also for receiving the de-registration request from packet gateway, removing IP address and IMSI, the user profile of the terminal of the request cancellation of self preserving, and returning cancellation response to packet gateway.
Described authentication server is the authentication server in the Campus Networks of IT side.
Compared with prior art, technical scheme provides and is included in terminal and sets up in bearer connection, by authentication server excited users state; When end-user access Campus Networks is applied, application server carries out certification by authentication server to user identity.By safety certifying method of the present invention, safety certification has been come by the equipment in network, decrease the participation of user, significantly improve authentication efficiency, saving the user authentication time, the more important thing is, carrying out safety certification activation by having carrier-class Campus Networks (making a general reference the organized networks such as government, enterprise, government utility), reach the authentication that namely carrier class safety certification level present invention employs SIM card+authentication server, significantly improve Consumer's Experience.
Other features and advantages of the present invention will be set forth in the following description, and, partly become apparent from specification, or understand by implementing the present invention.Object of the present invention and other advantages realize by structure specifically noted in specification, claims and accompanying drawing and obtain.
Accompanying drawing explanation
Accompanying drawing described herein is used to provide a further understanding of the present invention, and form a application's part, schematic description and description of the present invention, for explaining the present invention, does not form inappropriate limitation of the present invention.In the accompanying drawings:
Fig. 1 is the flow chart of safety certifying method of the present invention;
Fig. 2 is the flow chart that in safety certifying method of the present invention, terminal sets up the embodiment of bearer connection;
Fig. 3 is the flow chart of the embodiment of Campus Networks certification in safety certifying method of the present invention;
Fig. 4 is the flow chart that in safety certification of the present invention, user accesses the embodiment of Campus Networks application;
Fig. 5 is the flow chart of the embodiment of terminal log-down Campus Networks of the present invention access;
Fig. 6 is the composition structural representation of authentication server of the present invention.
Embodiment
For making the object, technical solutions and advantages of the present invention clearly understand, hereinafter will be described in detail to embodiments of the invention by reference to the accompanying drawings.It should be noted that, when not conflicting, the embodiment in the application and the feature in embodiment can combination in any mutually.
Fig. 1 is the flow chart of safety certifying method of the present invention, and as shown in Figure 1, the present invention is applied in the scene using mobile terminal SIM card, the data card of the equipment such as such as mobile phone, PAD, notebook computer, PC.Comprise the following steps:
Step 100: set up in bearer connection in terminal, by authentication server excited users state.
In this step, terminal and pass through communication network, comprise base station, mobile management unit (MME), gateway (SGW), packet gateway (LGW/PGW), bearer connection is set up with network, in existing bearer connection process of establishing, for Campus Networks user, in the present invention, authentication request can be sent to the authentication server in Campus Networks.The organized networks such as Campus Networks general reference government, enterprise, government utility.
Fig. 2 is the flow chart that in safety certifying method of the present invention, terminal sets up the embodiment of bearer connection, as shown in Figure 2, comprising:
Step 200: user starts shooting, the process of triggering terminal (UE) attach to network, UE sends network attachment request (Attach Request) message to MME.Herein, if UE has adhered to successfully, so need first to initiate separation process, then initiated attaching process.
Step 201:MME triggers and sets up default bearing process, sends session request (CreateSession Request) message to SGW.
Session request (Create Session Request) message is forwarded to LGW/PGW by step 202:SGW.
Step 203 ~ step 204:LGW/PGW is validated user monthly dynamics IP address, and judge whether the terminal of asking to set up bearer connection is Campus Networks user, if, LGW/PGW sends registration request to the authentication server in Campus Networks, and the IP address of the international mobile subscriber identity (IMSI) of terminal and distribution is carried to authentication server, and authentication server can activate according to IMSI completing user, store this IP address.
In this step, the organized networks such as Campus Networks general reference government, enterprise, government utility.Garden user refers to and is set to the Campus Networks users such as APN as user.In this step, authentication server can be the authentication server (Authentication Server) being positioned at IT side Campus Networks.From this step, while terminal is carried out adhering to and set up bearer connection, carry out the activation of carrier class safety certification by Campus Networks, make whole safety certification be provided with higher level of security.
Step 205: meanwhile, LGW/PGW returns conversational response (Create SessionResponse) message to SGW, carries the IP address of distribution in conversational response message.
The conversational response received (Create Session Response) message is transmitted to MME by step 206:SGW.
Step 207:MME adheres to successfully, sends attachment response (Attach Accept) message carrying the IP address of distribution to UE.User adheres to successfully, namely completes terminal bearer connection and sets up.
Fig. 3 is the flow chart of the embodiment of Campus Networks certification in safety certifying method of the present invention, and as shown in Figure 3, LGW/PGW sends authentication request to authentication server and specifically comprises:
Step 300: terminal use sends registration request to LGW/PGW, the IP address of the IMSI of terminal and distribution is carried and is sent to authentication server in the registration request by LGW/PGW.
Further, account corresponding to terminal and encrypted message is also carried in a registration request message.
Step 301: authentication server carries out safety certification to user terminal.Specifically comprise:
First, according to the IMSI of terminal, determine whether terminal use belongs to the validated user of Campus Networks belonging to authentication server, if so, further authentication username password, to confirm whether the terminal use that IMSI is corresponding mates with the user name in request; And whether the password of verified users name correspondence is correct.
