Unlock instant, AI-driven research and patent intelligence for your innovation.

Mobile terminal authentication method, service access method and equipment

A technology of mobile terminals and authentication methods, applied in the field of communication networks, can solve problems such as copy security, hidden dangers, forgery of false login information, etc., and achieve the effects of safe transmission channels, ensuring security, and improving convenience

Active Publication Date: 2014-07-02
CHINA MOBILE COMM GRP CO LTD
View PDF4 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] 1. Not safe
For example, it is easy to leak user names and passwords in method 1, and the leakage is not easy to be detected; in method 2, the dynamic password is generally sent to the mobile terminal in the form of a short message in plain text, and because it needs to be manually entered, the dynamic password is usually not too long, and there are There is a risk of being peeped or intercepted; once the unique ID of the device in method 3 is leaked, there will be a risk of forging false login information; the private key and certificate in method 4 also have security risks that may be leaked and copied
[0009] 2. Not convenient

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile terminal authentication method, service access method and equipment
  • Mobile terminal authentication method, service access method and equipment
  • Mobile terminal authentication method, service access method and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] In view of the above-mentioned problems in the prior art, embodiments of the present invention provide a mobile terminal authentication solution. The embodiments of the present invention will be described in detail below with reference to the accompanying drawings.

[0048] figure 1 The system architecture to which the embodiment of the present invention is applied is shown, which includes: a mobile terminal 11, a security gateway 12, a directory server 13, a short message gateway 14, and at least one application server 15. The directory server 13 and the application server 15 are usually network devices in the corporate intranet. The directory server 13 stores corporate internal user information (for example, user mobile phone numbers); the application server 15 is mainly used to provide business services and can be set in the corporate intranet Multiple application servers 15 are used to process different services; the security gateway 12 is connected to the corporate in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a mobile terminal authentication method, a service access method and equipment. During the process when a mobile terminal and a security gateway carry out the first authentication handshake, a communication key is generated by the security gateway, the communication key is encrypted and sent to the mobile terminal, the mobile terminal carries out decryption and acquires the communication key, the communication key is used for carrying out encryption on the second handshake request, the security gateway uses the communication key to carry out decryption authentication on the second handshake request, and authentication security is ensured. According to the above authentication scheme, the user only needs one interaction, the whole authentication can be finished even without interaction, operations such as preregistration, manual login information filling or manual verification code filling can be omitted, and convenience of mobile terminal authentication can be enhanced.

Description

Technical field [0001] The present invention relates to the technical field of communication networks, in particular to a mobile terminal authentication method, service access method and equipment. Background technique [0002] With the advent of the mobile era, enterprise mobile authentication and access applications are becoming more and more extensive. At present, enterprise mobile terminal authentication schemes can be basically divided into the following categories: [0003] 1. Login authentication through user name and password. The user enters the pre-registered user name and password on the mobile terminal, and initiates a login request to the authentication server. After the authentication server receives the login request, it authenticates by comparing the user name and password carried in it with the database. [0004] 2. Pass dynamic password authentication. The user enters a pre-registered communication number (such as a mobile phone number) on the mobile terminal and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/04H04W12/06
Inventor 常江
Owner CHINA MOBILE COMM GRP CO LTD