Light safety authentication method and system thereof of intelligent mobile phone based on SNS (social network service)

A security authentication and smart phone technology, applied in security devices, electrical components, wireless communications, etc., can solve the problems of extended authentication time, large terminal resource consumption, and low authentication success rate, so as to reduce authentication delay and improve usage Experience, Enhanced Security Effects

Active Publication Date: 2012-09-12
CHONGQING UNIV OF POSTS & TELECOMM
View PDF3 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The technical problem to be solved by the present invention is: in view of the existing mobile phone social authentication protocol, which consumes a large amount of terminal resources, the authentication success rate is low, the problem of prolonging the authentication and the limited resources of the mobile phone, combined with the social communication network of the mobile phone Network characteristics, designing a light-weight security authentication mechanism for smart phones based on social networks to meet people's needs for the security and convenience of using mobile phones to operate sensitive data on the network, and improve user experience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Light safety authentication method and system thereof of intelligent mobile phone based on SNS (social network service)
  • Light safety authentication method and system thereof of intelligent mobile phone based on SNS (social network service)
  • Light safety authentication method and system thereof of intelligent mobile phone based on SNS (social network service)

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] The specific implementation of the present invention will be further explained in detail below in conjunction with the accompanying drawings.

[0016] like figure 1 Shown is the system structure diagram of the present invention. These include: authentication center (G1), user contact mobile phone (G2), user mobile phone (G3), application server (G4). Wherein, the authentication center includes a Kerberos server and an authentication server.

[0017] like figure 2 Shown is a schematic diagram of the principle of the mobile phone (including the user's mobile phone and the contact person's mobile phone), including: data communication module (M1), ticket and key security management module (M2), authentication ticket generation module (M3), authentication weight calculation module ( M4).

[0018] refer to figure 1 , specifying the smart phone security authentication process of the present invention, the following steps are performed:

[0019] Step 0, after the user es...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a light safety authentication method of an intelligent mobile phone based on an SNS (social network service), relating to an identity authentication manner of a mobile phone user. According to the light safety authentication method, problems of large resource consumption, high authentication efficiency and long time delay of an authentication protocol mobile phone based on the SNS are effectively solved and the safety of authentication is also improved by utilizing the SNS characteristics that the number of common contact persons of a user is small, contact objects are stable, trust information amounts carried by different interactive events are different, different nodes are of different influence, and an individual behavior is of difference in a mobile phone communication network. The use experience of the user is improved through a manner of automatic authentication of a mobile phone terminal. The invention can be widely applied to the related field of a mobile internet, a computer network and the like.

Description

technical field [0001] The invention relates to the technical field of mobile communication, in particular to information encryption and authentication technology. Background technique [0002] With the rapid development of mobile Internet technology, mobile phones and mobile services have become a necessity in people's daily life. People access the network through mobile terminals such as mobile phones, and a large number of online services generated by it improve the experience of mobile phone users. At the same time, using mobile phones to operate private information such as bank accounts, personal information, and company data poses security threats. The traditional authorization and authentication methods are mainly implemented by entering a password, and its security is affected by the complexity of the password. In addition, due to the inconsistency between security and convenience caused by the limitation of mobile phone input methods, people are more inclined to ch...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06
Inventor 刘宴兵刘飞飞肖云鹏胡文平徐光侠黄俊
Owner CHONGQING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products