After certification completes, if authentication success, namely above-mentioned inspection is all correct, then associated with IMSI, employee information such as employee's job number IP address, and returns to register to LGW/PGW and respond as the information of succeeding in registration; Otherwise, return to LGW/PGW and register response as registration failure information.
Step 302:LGW/PGW, according to the registration reply message obtained, confirms whether terminal can secure accessing Campus Networks.
The IP address of distribution is carried and is returned to UE in the registration response by step 303:LGW/PGW, adds Campus Networks to make UE.
As can be seen from step 100, in safety certifying method provided by the invention, when Campus Networks user sets up carrying at every turn between terminal and network, LGW/PGW mono-aspect will be user terminal monthly dynamics IP address, on the other hand, also to initiate the request of excited users state to authentication server, the IP address of the IMSI of terminal and distribution is pushed to authentication server simultaneously and carry out safety certification.Achieve while terminal is carried out adhering to and set up bearer connection, carrying out safety certification by having carrier-class Campus Networks, making whole safety certification be provided with higher level of security.
Step 101: when end-user access Campus Networks is applied, application server carries out certification by authentication server to user identity.In this step, application server can be the application server (Application Server) being positioned at IT side Campus Networks.
This step specific implementation as shown in Figure 4, comprising:
Step 400: terminal initiates to the application server of Campus Networks the application access request carrying own IP address by Transmission Control Protocol, to ask to access Campus Networks.
Step 401: the IP address received is carried in application access request and sends to authentication server to carry out certification by application server.
Step 402: after authentication server completes certification, by user profile corresponding for this IP address as employee's job number, returns to application server.
Step 403: application server is by the user profile that receives as employee's job number, and certification page is pushed to terminal.
Step 404: user by certification page, according to user profile typing password, and submits to application server in terminal.
Step 405: the password of acquisition is submitted to authentication server by application server.
Step 406: authentication server is verified the password received and the result is returned to application server.The realization that realizes certification of how accessing to your password belongs to the conventional techniques means of those skilled in the art, repeats no more here.
Step 407: at the result display authentication success, namely password corresponding with user profile and correctly time, the Campus Networks application page is pushed to terminal by application server.
In Fig. 4, Campus Networks application can according to the information registered in advance as user name, the information such as IMSI, in conjunction with IMSI and the IP address information that Campus Networks provides, just can judge that real user profile corresponding to the IP address of each terminal use is as employee information or user name etc.; And Campus Networks application can require cipher authentication by real username information to user, with completing user authentication.
From step 101, when user terminal access Campus Networks is applied, system obtains user identity, and only need carry out password confirming, and not need again to input account information, application service level is consistent with existing mode to the certification of user identity.And the carrier-class Campus Networks that has in step 100 carries out safety certification activation, far above the safety certification grade of general Campus Networks, the safety certification of 3G and the 4G cellular mobile communication technology that it mainly relies on, makes whole safety certification be provided with higher level of security.
When terminal use leaves Campus Networks, the inventive method also comprises:
Step 102: when terminal use disconnects Campus Networks, is nullified user identity by authentication server.Specific implementation as shown in Figure 5, comprising:
Step 500: terminal use sends de-registration request to LGW/PGW, the IP address of the IMSI of terminal and distribution is carried in de-registration request and sends to authentication server by LGW/PGW.
Step 501 ~ step 502: the IP address that the removing of authentication server self is preserved and IMSI, user profile as the incidence relation of employee's job number, and return cancellation response to LGW/PGW.
Step 503:LGW/PGW returns to UE and nullifies response, disconnects Campus Networks to make UE.
By safety certifying method of the present invention, safety certification has been come by the equipment in network, decrease the participation of user, significantly improve authentication efficiency, saving the user authentication time, the more important thing is, carrying out safety certification activation by having carrier-class Campus Networks, reach the authentication of carrier class safety certification level and SIM card+authentication server, significantly improve Consumer's Experience.
Fig. 6 is the composition structural representation of authentication server of the present invention, as shown in Figure 6, for setting up in bearer connection in terminal, and excited users state; When end-user access Campus Networks is applied, certification is carried out to user identity.At least comprise authentication module, authentication module, wherein,
Authentication module, for receiving the registration request from packet gateway, activating according to the IMSI completing user of terminal and storing the IP address with shadow, carries out safety certification and to packet gateway return authentication result to user terminal;
Authentication module, also for receiving the de-registration request from packet gateway, removing IP address and IMSI, the user profile of the terminal of the request cancellation of self preserving, and returning cancellation response to packet gateway.
Authentication module, for when receiving the application access request from application server, according to the authentication result of authentication module, after completing further certification, returns user profile corresponding to this IP address to application server; When receiving the password submitted to from application server, verify that backward application server returns the result.
The above, be only preferred embodiments of the present invention, be not intended to limit protection scope of the present invention.Within the spirit and principles in the present invention all, any amendment made, equivalent replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (9)

