Authentication method of mobile terminal uniqueness based on software digital certificate

A mobile terminal and digital certificate technology, applied in the field of computer and information security, can solve the problems of weak security, increased user costs, no secrets in information and communication, and achieve the effect of ensuring security and high authentication strength

Active Publication Date: 2013-06-19
KOAL SOFTWARE CO LTD
View PDF4 Cites 39 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although this method is simple and easy to implement, it is weak in security, and the text messages and verification codes sent are easy to be stolen. There is also SIM duplication and counterfeiting technology, which makes information and c

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method of mobile terminal uniqueness based on software digital certificate
  • Authentication method of mobile terminal uniqueness based on software digital certificate
  • Authentication method of mobile terminal uniqueness based on software digital certificate

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] In order to make the technical means, creative features, goals and effects achieved by the present invention easy to understand, the present invention will be further described below in conjunction with specific illustrations.

[0045] The mobile terminal unique authentication method based on the software digital certificate provided by the present invention is mainly divided into a mobile terminal registration part and a mobile terminal authentication part.

[0046] Wherein mobile terminal registration comprises the following steps:

[0047] (11) Generate a public-private key pair in the mobile terminal, and use the mobile terminal device information as a request item to generate a certificate request, and then send the certificate request to the application server for registration.

[0048] see figure 1 , this step can be implemented by installing a customized security client in the mobile terminal, and the security client generates a public-private key pair. The pu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an authentication method of mobile terminal uniqueness based on a software digital certificate, and belongs to the technical field of computers and information safety. The method specifically comprises the following steps: (1), a safe client side is installed on a mobile terminal, a certificate request relevant to equipment information is generated so as to be registered by a server side; a digital certificate is issued to the mobile terminal by the server side, and relevance between the digital certificate and the equipment is achieved. (2), when the method is used, random information is sent to the mobile terminal by the server side, the information is received by the safe client side, the random information is signed by using a private key of the digital certificate of the equipment, and the signing data are sent to the server side. The signature is verified by a public key of the digital certificate by an application server, and a communication opposite terminal identity is confirmed. The method is capable of verifying the mobile terminal commendably and enhancing intensity of authentication on the basis that hardware authentication equipment is not added.

Description

technical field [0001] The invention belongs to the technical field of computer and information security, and in particular relates to a method for authenticating a mobile terminal in the mobile Internet. Background technique [0002] With the rapid development of the mobile Internet, security issues are facing challenges. How to effectively authenticate mobile terminals is the focus of attention. There are currently several authentication methods: [0003] (1) Use text messages and verification codes. Although this method is simple and easy to implement, it is weak in security, and the text messages and verification codes sent are easy to be stolen, and there is SIM duplication and counterfeiting technology, which makes information and communication no secret at all. [0004] (2) Use special hardware devices, such as SD cards with computing functions, SIM cards, etc. This method has high security, but the user cost increases and the compatibility of mobile terminals is lim...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/04H04W12/06H04L29/06H04L9/32H04W12/041H04W12/069
Inventor 韩洪慧杨文山许俊任伟
Owner KOAL SOFTWARE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products