Terminal authentification system, terminal authentification method
An authentication system and terminal technology, applied in user identity/authority verification, unauthorized/fraud phone call prevention, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0038] First, on the terminal side, an encrypted message is generated using a known encryption unit that encrypts a part of the transmission data (for example, 16 bytes) with its own common key, and the encrypted message is appended to the end of the transmission data and sent. to the server.
[0039] On the server side, use its own common key to decrypt the encrypted message attached to the end of the received data received from the terminal, and judge whether the data from the terminal is correct. If the data from the terminal is correct (the terminal is regular and allowed in the case of a terminal), allowing subsequent data communication.
[0040] In addition, when the data is incorrect (when the terminal is not authorized and authorized), the received data is discarded.
[0041] Next, use figure 1 The terminal authentication system (authentication method) of the present invention will be described.
[0042] figure 1 It is a functional configuration diagram of a wire...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com