1. a safety certifying method, is characterized in that, comprising: set up in bearer connection in terminal, by authentication server excited users state;
When end-user access Campus Networks is applied, application server carries out certification by authentication server to user identity.
2. safety certifying method according to claim 1, is characterized in that, describedly sets up in bearer connection in terminal, is comprised by authentication server excited users state:
The described packet gateway set up in terminal in bearer connection, for validated user monthly dynamics IP address, and judge whether the terminal of asking to set up bearer connection is Campus Networks user, if, send registration request to the authentication server in Campus Networks, and the international mobile subscriber identity IMSI of terminal and the IP address of distribution are carried to authentication server;
Described authentication server can activate according to IMSI completing user, stores this IP address.
3. safety certifying method according to claim 2, is characterized in that, described authentication server can activate according to IMSI completing user and comprise:
Described authentication server is according to the IMSI of described terminal, determine whether terminal use belongs to the validated user of Campus Networks belonging to authentication server, if so, authentication username password, to confirm whether the terminal use that IMSI is corresponding mates with the user name in request; And whether the password of verified users name correspondence is correct;
After certification completes, if coupling and correct, then authentication success, described IP address associates with IMSI, employee information by described authentication server, and returns to register to described packet gateway and respond as the information of succeeding in registration.
4. safety certifying method according to claim 3, is characterized in that, describedly carries out certification by authentication server to user identity and comprises:
The IP address received is carried in application access request and sends to authentication server by described application server; After described authentication server completes certification, by user profile corresponding for this IP address, return to application server;
Authentication server submitted to by the password of described application server self terminal user in future, and described authentication server is verified password and the result is returned to application server.
5. the safety certifying method according to any one of claim 2 ~ 4, is characterized in that, described when terminal use disconnects Campus Networks, the method also comprises:
Described packet gateway sends de-registration request to authentication server, wherein carries the IMSI of terminal, IP address;
Described authentication server removes the IP address of this terminal that self preserves and the incidence relation of IMSI, user profile, and returns to nullify to described packet gateway and respond;
Described packet gateway returns to terminal and nullifies response, disconnects Campus Networks to make terminal.
6. an authentication server, is characterized in that, for setting up in bearer connection in terminal, and excited users state; When end-user access Campus Networks is applied, certification is carried out to user identity.
7. authentication server according to claim 6, is characterized in that, described authentication server at least comprises authentication module, authentication module, wherein,
Authentication module, for receiving the registration request from packet gateway, activating according to terminal IMSI completing user and storing the IP address with shadow, carries out safety certification and to packet gateway return authentication result to user terminal;
Authentication module, for when receiving the application access request from application server, according to the authentication result of authentication module, after completing further certification, returns user profile corresponding to this IP address to application server; When receiving the password submitted to from application server, verify that backward application server returns the result.
8. authentication server according to claim 7, it is characterized in that, described authentication module, also for receiving the de-registration request from packet gateway, remove IP address and IMSI, the user profile of the terminal of the request cancellation of self preserving, and return cancellation response to packet gateway.
9. the authentication server according to any one of claim 6 ~ 8, is characterized in that, described authentication server is the authentication server in the Campus Networks of IT side.
CN201310711221.5A 2013-12-20 2013-12-20 A kind of safety certifying method and authentication server Active CN104735027B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201310711221.5A CN104735027B (en) 2013-12-20 2013-12-20 A kind of safety certifying method and authentication server
PCT/CN2014/078232 WO2015089996A1 (en) 2013-12-20 2014-05-23 Security authentication method and authorization authentication server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310711221.5A CN104735027B (en) 2013-12-20 2013-12-20 A kind of safety certifying method and authentication server

