User authentication method

A user authentication and user terminal technology, applied in the field of user authentication, can solve the problems of reducing user satisfaction, low security, and the authentication method cannot support future services, and achieves the effect of improving user satisfaction and security.

Active Publication Date: 2008-03-19
ZTE CORP
View PDF0 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Obviously, the current authentication method will bring losses to the interests of users and operators, and the security is low
[0005] In addition, when the user name and password are used for authentication, it is usually necessary to manually enter the user name and password; however, future business applications (such as telephone, Internet TV, etc.) often do not need to be connected to devices such as computers, so manual input of user names and passwords cannot be realized
Obv

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The technology of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0030] Referring to Fig. 1, Fig. 1 is a flow chart of user authentication in an embodiment of the present invention, and the flow includes the following steps:

[0031] Step 101: Obtain user terminal information and user information from peripheral devices.

[0032] In order to realize the operation of this step, it is necessary to add the circuit design of the memory card reader to the printed circuit board (PCB) circuit of the user terminal, and connect the read and write pins of the memory card reader to the central processing unit of the user terminal. unit (CPU); in this way, when a peripheral device is inserted into the memory card reader-writer on the user terminal, the memory card reader-writer can read the information in the peripheral device from the peripheral device and convert the read information Send it to the CPU of the user termina...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a user authentication method, which is applied to a passive optical network, and a memory card reader is added to a user terminal. The method also includes: the user terminal acquires the User terminal information and user information; perform double authentication including user terminal authentication and user authentication on the user terminal information and user information acquired by the user terminal. It can be seen that the user authentication method provided by the present invention realizes the separation of the user terminal, user terminal information, and user information by adding a memory card reader on the user terminal, and automatically performs double authentication of user terminal authentication and user authentication, making authentication The flexibility and security of the system have been significantly improved, which can effectively improve user satisfaction.

Description

technical field [0001] The invention relates to the field of optical communication, in particular to a user authentication method. Background technique [0002] Now the usual authentication method is to first save the device information in the device in advance, and then the user terminal sends the device information to the optical line terminal (OLT) for authentication. If the authentication is passed, the device is considered legal; The user name and password are used for authentication. Usually, the user enters the user name and password and authenticates through a certain method. If the user passes the authentication, it is considered a legal user. [0003] In the currently applied passive optical network (PON), user terminals such as optical network unit ONU / optical network terminal (ONT) need to be authenticated. This authentication operation is based on the uniquely identifiable identifier assigned to each user terminal in advance. (Each user terminal saves its own u...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/00H04L29/06H04L12/28H04B10/12
CPCH04L63/08
Inventor 卢金树李青谢云鹏马焕南
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products