Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authentication method, authentication device and authentication system

An authentication device and authentication method technology, applied in the fields of authentication methods, devices and systems, can solve the problem of not being able to exchange data between users in real time, quickly and efficiently, and achieve the effect of improving security and exchanging data efficiently

Active Publication Date: 2013-07-03
NATIONZ TECH INC
View PDF7 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Existing communication technologies require manual pairing every time a mobile terminal connects to a new mobile terminal or computer when a connection is established between mobile terminals or between a mobile terminal and one or more computers, which cannot satisfy users within such a short-distance range. Requirements for instant, fast and efficient exchange of data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method, authentication device and authentication system
  • Authentication method, authentication device and authentication system
  • Authentication method, authentication device and authentication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The principles and features of the present invention are described below in conjunction with the accompanying drawings, and the examples given are only used to explain the present invention, and are not intended to limit the scope of the present invention.

[0046] figure 1 It is a flow chart of the authentication method in the embodiment of the present invention. Such as figure 1 As shown, in this embodiment, the authentication method includes the following steps:

[0047] The premise of the authentication method in this embodiment is that after the first communication device successfully registers for the first time, the data storage center saves the registration information of the first communication device at the time of the first registration, and the registration information includes the characteristic information of the first communication device . That is to say, before performing the following step 101, the authentication method of the present invention may ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an authentication method, an authentication device and an authentication system. The authentication method comprises the steps of sending information required to be authenticated to first communication equipment, receiving feature information returned from the first communication equipment, obtaining log-on information of the first communication equipment from a data storage center, and judging whether the feature information returned from the first communication equipment is consistent with the feature information in the log-on information or not, and passing the authentication on yes judgment. The authentication method, the authentication device and the authentication system do not need manual operation, achieve automatic authentication, are convenient and rapid, improve safety, and simultaneously can guarantee real-time, rapid, efficient data exchange requirements between users.

Description

technical field [0001] The present invention relates to the communication field, in particular to an authentication method, device and system. Background technique [0002] At present, computers or mobile terminals (such as mobile phones) have widely used high-speed wireless transmission technology for data exchange, and Wi-Fi (IEEE802.11a / b / g / n standard), Bluetooth, Zigbee (IEEE 802.15 .4 standard), UWB (Ultra Wideband, ultra-wideband wireless transmission) and other technologies. These high-speed wireless communications enable information exchange and function sharing between computers and mobile terminals or between mobile terminals. Users can implement streaming media file transmission, address book exchange, and shared access to the Internet in these mobile terminals. These high-speed wireless transmission technologies are all aimed at long-term, multiple users, and long-distance (more than 10 meters) data exchange applications. When using these high-speed wireless tr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 朱忠迁
Owner NATIONZ TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products