Unlock instant, AI-driven research and patent intelligence for your innovation.

Mobile device and system for authentication in restricted area and method thereof

A mobile device and regional technology, applied in electrical components, wireless communication, security devices, etc., can solve problems that do not involve the physical layer, and achieve the effect of enhancing authentication efficiency and communication security

Inactive Publication Date: 2017-11-21
RICOH KK
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Also, it is well known that the IEEE802.11i standard operates at the data link layer in the network, so this patent application does not deal with the concept of restricted areas and area keys at the physical layer, nor does it deal with authentication in restricted areas

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile device and system for authentication in restricted area and method thereof
  • Mobile device and system for authentication in restricted area and method thereof
  • Mobile device and system for authentication in restricted area and method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] Reference will now be made in detail to specific embodiments of the invention, examples of which are illustrated in the accompanying drawings. While the invention will be described in conjunction with specific embodiments, it will be understood that it is not intended to limit the invention to the described embodiments. On the contrary, it is intended to cover alterations, modifications and equivalents as included within the spirit and scope of the invention as defined by the appended claims. It should be noted that the method steps described here can all be realized by any functional block or functional arrangement, and any functional block or functional arrangement can be realized as a physical entity or a logical entity, or a combination of both.

[0032] In order to enable those skilled in the art to better understand the present invention, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present disclosure provides a mobile device, system and method for authenticating in a restricted area, the mobile device comprising: an area key sensor for sensing an area key; an area key storage for storing an area key; a restricted An area checker, checking whether the mobile device enters a restricted area; a master node determiner, when checking that the mobile device enters a restricted area, determines whether the mobile device is a master node; an authentication controller, controlling the mobile device Authentication; the authentication controller identifies the mobile device as unauthenticated when verifying that the mobile device has not entered the restricted area; the authentication controller identifies the mobile device as authenticated when the mobile device is determined to be the master node The master node, and authenticate other mobile devices when receiving authentication requests from other mobile devices; when the authentication controller determines that the mobile device is not the master node, it requests the master node to authenticate the mobile device.

Description

technical field [0001] The present invention relates generally to the field of wireless communications, and more particularly to a mobile device and system for authenticating within a restricted area and a method thereof. Background technique [0002] As wireless technology continues to evolve, so do various applications for wireless mobile devices such as cellular handsets, laptop computers, tablet computers, smart phones, mobile game consoles, and the like. For example, in the field of peer-to-peer (P2P) wireless communication, it is necessary to study the authentication and peer-to-peer communication of wireless mobile devices entering a specific area. [0003] Currently, secure authentication of wireless mobile devices for peer-to-peer (P2P) communication within wireless local area networks (WLANs) has been developed. For example, in Wong et al.'s U.S. Patent No. US8,000,478B2 entitled "Key Handshaking Method and System Wireless Local Area Networks" issued on August 16,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/06
Inventor 笪斌王炜于海华张银东
Owner RICOH KK