Authentication method of the personal hand-held device system
A handheld and mobile phone technology, applied in the field of PHS systems, can solve the problems of inability to solve the detection problem and the inability to completely prevent user information from being stolen, and achieve the effects of reducing the possibility of stolen numbers, improving security, and simple implementation methods
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0034] After the machine card is separated, the system cannot connect the user with the fixed mobile phone. In order to realize two authentication algorithms for a user (updating the authentication KEY algorithm and the existing mobile phone authentication method), the system side of the present invention does not make mandatory requirements for updating the authentication KEY. , and the authentication update is initiated by the mobile phone side, which realizes compatibility with existing terminals and supports the processing of authentication KEY requests for new mobile phones.
[0035] The authentication KEY update in this embodiment is implemented by the following two processes:
[0036] 1) The processing flow of the authentication KEY update request initiated by the mobile phone.
[0037] 2) Authentication processing flow.
[0038] The new authentication algorithm authentication request is independent of the call authentication process. The interface of the call authenti...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 