Method and system for confirming terminal identity in mobile terminal communication

A mobile terminal and identity confirmation technology, applied in the field of mobile communication

Inactive Publication Date: 2007-12-05
ZTE CORP
View PDF0 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The technical problem solved by the present invention is to provide a method for confirming the identity of the opposite end in mobile terminal communication, so as to solve the proble

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for confirming terminal identity in mobile terminal communication
  • Method and system for confirming terminal identity in mobile terminal communication
  • Method and system for confirming terminal identity in mobile terminal communication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The purpose of the present invention is to introduce a method and system for confirming the identity of the opposite end in mobile terminal communication. The present invention is based on an asymmetric key algorithm to achieve the purpose of identity confirmation. Specific embodiments are described in detail below, but not as a limitation to the present invention.

[0034] In order to achieve the above purpose, and for the convenience of explanation, take a fixed station (a kind of CDMA wireless terminal) designed and developed based on Qualcomm platform as an example to illustrate how to realize the service of peer identity confirmation in a mobile terminal with peer identity confirmation .

[0035] Embodiments of the present invention adopt the following technical solutions:

[0036] The invention provides a method and system for a mobile terminal to ask the other party to confirm identity at any time during the whole process from the establishment of the communicat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a method of terminal identification in mobile communication, it includes following aspects. (1) The mobile terminal would use the asymmetric key algorithm; the requester who requests the confirmation of identity would receive the public key from the authentication center server, then produce the random string, and then send it to the identified party to ask it encrypt the string. (2) The identified party would encrypt the received random string using the private key, and then send the result to the requester. (3) After the requester receives the result returned by the identified party, the result would be decrypted by the obtained public key. If the result is the same as the random string, identified party would be trusted; if not, the identified party would be listed as a suspected target. The present invention solves the problem that how the mobile communication terminal could ask for identity verification at any time during the whole process from the establishment of communication to the end of communication.

Description

technical field [0001] The invention relates to the technical field of mobile communication, in particular to a method and a system for confirming the identity of a requesting party by a mobile terminal during communication in a wireless network environment. Background technique [0002] Today, with the rapid development of mobile communications, users can basically enjoy voice services anywhere and at any time. But under the existing technology, when the user is talking, it is impossible to confirm whether the person who is talking with himself is the person we need to talk to (especially when more than one person can touch and use the same terminal). In today's society, it is very important to confirm the identity of the other party, otherwise you cannot be sure that you have indeed told the information to the person who should be told, or that the person who told you the information is someone you trust. Therefore, it is necessary to have a method or system that allows u...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04Q7/38H04L9/32H04Q7/32H04W12/02H04W12/06H04W12/069
Inventor 张明昊刘二鹏李琛珲徐发国李广峰苏剑
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products