Method for performing identity authentication on mobile terminal

A mobile terminal and identity authentication technology, applied in electrical components, wireless communication, security devices, etc., can solve the problems of attack, tampering and forgery, single method, etc., and achieve the effect of ensuring security, improving speed and efficiency

Active Publication Date: 2012-10-03
CHINA ELECTRIC POWER RES INST +3
View PDF4 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The identity authentication technology of common mobile smart terminals is generally to embed digital certificates in mobile smart terminals to indicate identity, integrate asymmetric keys in the certificates, and integrate asymmetric keys at the opposite end, that is, the server that the mobile smart terminals access, When accessing, perform mutual verification and match

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for performing identity authentication on mobile terminal
  • Method for performing identity authentication on mobile terminal
  • Method for performing identity authentication on mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The present invention will be further described below with reference to the accompanying drawings.

[0040] A method for identity authentication of a mobile terminal provided by the present invention is applied to a mobile terminal and a server. The schematic diagram of the internal structure of the embodiment of the mobile terminal and the server is as follows: figure 1 As shown, the flow chart of the mobile terminal identity authentication method is as follows figure 2 shown, by figure 1 and figure 2 It can be seen that the mobile terminal includes a feature identification module and a feature detection communication module, the server includes a feature verification module and a database, and the method for identity authentication of the mobile terminal includes the following steps:

[0041] In step S1, it is judged whether the feature identification module and the feature detection communication module are both in the activated state, and if so, step S2 is perfo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for performing identity authentication on a mobile terminal, which is applied to the mobile terminal and a server side. The mobile terminal comprises a feature identification module and a feature detection communication module; and the server side comprises a feature verification module and a database. The method for performing identity authentication on the mobile terminal comprises the following steps of: S1, determining the feature identification module and the feature detection communication module are in the starting state; S2, performing digital certificate authentication on the mobile terminal; and S3, acquiring the hardware feature information of the mobile terminal by using the feature identification module, transmitting the hardware feature information of the mobile terminal to the feature verification module of the server side by using the feature detection communication module, comparing the received hardware feature information of the mobile terminal with the hardware feature information of the mobile terminal in the database by using the feature verification module and judging whether identity authentication of the mobile terminal is passed or not. Authentication is performed by combining with the hardware feature information of the mobile terminal and the digital certificate, so that safety and reliability of the authentication process are guaranteed.

Description

technical field [0001] The invention relates to the field of mobile communication, in particular to an identity authentication method of a mobile terminal. Background technique [0002] With the rapid development and wide application of information and network technology, various types of computer application systems have adopted various types of mobile intelligent terminals for service access. Mobile intelligent terminals are portable and powerful, but the terminals are close to users, and The working environment is generally complex, so it is very important to carry out identity authentication and identification of mobile intelligent terminals to ensure that the terminals are used legally. The identity authentication technology of common mobile smart terminals is generally to embed a digital certificate in the mobile smart terminal to indicate the identity. When accessing, perform mutual verification and matching of two asymmetric keys, use software algorithm to calculate...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/06H04W12/069H04W12/71
Inventor 陈亚东张涛林为民秦超楚杰陈牧徐敏
Owner CHINA ELECTRIC POWER RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products