Unlock instant, AI-driven research and patent intelligence for your innovation.

Authentication method between users of two adjacent mobile terminals

A mobile terminal and authentication method technology, which is applied in the field of authentication between adjacent mobile terminal users, can solve the problems of increasing the total system overhead, etc., and achieve the effects of flexible adjacent range control, improved security, and protected private information

Inactive Publication Date: 2014-10-08
XIAMEN UNIV
View PDF6 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the extraction of packet content in the proximity test not only creates a privacy leak but also increases the overall system overhead

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method between users of two adjacent mobile terminals
  • Authentication method between users of two adjacent mobile terminals
  • Authentication method between users of two adjacent mobile terminals

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The technical solutions of the present invention will be described below in conjunction with the accompanying drawings. Apparently, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0044] Such as figure 1 , Public places need their own positioning servers, and have the ability to access and analyze wireless signals, that is, they need to be equipped with server wireless access points. There should be multiple identifiable WiFi hotspots in the public place, and mobile terminal users also have the ability to access and analyze wireless signals when passing through the public place.

[0045] The positioning server of the mobile terminal in a public place needs to locate the mobile terminal user passing through ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an authentication method between users of two adjacent mobile terminals, and belongs to the field of safety of a wireless communication network. Based on two adjacent user safety certificates, a pre-shared secret key, a trust facility or a public key system is not needed. Meanwhile, a non-parameter bayesian model is introduced to classify physical characteristics of a wireless data package to obtain a shared surrounding data package, so as to improve the accuracy of the two adjacent certificates and provides relatively flexible adjacent range control. Influences including loss of a signal path and the like can be caused by environments of middle-size and small-size public places, and a plurality of Wi-Fi (Wireless-Fidelity) accessing points in the public places cause that all clients cannot easily obtain same surrounding data package sequences, so that attackers outside the adjacent ranges cannot easily obtain all the shared surrounding data packages between a positioning server and the user of each mobile terminal. The method can be used for defending the attackers outside the adjacent ranges; meanwhile, private information including the positions of the users of the mobile terminals and the like is protected and the safety of the mobile terminal services based on the positions is improved.

Description

technical field [0001] The invention belongs to the field of wireless communication network security, in particular to an authentication method between adjacent mobile terminal users. Background technique [0002] With the rise of surrounding businesses and location-based mobile advertising, people's demand for navigation and positioning continues to increase, especially in some small and medium-sized public places, such as airport halls, railway station waiting halls, EMU trains, supermarkets, libraries , showrooms, department stores, etc. At the same time, with the popularization of smart phones to "everyone", the server wireless access points in public places push various information to mobile terminal users passing through the location, such as advertisements, discounts, promotions, safety reminders, warm reminders, etc. This requires the wireless access point of the server to be able to determine whether there is a mobile terminal user passing by within its vicinity, s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/04H04W12/06H04W64/00
Inventor 肖亮刘金亮陈天花唐余亮黄联芬
Owner XIAMEN UNIV