Publications (2)

Publication Number Publication Date
CN104735027A true CN104735027A (en) 2015-06-24
CN104735027B CN104735027B (en) 2019-09-13

Family

ID=53402039

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310711221.5A Active CN104735027B (en) 2013-12-20 2013-12-20 A kind of safety certifying method and authentication server

Country Status (2)

Country Link
CN (1) CN104735027B (en)
WO (1) WO2015089996A1 (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105446148A (en) * 2015-12-04 2016-03-30 美的集团股份有限公司 Network distribution method for household electrical appliance, household electrical appliance and mobile terminal
CN105446149A (en) * 2015-12-04 2016-03-30 美的集团股份有限公司 Network distribution method for household electrical appliance, household electrical appliance and mobile terminal
CN106302475A (en) * 2016-08-18 2017-01-04 中国联合网络通信集团有限公司 Family's Internet service authorization method and server
CN106657045A (en) * 2016-12-13 2017-05-10 翁印嵩 Multi-network integrated security and authentication method and system
CN107360164A (en) * 2017-07-13 2017-11-17 上海司南卫星导航技术股份有限公司 Non- poor correction distributed processing system(DPS) and its user name method for authenticating based on reference station receiver
CN107367946A (en) * 2016-05-11 2017-11-21 珠海格力电器股份有限公司 Method and device for controlling equipment
CN109246160A (en) * 2017-06-15 2019-01-18 阿里巴巴集团控股有限公司 Access method, apparatus, system and the equipment of Internet application
CN110753362A (en) * 2019-10-25 2020-02-04 恒安嘉新(北京)科技股份公司 Base station optimization method, terminal registration method, device, base station and storage medium
CN111385154A (en) * 2020-03-18 2020-07-07 成都千立网络科技有限公司 Internet of things control system and method based on authentication linkage mechanism

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106534091B (en) * 2016-10-26 2019-07-23 浙江中控软件技术有限公司 Pid parameter setting method and device based on cloud

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20040049188A (en) * 2002-12-05 2004-06-11 엘지전자 주식회사 Inter-working Method Between Wireless Local Area Network and Universal Mobile Telecommunication System Network
EP1624639A1 (en) * 2004-08-02 2006-02-08 Service Factory SF AB Sim-based authentication
CN1855933A (en) * 2005-04-06 2006-11-01 神州数码网络(北京)有限公司 System and method for certification and charge of network
US20080095129A1 (en) * 2003-02-18 2008-04-24 Cisco Technology, Inc. Managing Network Service Access
CN101511086A (en) * 2009-04-01 2009-08-19 神州数码网络(北京)有限公司 Wireless safety networking system and method for financial grid point terminal
CN101651682A (en) * 2009-09-15 2010-02-17 杭州华三通信技术有限公司 Method, system and device of security certificate
CN102892110A (en) * 2012-09-19 2013-01-23 邦讯技术股份有限公司 Method and system for keeping consistency of user identifications of terminal in different networks

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101547095B (en) * 2009-02-11 2011-05-18 广州杰赛科技股份有限公司 Application service management system and management method based on digital certificate
US8600355B1 (en) * 2012-05-17 2013-12-03 Cellco Partnership Systems and methods for authenticating applications for access to secure data using identity modules

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20040049188A (en) * 2002-12-05 2004-06-11 엘지전자 주식회사 Inter-working Method Between Wireless Local Area Network and Universal Mobile Telecommunication System Network
US20080095129A1 (en) * 2003-02-18 2008-04-24 Cisco Technology, Inc. Managing Network Service Access
EP1624639A1 (en) * 2004-08-02 2006-02-08 Service Factory SF AB Sim-based authentication
CN1855933A (en) * 2005-04-06 2006-11-01 神州数码网络(北京)有限公司 System and method for certification and charge of network
CN101511086A (en) * 2009-04-01 2009-08-19 神州数码网络(北京)有限公司 Wireless safety networking system and method for financial grid point terminal
CN101651682A (en) * 2009-09-15 2010-02-17 杭州华三通信技术有限公司 Method, system and device of security certificate
CN102892110A (en) * 2012-09-19 2013-01-23 邦讯技术股份有限公司 Method and system for keeping consistency of user identifications of terminal in different networks

