Wireless safety authentication method orienting to mobile terminal
An identity verification method and mobile terminal technology, which is applied in the field of wireless security identity verification, can solve problems affecting system security, achieve the effects of preventing malicious registration, reducing the risk of malicious access, and reducing pressure
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0039] The present invention will be further described below in conjunction with accompanying drawing.
[0040] Step (1). Mobile terminal registration:
[0041] 1-1. Fill in the registration form on the mobile terminal, and send the user information of the registration form to the authentication server.
[0042] 1-2. After receiving the user information sent by the mobile terminal, the authentication server searches the local database for the record of the user name (Email) in the user information. If the user name already exists, it prompts that the user has registered; if the user name does not If present, registration is allowed.
[0043] 1-3. During the registration process, the authentication server generates the user identity certificate, the user RSA private key, the Diffie-Hellman (DH) key pair belonging to the mobile terminal C and the Diffie-Hellman (DH) key pair belonging to the authentication server CS ;Such as figure 2As shown, the authentication server invoke...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com