Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Terminal authentication method and system

An authentication and terminal technology, applied in transmission systems, safety devices, electrical components, etc., can solve the problem that the terminal authentication mechanism is not enough to ensure the security of the terminal user's use of the network, the legitimate rights and interests of the operator, and achieve the protection of legal Benefits and Benefits, Enhanced Security, Effectiveness of Enhanced Protection

Active Publication Date: 2010-09-22
NANJING ZHONGXING SOFTWARE
View PDF4 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] The main purpose of the present invention is to provide a terminal authentication method and system to at least solve the problem that the existing terminal authentication mechanism is not enough to ensure the security of the terminal user using the network and the legitimate rights and interests of the operator

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal authentication method and system
  • Terminal authentication method and system
  • Terminal authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0065] In this embodiment, the authentication server is selected to first perform the first authentication, and if the first authentication succeeds, the second authentication is triggered. Figure 5 is a flow chart of terminal authentication according to Embodiment 1 of the present invention, such as Figure 5 As shown, the process includes:

[0066] Step S501, the terminal is turned on.

[0067] Step S502, the terminal uses communication network services (network registration, voice, short message, data, etc.).

[0068] Step S503, according to the returned system message, the terminal determines whether to perform the first authentication.

[0069] Step S504, if the network requires the terminal to perform the first authentication, the terminal generates the first authentication data according to the personal information preset by the user including terminal information and card information combined with a specific encryption algorithm, and executes step S505; otherwise, ...

Embodiment 2

[0077] In this embodiment, the authentication server is selected to perform the second authentication first, and if the second authentication succeeds, the first authentication is triggered. Image 6 is a flow chart of terminal authentication according to Embodiment 2 of the present invention, such as Image 6 As shown, the process includes:

[0078] Step S601, the terminal is turned on.

[0079] Step S602, the terminal uses communication network services (network registration, voice, short message, data, etc.).

[0080] Step S603, the terminal sends the second authentication data, and the authentication server executes the second authentication operation, if the second authentication is successful, executes the step S604, otherwise, prompts the user to prohibit using the network service.

[0081] Step S604, according to the returned system message, the terminal determines whether to perform the first authentication.

[0082] Step S605, if the network requires the terminal ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a terminal authentication method and terminal authentication system. In the method, an authentication server performs primary authentication of a terminal according to first authentication data sent by the terminal, wherein the first authentication data is generated according to the user characteristic information of the terminal; the authentication server performs secondary authentication of the terminal according to second authentication data sent by the terminal, wherein the second authentication data is generated according to an authentication secret key, a terminal parameter and a network parameter; and when both the primary authentication and the secondary authentication are successful, the authentication server determines that the terminal authentication is successful. When the technical scheme of the invention is adopted, the safety of the use of the network of the user is improved, the protection of the individual privacy of the user is improved, and the legal right and interests of an operator are protected.

Description

technical field [0001] The present invention relates to the field of mobile communications, and in particular, to a terminal authentication method and system. Background technique [0002] With the rapid development and popularization of mobile communication technology, the security of communication technology has become a hot topic of concern. The security of communication is very important to protect the personal privacy and interests of end users. At present, the following methods are mainly used to strengthen the security of end users: [0003] 1. The signaling and data (voice, short message, etc.) interacting between the terminal and the mobile communication system are encrypted by a specific security algorithm to prevent plaintext transmission from being monitored. [0004] 2. Use the International Mobile Station Identity (IMSI) or the Electronic Serial Number (ESN) as the mobile station's identification. [0005] 3. The terminal authentication mechanism is introduce...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/06H04W88/02H04W12/72
CPCH04W12/06H04L2463/082H04W12/069
Inventor 王斌
Owner NANJING ZHONGXING SOFTWARE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products