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105446149B (en) * 2015-12-04 2019-01-22 美的集团股份有限公司 Household electrical appliance match network method, household electrical appliance and mobile terminal
CN105446149A (en) * 2015-12-04 2016-03-30 美的集团股份有限公司 Network distribution method for household electrical appliance, household electrical appliance and mobile terminal
CN105446148A (en) * 2015-12-04 2016-03-30 美的集团股份有限公司 Network distribution method for household electrical appliance, household electrical appliance and mobile terminal
CN107367946A (en) * 2016-05-11 2017-11-21 珠海格力电器股份有限公司 Method and device for controlling equipment
CN106302475A (en) * 2016-08-18 2017-01-04 中国联合网络通信集团有限公司 Family's Internet service authorization method and server
CN106302475B (en) * 2016-08-18 2019-09-10 中国联合网络通信集团有限公司 Family's Internet service authorization method and server
CN106657045A (en) * 2016-12-13 2017-05-10 翁印嵩 Multi-network integrated security and authentication method and system
WO2018108022A1 (en) * 2016-12-13 2018-06-21 翁印嵩 Multi-network integration security and authentication method and system
CN106657045B (en) * 2016-12-13 2020-10-13 翁印嵩 Multi-network integrated security and authentication method and system
CN109246160A (en) * 2017-06-15 2019-01-18 阿里巴巴集团控股有限公司 Access method, apparatus, system and the equipment of Internet application
CN109246160B (en) * 2017-06-15 2022-01-21 阿里巴巴集团控股有限公司 Method, device, system and equipment for accessing internet application
CN107360164A (en) * 2017-07-13 2017-11-17 上海司南卫星导航技术股份有限公司 Non- poor correction distributed processing system(DPS) and its user name method for authenticating based on reference station receiver
CN107360164B (en) * 2017-07-13 2020-11-10 上海司南卫星导航技术股份有限公司 User name authentication method and non-differential correction distributed processing system
CN110753362A (en) * 2019-10-25 2020-02-04 恒安嘉新(北京)科技股份公司 Base station optimization method, terminal registration method, device, base station and storage medium
CN111385154A (en) * 2020-03-18 2020-07-07 成都千立网络科技有限公司 Internet of things control system and method based on authentication linkage mechanism

Also Published As

Publication number Publication date
CN104735027B (en) 2019-09-13
WO2015089996A1 (en) 2015-06-25

Similar Documents

Publication Publication Date Title
CN104735027A (en) Safety authentication method and authentication certification server
TWI386100B (en) Communication apparatuses and methods for handling apparatus terminated communication request
CN104144402B (en) Realize the method and relevant apparatus of mobile terminal localized roaming
US7882346B2 (en) Method and apparatus for providing authentication, authorization and accounting to roaming nodes
CN110800331A (en) Network verification method, related equipment and system
CN103619020A (en) Mobile payment security system for wireless data private network physical isolation internet
CN103475751B (en) A kind of method and device of IP address switching
CN105307108A (en) Internet of things information interactive communication method and system
WO2017049736A1 (en) Mobile communications network access method and device
WO2016161832A1 (en) System and corresponding method for realizing mobile communication via sim card management
CN102882853A (en) System and method for internet user authentication
CN107864475A (en) The quick authentication methods of WiFi based on Portal+ dynamic passwords
CN101867897A (en) Telephone terminal, system and method for supporting IP short messages
US10219309B2 (en) D2D service authorizing method and device and home near field communication server
CN104660405A (en) Business equipment authentication method and equipment
CN103095721B (en) A kind of method, terminal and system setting up secure connection
CN107708103B (en) Method for realizing number security based on MAP signaling
CN110446277B (en) VoWiFi service access method for dual-card terminal and terminal
US20020042820A1 (en) Method of establishing access from a terminal to a server
CN114095929B (en) Account security enhancement method in B-trunk system
CN107786937B (en) Method for realizing mobile terminal localization roaming, mobile terminal and roaming server
CN104539446A (en) Shared WLAN management achieving method and system and WLAN shared registering server
US20220232382A1 (en) Controlling provision of access to restricted local operator services by user equipment
CN110636501B (en) Mobile position information hiding method and system
CN110582085B (en) Communication method, device and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20190809

Address after: Yuhuatai District of Nanjing City, Jiangsu province 210012 Bauhinia Road No. 68

Applicant after: Nanjing Zhongxing New Software Co., Ltd.

Address before: 518057 Nanshan District Guangdong high tech Industrial Park, South Road, science and technology, ZTE building, Ministry of Justice

Applicant before: ZTE Corporation

GR01 Patent grant
GR01 Patent grant