Mobile terminal trusted access and management system and method based on c/s mode
A mobile terminal and trusted technology, applied in the field of trusted access and management systems, can solve the problems of unverified mobile terminal and applicable platform security and trustworthiness, service interaction security threats, passwords and fingerprints being easily stolen illegally, etc. , to achieve the effect of ensuring trusted access and management, simple and easy management, and protection of security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0050] The present invention is a mobile terminal trusted access and management system and method based on C / S mode, figure 1 It is a schematic diagram of the basic structure of the mobile terminal trusted access system in the C / S mode of the present invention. The mobile terminal trusted access and management system based on the C / S mode includes core network equipment, an authentication server, a mobile terminal connected to the authentication server, and a MySQL server connected to the authentication server. The mobile terminal is connected to the authentication server through the core network device. The core network device can be a router, a switch, etc. In this example, the core network device is a router. The mobile terminal and the authentication server perform trusted access and management through the communication protocol. The authentication server passes Query the MySQL server to realize trusted access and management of mobile terminals.
[0051] The present inven...
Embodiment 2
[0062] The present invention is also a mobile terminal trusted management method based on the C / S mode, and the management method is also realized by the mobile terminal trusted access and management system based on the C / S mode. The trusted management method includes trusted management of legitimate users and trusted management of malicious parties. After trusted access, if a legitimate user needs to modify the software and hardware information of the mobile terminal, the implementation method includes the following steps: see Figure 4 ,
[0063] (1) The mobile terminal sends a request for modifying software and hardware information to the authentication server.
[0064] (2) The authentication server responds to the mobile terminal according to the legitimacy of the mobile terminal. If the mobile terminal is legal, it sends the information of allowing modification, and if it is not legal, it sends the message of failure.
[0065] (3) After receiving the information that the...
Embodiment 3
[0071] The mobile terminal trusted access system based on the C / S mode, the mobile terminal trusted access method based on the C / S mode, and the mobile terminal trusted management method based on the C / S mode are the same as those in Embodiment 1-2, wherein the mobile terminal based on the C / S mode In the method of realizing trusted management of mobile terminals, the management of the malicious party is that after trusted access, if the malicious party changes the software and hardware information of the mobile terminal, the authentication server detects the change of the software and hardware information of the mobile terminal, such as Figure 5 The illustrated implementation method includes the following steps:
[0072] a) When new hardware is connected, the mobile terminal can effectively detect the hardware change information, and then encapsulate the protocol packet through the A / S protocol, where the content of the packet is, RcgCode is the header of the message, and CMD...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 