Authentication method between users of two adjacent mobile terminals
A mobile terminal and authentication method technology, which is applied in the field of authentication between adjacent mobile terminal users, can solve the problems of increasing the total system overhead, etc., and achieve the effects of flexible adjacent range control, improved security, and protected private information
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0043] The technical solutions of the present invention will be described below in conjunction with the accompanying drawings. Apparently, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.
[0044] Such as figure 1 , Public places need their own positioning servers, and have the ability to access and analyze wireless signals, that is, they need to be equipped with server wireless access points. There should be multiple identifiable WiFi hotspots in the public place, and mobile terminal users also have the ability to access and analyze wireless signals when passing through the public place.
[0045] The positioning server of the mobile terminal in a public place needs to locate the mobile terminal user passing through ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 