Method for identifying physical uniqueness of networked terminal, and access authentication system for terminals
A network access and terminal technology, which is applied in the field of the physical unique identification method of the network access terminal and the terminal access authentication realization system, can solve the problem that the terminal uniqueness verification method is no longer effective, and achieves the effect of small calculation amount
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment approach
[0051] An embodiment system of the present invention such as figure 1 As shown, it includes a user network access terminal 11, a network access terminal 13, and a transmission link 12 between the user network access terminal 11 and the network access terminal 13, and the user network access terminal 11 includes a user terminal configuration memory inside 111, microprocessor module 112, data transceiving device 113 and random data memory 114, described network access terminal 13 comprises data transceiving device 131, microprocessor module 132, inter-network interface transceiving module 133, network access terminal Configuration memory 134 and login user database module 135 .
[0052] An improved embodiment system of the present invention is as Figure 11 As shown, it includes a user network access terminal 11A, a network access terminal 13A, and a transmission link 12 between the user network access terminal and the network access terminal. The user network access terminal 1...
no. 1 example
[0055] The connection and login process between the user network access terminal 11 and the network access terminal 13 includes such as figure 2 Steps S11-S15 are shown.
[0056] The first step (S11) is to listen to the scheduled broadcast of the network access terminal in order to log in to the network and use the network service. The microprocessor module 132 in the network access terminal 13 takes out configuration parameters such as the broadcast time interval and the current system time from the configuration memory 134, and determines a period of time according to the current network traffic volume as the competition network access time window, and then uses the data transceiver device 131 to broadcast in the clear. The content of the broadcast message 21 includes the determined competition network access time window 213 , timing information 211 determined according to the system time, and other broadcast parameters 214 . After the user terminal 11 receives the broadc...
no. 2 example
[0063] In order to improve the security of the physical uniqueness authentication of the user's network terminal, the following improvements can be made to the connection login process between the user's network terminal 11 and the network access terminal 13, as follows: image 3 Steps S21-S25 are shown.
[0064] The first step (S21) is to listen to the scheduled broadcast of the network access terminal in order to log in to the network and use the network service. The microprocessor module 132 in the network access terminal 13 takes configuration parameters such as the broadcast time interval and the current system time from the configuration memory 134, randomly calculates an initial value of the network key, and determines a period of time according to the current network traffic volume as a competitive network access The time window is then broadcast in plain text through the data transceiver device 131 . The content of the broadcast message 21 includes the initial value ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 