Joke Collection Website - Public benefit messages - Introduction to certification
Introduction to certification
Authentication includes two aspects:
User authentication: the network authenticates users to prevent illegal users from occupying network resources.
Network authentication, users authenticate the network to prevent users from accessing illegal networks and being defrauded of key information.
Extended data:
The requirements of mobile network for authentication opportunity are as follows:
In 2G and 3G networks, authentication occurs before the start, call, location update and activation, deactivation, registration or deletion of supplementary services.
In 2G networks, operators all adopt the "proportional authentication" scheme.
In 3G networks, users must authenticate when accessing the network for the first time, and then enable the "proportional authentication" scheme.
In IMS network, the network can authenticate users at any time through registration or re-registration process.
References:
Baidu encyclopedia-authentication
- Previous article:What is the reason why the mobile phone suddenly broke down?
- Next article:How old is Wang Dong? Independent director of Titan Technology
- Related articles
- Words to express love on Valentine¡¯s Day, the most romantic confession sentences on Valentine¡¯s Day
- Online fraud can find short messages without giving a verification code.
- How does Android HTC phone recover deleted SMS?
- How to open SMS home service for the New Year on Langfang mobile phone number?
- The family members of the employees of the company received solatium's thanks.
- Reveal the reasons why Li Feier broke up with Huang Xiaoming and Li Feier confronted Angelababy.
- Is it true that micro-loan said that a reminder letter was sent?
- Happy New Year to my female friends.
- Who sent the news of Ping An Pratt & Whitney 1069?
- Blessings to the company