Unlock instant, AI-driven research and patent intelligence for your innovation.

Terminal authentification system, terminal authentification method

An authentication system and terminal technology, applied in user identity/authority verification, unauthorized/fraud phone call prevention, etc.

Inactive Publication Date: 2012-03-07
KYOCERA CORP
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] Therefore, in a certain country (or region), the same wireless communication system as the already adopted wireless communication system (the first wireless communication system) will be used in other countries ( In the case of expansion, the use of terminals that have been used in the first wireless communication system cannot be restricted as terminals that are allowed to be used in the newly expanded second wireless communication system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal authentification system, terminal authentification method
  • Terminal authentification system, terminal authentification method
  • Terminal authentification system, terminal authentification method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] First, on the terminal side, an encrypted message is generated using a known encryption unit that encrypts a part of the transmission data (for example, 16 bytes) with its own common key, and the encrypted message is appended to the end of the transmission data and sent. to the server.

[0039] On the server side, use its own common key to decrypt the encrypted message attached to the end of the received data received from the terminal, and judge whether the data from the terminal is correct. If the data from the terminal is correct (the terminal is regular and allowed in the case of a terminal), allowing subsequent data communication.

[0040] In addition, when the data is incorrect (when the terminal is not authorized and authorized), the received data is discarded.

[0041] Next, use figure 1 The terminal authentication system (authentication method) of the present invention will be described.

[0042] figure 1 It is a functional configuration diagram of a wire...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an authentication method, an authentication system, a terminal and a server therein. The authentication system is the one of the terminal used in a wireless communication system that accesses the server from the terminal by a base station. The terminal comprises a first encryption unit that encrypts part of data sent from the terminal by universal key to generate a first encryption data; a second encryption unit that changes code row sequence of the first encryption data to generator a second encryption data; and a sending data generation unit that adds the second encryption data on the data to generator the sending data; the server comprises a decryption unit that restores the code row sequence of the second encryption data added on the sending data sent from the terminal and decrypts with the universal key; a data abandoning unit that abandons data received from the terminal under a condition that decrypted data is not proper.

Description

technical field [0001] The present invention relates to a method for preventing unauthorized use of a terminal, and in particular, allows data to be transmitted only to a terminal allowed to be used in a wireless communication system in which a terminal accesses a server via a base station. Background technique [0002] As such a technology, mobile phone terminals (portable phone terminals, car phone terminals) of the AMPS (Advanced Mobile Phone System) system used in North America and Australia, etc. are assigned two types called MIN (Mobile Identification Number) and ESN (Electronic Serial Number). ID number, and store the ID number in non-volatile memory such as built-in EEPROM (Electric Erasable Programmable Read Only Memory). [0003] MIN is equivalent to a telephone number, and ESN is equivalent to a manufacturing number. In the case of making a call, the mobile phone terminal sends the two ID codes to the network, checks whether the group with the two ID codes is re...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04M1/66G06F21/44
Inventor 大谷太郎
Owner KYOCERA CORP
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More