Unlock instant, AI-driven research and patent intelligence for your innovation.

A mobile terminal authentication method, service access method and device

A technology of a mobile terminal and an authentication method, applied in the field of communication networks, can solve the problems of copy security, falsification of false login information, hidden dangers, etc., and achieve the effects of secure transmission channels, improved convenience, and guaranteed security.

Active Publication Date: 2017-06-20
CHINA MOBILE COMM GRP CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] 1. Not safe
For example, it is easy to leak user names and passwords in method 1, and the leakage is not easy to be detected; in method 2, the dynamic password is generally sent to the mobile terminal in the form of a short message in plain text, and because it needs to be manually entered, the dynamic password is usually not too long, and there are There is a risk of being peeped or intercepted; once the unique ID of the device in method 3 is leaked, there will be a risk of forging false login information; the private key and certificate in method 4 also have security risks that may be leaked and copied
[0009] 2. Not convenient

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A mobile terminal authentication method, service access method and device
  • A mobile terminal authentication method, service access method and device
  • A mobile terminal authentication method, service access method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] In view of the above problems existing in the prior art, an embodiment of the present invention provides a mobile terminal authentication solution. The embodiments of the present invention will be described in detail below with reference to the accompanying drawings.

[0048] figure 1 A system architecture to which the embodiments of the present invention are applicable is shown, including: a mobile terminal 11 , a security gateway 12 , a directory server 13 , a short message gateway 14 and at least one application server 15 . The directory server 13 and the application server 15 are usually network devices in the enterprise intranet, and the directory server 13 stores user information (for example, user mobile phone numbers) within the enterprise; the application server 15 is mainly used to provide business services, which can be set in the enterprise intranet Multiple application servers 15 to process different services; the security gateway 12 is connected to the en...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a mobile terminal authentication method, service access method and equipment. During the first authentication handshake process between the mobile terminal and the security gateway, the security gateway generates a communication key, encrypts it, and sends it to the mobile terminal. The mobile terminal decrypts to obtain the communication key, and uses the communication key to encrypt the second handshake request, and the security gateway uses the communication key to decrypt and authenticate the second handshake request, ensuring the security of the authentication; In the above authentication scheme, the user only needs to interact once, or even complete the entire authentication process without interaction, eliminating the need for pre-registration, manually filling in login information or verification codes, etc., and improving the convenience of mobile terminal authentication.

Description

technical field [0001] The present invention relates to the technical field of communication networks, and in particular, to a mobile terminal authentication method, service access method and device. Background technique [0002] With the advent of the mobile era, the application of enterprise mobile authentication and access is becoming more and more extensive. At present, the enterprise mobile terminal authentication scheme can be basically divided into the following categories: [0003] 1. Log in and authenticate by user name and password. The user enters the pre-registered user name and password on the mobile terminal, and initiates a login request to the authentication server. After receiving the login request, the authentication server performs authentication by comparing the user name and password carried with the database. [0004] 2, through dynamic password authentication. The user enters a pre-registered communication number (such as a mobile phone number) on th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/04H04W12/06
Inventor 常江
Owner CHINA MOBILE COMM GRP CO LTD