Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for realizing access authentication, device thereof and mobile terminal

An access authentication and mobile terminal technology, applied in security devices, electrical components, wireless communications, etc., can solve the problems of easy cracking of network login passwords, easy cracking and copying of user identification cards, etc., to achieve the effect of improving security.

Inactive Publication Date: 2009-09-09
ZTE CORP
View PDF3 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The above scheme has played a certain role in strengthening the security of access authentication. However, considering the security threats such as the easy loss of the terminal, the easy cracking of the network login password, and the easy cracking and copying of user identification cards such as SIM cards and UIM cards, etc. , the above solution cannot solve the problem that the terminal is lost, the network login password is cracked, or the user identification card is cracked or copied. The thief can directly use the terminal or use the cracked login password or store it in the cracked or copied user identification Authentication information, access to the network or network server with privacy requirements

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing access authentication, device thereof and mobile terminal
  • Method for realizing access authentication, device thereof and mobile terminal
  • Method for realizing access authentication, device thereof and mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The present invention stores part or all of the authentication information required by the terminal to access the private network or network server separately in the mobile storage device of the terminal, which is stored separately from the terminal. When accessing, the mobile storage device needs to be inserted, and the terminal uses the stored The authentication information in the device can be connected to the private network or network server. When exiting the private network or network server, the terminal reminds the user to unplug the mobile storage device that stores the authentication information, so that the authentication information is separated from the terminal. Improve the security of access authentication to avoid illegal access.

[0037] The present invention will be described in detail below in conjunction with the accompanying drawings.

[0038] figure 1 Shown is the access authentication method of the present invention. The present invention is base...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an access authentication method which comprises the steps as follows: a user connects a mobile storage device which stores authentication information to a terminal; the terminal obtains the authentication information from the mobile storage device and sends the obtained authentication information to a network side for authenticating. The invention stores partial or all required authentication information which is accessed with a network or a network server with privacy in the mobile storage device and keeps the authentication information away from the terminal. When the terminal is accessed with the network or the network server with privacy, the authentication only can be finished by the authentication information stored in the mobile storage device, thereby improving the safety for accessing the terminal and avoiding the problem that the embezzler accesses illegally when the terminal is stolen; a network login password is cracked; or a user identification card is cracked or copied.

Description

technical field [0001] The present invention relates to the field of mobile communication, in particular to a method and device for realizing access authentication and a mobile terminal. Background technique [0002] With the development of mobile communication technology, more and more cellular terminals are integrated with wireless Internet access functions such as WLAN (Wireless Local Area Network, wireless local area network) and GPRS (General Packet Radio Service). The wireless Internet access function can meet the needs of people to log in to the network anytime and anywhere, especially WLAN has the advantages of wide transmission bandwidth and high speed, thus broadening the application range of terminals. When using the wireless Internet access function, for those special users who have certain requirements for information security, for example, traffic police upload or download traffic videos, city managers upload or download city management law enforcement videos, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/04H04W12/06H04W84/12H04W88/02H04W12/069H04W12/08H04W12/40
Inventor 侯方西
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products