Supercharge Your Innovation With Domain-Expert AI Agents!

Method and device for authenticating mobile terminal

A mobile terminal and authentication technology, applied in security devices, user identity/authority verification, electrical components, etc., can solve problems such as reinstalling application clients, service provider user information management difficulties, etc.

Inactive Publication Date: 2016-12-28
BEIJING NETQIN TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this case, users often change the mobile terminal they use or the network provided by the mobile operator, often reinstall the application client, etc., which causes difficulties for service providers in user information management

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for authenticating mobile terminal
  • Method and device for authenticating mobile terminal
  • Method and device for authenticating mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The preferred embodiments of the present invention will be described in detail below with reference to the accompanying drawings, and unnecessary details and functions for the present invention will be omitted during the description to avoid confusing the understanding of the present invention. Hereinafter, the present invention is described in detail by taking the scenario where the present invention is applied to a wireless mobile communication system as an example. But the present invention is not limited thereto, and the present invention can also be applied to a fixed communication system, a wired communication system, or any hybrid structure of a wireless mobile communication system, a fixed communication system, a wired communication system, and the like. As far as the mobile communication system is concerned, the present invention is not limited to the specific communication protocols of the various mobile communication terminals involved, which may include but n...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention proposes a method and a device for authenticating a mobile terminal according to its equipment identification, network subscriber identification and user identification. The method includes: receiving an authentication request sent by a mobile terminal client, the request at least including a device identification field, a network subscriber identification field, and a user identification field; by searching a user record matching the authentication request in a database, the mobile terminal performing authentication, wherein, if a user record matching at least two of the three identification fields contained in the authentication request is retrieved in the database, the authentication result is that the mobile terminal belongs to an existing user and the user record The user ID in is regarded as the user ID of the mobile terminal client, otherwise the authentication result is that the mobile terminal belongs to a new user and a new user ID is assigned to the mobile terminal client; and the authentication result is sent to the mobile terminal client. The solution of the present invention can reduce data interaction and redundant data.

Description

technical field [0001] The present invention relates to the field of mobile communication, and more specifically, to a method and device for authenticating a mobile terminal. Background technique [0002] In recent years, the use of mobile terminals has become more and more popular. Many functions provided by service providers can be used through these mobile terminals, such as sending and receiving emails, accessing social networks, electronic shopping, online games, and so on. As used herein, the term "mobile terminal" may refer to various devices having a wireless communication function, such as smart phones, wireless PDAs, laptop computers, tablet computers, and the like. [0003] With the development of technology, the update of mobile terminals is accelerating, the competition among different mobile operators is becoming more and more exciting, and new versions of various applications are launched from time to time. In this case, the user often changes the mobile ter...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/06H04L9/32
Inventor 王玉印刘明飞周杨
Owner BEIJING NETQIN TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More