System, application and method for IP network access authentication based on personal identification module IM

An identity recognition module and access authentication technology, applied in user identity/authority verification, transmission system, network connection, etc., can solve problems such as insecure IP network password authentication, and achieve the effect of improving security

Active Publication Date: 2011-07-27
CHINA TELECOM CORP LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] An object of the present invention is to overcome the insecure shortcoming of existing IP network password authentication, improve the security of user identity authentication and the controllability of users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System, application and method for IP network access authentication based on personal identification module IM
  • System, application and method for IP network access authentication based on personal identification module IM
  • System, application and method for IP network access authentication based on personal identification module IM

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037]The present invention adopts PIM / SIM / UIM / USIM card as user identification, utilizes the identity authentication function of mobile networks such as PHS, GSM, CDMA and 3G, realizes IP access and user identity authentication of the application system based on IP access. The user identity authentication system and method provide uniform identity authentication for an application system, thereby supporting provision of multiple services.

[0038] figure 1 Is the overall system block diagram of the present invention. figure 1 The system in includes: an IP network (2) coupled to each IP terminal (1), and the figure shows that the IP terminal (1) includes an IP access terminal (11) and an IP application terminal (12), but is not limited to This; Mobile network (3), shows that mobile network (3) comprises PHS network (31), GSM network (32), CDMA network (33), 3G network (34) in the figure, but is not limited to this; Coupling The application gateway (5) between the IP network ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An IP access authentication system based on an identity identification module IM is disclosed, comprising an IP network coupled to each IP terminal, a mobile network and an application gateway, the system also comprises an authentication proxy between the IP network and the mobile network, the authentication proxy can launch an authentication request to the corresponding mobile network for user identity information; a card reader is arranged at the IP terminal and able to read the user identity information in the IM card; the information is sent to the authentication proxy via the IP network.The invention also provides an application and a method thereof. The invention improves security of the authentication for user identity, expands usage range of smart cards like PIM, SIM, UIM and USIM, and achieves united authentication for users.

Description

technical field [0001] The present invention relates to the field of identity authentication and IP communication, in particular to a system based on PIM (PHS User Identity Module), SIM (GSM User Identity Module), UIM (CDMA User Identity Module) and USIM (3G User Identity Module) A method, a system, and an application for realizing user identity authentication of IP wired access and wireless access of cards. Background technique [0002] Theoretically, there are three elements in identity authentication technology: (1) identity authentication content that needs to be memorized by the user, such as password and ID number, etc.; (2) special authentication strengthening mechanism owned by the user, such as dynamic password card, IC card, Magnetic cards, personal digital certificates and virtual items (client personal digital certificates stored in computers, smart IC cards and USB Keys), etc.; (3) The unique characteristics of the user itself, such as fingerprints, pupils, voic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/28H04L9/32H04L29/06H04L12/66G06K7/00G06K19/067
Inventor 陆立杨新章林有宏梁柏青彭莉
Owner CHINA TELECOM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products