Unlock instant, AI-driven research and patent intelligence for your innovation.

Mobile terminal trusted access and management system and method based on c/s mode

A mobile terminal and trusted technology, applied in the field of trusted access and management systems, can solve the problems of unverified mobile terminal and applicable platform security and trustworthiness, service interaction security threats, passwords and fingerprints being easily stolen illegally, etc. , to achieve the effect of ensuring trusted access and management, simple and easy management, and protection of security

Inactive Publication Date: 2011-12-21
XIDIAN UNIV
View PDF3 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] (1) Did not check whether the mobile terminal and the applicable platform itself are safe and credible, if the mobile terminal itself has been infected by a virus, or the attacker has maliciously modified the hardware, operating system, application software or firmware of the mobile platform, without the user's knowledge Under such circumstances, the password and fingerprint entered by the user are easily illegally stolen
[0006] (2) After the user identity authentication is successful, that is, after the mobile terminal has been connected to a wireless network such as WLAN, the malicious person changes the software and hardware information of the mobile terminal, and the security of service interaction will be threatened at this time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile terminal trusted access and management system and method based on c/s mode
  • Mobile terminal trusted access and management system and method based on c/s mode
  • Mobile terminal trusted access and management system and method based on c/s mode

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0050] The present invention is a mobile terminal trusted access and management system and method based on C / S mode, figure 1 It is a schematic diagram of the basic structure of the mobile terminal trusted access system in the C / S mode of the present invention. The mobile terminal trusted access and management system based on the C / S mode includes core network equipment, an authentication server, a mobile terminal connected to the authentication server, and a MySQL server connected to the authentication server. The mobile terminal is connected to the authentication server through the core network device. The core network device can be a router, a switch, etc. In this example, the core network device is a router. The mobile terminal and the authentication server perform trusted access and management through the communication protocol. The authentication server passes Query the MySQL server to realize trusted access and management of mobile terminals.

[0051] The present inven...

Embodiment 2

[0062] The present invention is also a mobile terminal trusted management method based on the C / S mode, and the management method is also realized by the mobile terminal trusted access and management system based on the C / S mode. The trusted management method includes trusted management of legitimate users and trusted management of malicious parties. After trusted access, if a legitimate user needs to modify the software and hardware information of the mobile terminal, the implementation method includes the following steps: see Figure 4 ,

[0063] (1) The mobile terminal sends a request for modifying software and hardware information to the authentication server.

[0064] (2) The authentication server responds to the mobile terminal according to the legitimacy of the mobile terminal. If the mobile terminal is legal, it sends the information of allowing modification, and if it is not legal, it sends the message of failure.

[0065] (3) After receiving the information that the...

Embodiment 3

[0071] The mobile terminal trusted access system based on the C / S mode, the mobile terminal trusted access method based on the C / S mode, and the mobile terminal trusted management method based on the C / S mode are the same as those in Embodiment 1-2, wherein the mobile terminal based on the C / S mode In the method of realizing trusted management of mobile terminals, the management of the malicious party is that after trusted access, if the malicious party changes the software and hardware information of the mobile terminal, the authentication server detects the change of the software and hardware information of the mobile terminal, such as Figure 5 The illustrated implementation method includes the following steps:

[0072] a) When new hardware is connected, the mobile terminal can effectively detect the hardware change information, and then encapsulate the protocol packet through the A / S protocol, where the content of the packet is, RcgCode is the header of the message, and CMD...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a mobile terminal trusted access and management system and method based on the C / S mode, which belongs to the field of network security. The invention adopts the A / S protocol in the current C / S mode, and the A / S protocol The data frame not only contains the data type and length, but also reserves space for expansion, which facilitates the expansion of the software and hardware information to be detected, and ensures the security of the interaction process. Effectively discover each mobile terminal across network segments through multicast technology. Perform local software and hardware authentication on the trusted access piece of the mobile terminal, and conduct online detection of the software and hardware information of the mobile terminal after the trusted access. The mobile terminal is authenticated at the level of the mobile terminal itself and the use of the platform, so that malicious attackers have no way to enter the mobile terminal and the network, ensuring the security of user information and network resources. It is mainly used to verify the software and hardware of the mobile terminal when the mobile terminal accesses the wireless network, and to manage the trusted management of the mobile terminal after access.

Description

technical field [0001] The invention belongs to the field of network security, in particular to a system and method for trusted access and management. Specifically, it is a mobile terminal trusted access and management system and method based on the C / S mode, which is mainly used to verify the software and hardware of the mobile terminal when the mobile terminal accesses the wireless network and to verify the reliability of the mobile terminal after access. letter management. Background technique [0002] At present, with the continuous development of wireless network technology, mobile terminal devices are becoming more and more popular, and can easily access the Internet to obtain services. At the same time, with the popularity of wireless network applications, more and more attention has been paid to the security of wireless networks. But in today's network environment, loopholes are ubiquitous, whether in the operating system, application system or in the hardware and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04W12/06H04W12/122
Inventor 李兴华马建峰岳盼王一川郭朝辉杨力芦笛邓晶晶张亮孟宪佳
Owner XIDIAN UNIV