User authentication module setting method and system

A user authentication module and user authentication technology, which are applied in the field of setting method and setting system of user authentication module, can solve the problems of difficult management, poor security, low usage rate of key code segment, etc., so as to improve utilization rate and ensure security. and convenience

Active Publication Date: 2011-01-26
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF2 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The purpose of the present invention is to provide a method and system for setting up a user authentication module, which can solve the technical problems of low utilization rate of the key number segment, poor security, and difficulty in management

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User authentication module setting method and system
  • User authentication module setting method and system
  • User authentication module setting method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The setting management of the UAM module has always left operators, service providers and mobile terminal manufacturers at a loss. The three technical solutions for setting the UAM module provided by the existing technology have their own disadvantages, and none of them can improve the security of the UAM setting. Convenience and utilization of the number segment. Based on this technical situation, the present invention provides an efficient and safe user authentication module setting method and system.

[0024] Before describing the embodiments of the present invention in detail, first explain that the core component UAM module (user authentication module, user authentication module) involved in the present invention means that when the mobile terminal wants to use certain functions, especially the charging function, it needs to first After user authentication, the corresponding functions can be used, these functions include but not limited to CMMB (China Mobile Multim...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a user authentication module setting method and a user authentication module setting system. The method comprises that: communication connection between a near-field wireless communication NFC module of a mobile terminal and a point-of-sale POS terminal which is preset with user authentication information is established; the POS terminal transmits the preset user authentication information to the NFC module of the mobile terminal, and the NFC module of the mobile terminal transmits the user authentication information to a user authentication module through an interface between the NFC module and the user authentication module of the mobile terminal until the setting of the user authentication module is completed. The user authentication module setting method and the user authentication module setting system have the advantages of guaranteeing safety and portability of the user authentication information and improving the utilization rate of key number segments.

Description

technical field [0001] The invention relates to a communication technology, in particular to a setting method and system of a user authentication module. Background technique [0002] When a mobile terminal needs to use a certain function, it usually needs to perform user authentication first, and only after passing the authentication can it be authorized to use a certain function. User authentication is usually implemented through UAM (user authentication module, user authentication module). To implement the user authentication process, the UAM module needs to implant a root key. The role of the root key is to provide a basic key for the user authentication process; and then The UAM module also needs to set personalized parameters, including setting a unique key number for it, so that the key store in the server can perform authentication management on the mobile terminal where the UAM module is located based on the key number. [0003] However, the setting management of t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G07F19/00H04L9/32
Inventor 周志刚方春冬张伟
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products