Fortune Telling Collection - Zodiac Guide - Introduction to certification
Introduction to certification
Authentication includes two aspects:
User authentication: the network authenticates users to prevent illegal users from occupying network resources.
Network authentication, users authenticate the network to prevent users from accessing illegal networks and being defrauded of key information.
Extended data:
The requirements of mobile network for authentication opportunity are as follows:
In 2G and 3G networks, authentication occurs before the start, call, location update and activation, deactivation, registration or deletion of supplementary services.
In 2G networks, operators all adopt the "proportional authentication" scheme.
In 3G networks, users must authenticate when accessing the network for the first time, and then enable the "proportional authentication" scheme.
In IMS network, the network can authenticate users at any time through registration or re-registration process.
References:
Baidu encyclopedia-authentication
- Previous article:What is the constellation of 6.20 _ What is the constellation of 6.20?
- Next article:Susan boyle's 65438+ February horoscope
- Related articles
- What can I do if I don't post it?
- Ancient Martial Arts of the Twelve Constellations _ Ancient Weapons of the Twelve Constellations
- Cf Constellation Weapons Purchase _ Where can I buy CF Constellation Weapons?
- What is the connection between rocks and constellations?
- Born at 5 pm on June 1 1, 2000, what is the rising constellation?
- What are the signs of bed wetting?
- What were the past twelve constellations called _ What were the previous twelve constellations called?
- Belongs to Pisces 2020, love career, zodiac sign.
- The twelve constellations of the Year of the Monkey prevent villains
- Which constellations will urge money back?