Unlock instant, AI-driven research and patent intelligence for your innovation.

Multi-factor credible identity authenticating method and system for mobile mailbox

An identity authentication, multi-factor technology, applied in the field of mobile mailboxes, can solve the problems of poor mobile mailbox authentication security, and achieve the effect of improving security and security authentication

Inactive Publication Date: 2014-06-25
上海和辰信息技术有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] The purpose of the present invention is to provide a mobile mailbox multi-factor trusted identity authentication method to solve the technical problem of poor mobile mailbox authentication security in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-factor credible identity authenticating method and system for mobile mailbox
  • Multi-factor credible identity authenticating method and system for mobile mailbox
  • Multi-factor credible identity authenticating method and system for mobile mailbox

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] Hereinafter, the present invention will be specifically described with reference to the accompanying drawings.

[0042] see figure 1 , which is a schematic diagram of a mobile mailbox security protection system. It includes a mailbox service platform and several mobile terminals 2 . The mailbox service platform 1 and the mobile terminal 2 are connected through a network. The network includes a wireless communication network. It should be noted that the mailbox service platform includes physical servers, gateways, databases, etc., that is, the mailbox service platform mentioned in this example generally refers to the service center center. Specific instructions. In order to complete the security of the mailbox,

[0043] The following is a further explanation based on the structural principle of the mailbox service platform and a mobile terminal:

[0044] The server further includes:

[0045] Interaction processing unit: used to establish interaction with each term...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a multi-factor credible identity authenticating method. The method comprises the following steps that: a mobile terminal computes integrity measurement through a credible chip, collects information which is required by an integrity measurement report and comprises a personal credit registering system (PCRS) value and a standard meta language (SML) value, and encrypts the information by using an automated installation kit (AIK) private key in the credible chip to generate the integrity measurement report, wherein the PCRS value comprises a computed value for the integrity measurement of a mailbox system; verification information which comprises the integrity measurement report and mobile terminal authenticating information is signed by using an identity certificate in a security digital input and output (SDIO) intelligent card and the verification information is sent to a mailbox service platform; and the mailbox service platform verifies the authentication information of the mobile terminal, after successful verification, legality of the integrity measurement report which is received currently is detected by using prestored credibility verification information of the mailbox of the mobile terminal, and the mailbox system of a user terminal is activated after passing of the verification.

Description

technical field [0001] The invention relates to the field of mobile mailboxes, in particular to the security aspects of mobile mailboxes. Background technique [0002] With the continuous development of digital communication, in addition to the regular basic Internet mail service functions, the functional advantages of mobile terminals can be fully utilized and used, so that users can conveniently and directly access and manage the Internet through SMS, MMS, WAP, etc. anytime, anywhere. Email information of the mobile terminal. Currently, a mailbox that uses a mobile terminal such as a mobile phone to acquire and manage mail information is called a mobile mailbox. Mobile mailboxes can not only synchronize information with fixed mailboxes, but also use the convenience of mobile terminals to realize the function of viewing anytime, anywhere. Two-way, comprehensive and efficient interoperability with mailboxes. [0003] That is, the prevalence of mobile office has greatly...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04W4/12H04W12/06H04W12/069
Inventor 王剑钟冰
Owner 上海和辰信息技术有限公司