Method and device for authentication of mobile terminal

A mobile terminal and authentication technology, which is applied in security devices, electrical components, wireless communication, etc., can solve the problem of the proliferation of counterfeit terminals such as counterfeit mobile phones, and achieve the effect of preventing counterfeit mobile terminals

Inactive Publication Date: 2014-12-03
NO 61 INST OF GENERAL STAFF
View PDF2 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Therefore, strictly speaking, the current authentication on the public network is essentially for the UIM card rather than the mobile terminal itself, thus causing the proliferation of counterfeit terminals such as counterfeit mobile phones

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for authentication of mobile terminal
  • Method and device for authentication of mobile terminal
  • Method and device for authentication of mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] The preferred embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be understood that the preferred embodiments described below are only used to illustrate and explain the present invention, and are not intended to limit the present invention.

[0053] figure 1 is a functional block diagram of a method for authenticating a mobile terminal provided by an embodiment of the present invention, as shown in figure 1 As shown, the steps include:

[0054] Step 101, the authentication center receives an access authentication request message from a mobile terminal that includes a terminal identifier, an encrypted authentication code, and encrypted digital noise.

[0055] When the mobile terminal is turned on or receives an access authentication query message from the authentication center, the mobile terminal needs to report an access authentication request message. Specifically, the mobile terminal encr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and device for authentication of a mobile terminal and relates to the technical field of mobile-communication security. The method includes the following steps: an authentication center receives an access authentication request message which comes from the mobile terminal and includes a terminal identification, an encryption verification code, and an encryption digital noise; using the terminal identification in the access authentication request message to carry out verification processing on the legality of the mobile terminal and using the encryption verification code and the encryption digital noise in the access authentication request to carry out second verification processing on the legality of the mobile terminal; and according to the result of the first verification processing and the result of the second verification processing, generating an access authentication response message and sending the message to the mobile terminal so as to allow the mobile terminal to confirm the legality of the authentication center according to the access authentication response message. The method and device are capable of effectively preventing use of a fake mobile terminal.

Description

technical field [0001] The invention relates to the technical field of mobile communication security, in particular to a mobile terminal authentication method and a related device in a mobile communication system. Background technique [0002] The identification of the mobile terminal is unique information for the dedicated mobile communication system to identify the identity of the mobile terminal. Commonly used identification information includes UIMID, ESN, MEID and so on. In the domestic mobile communication system, mobile terminals generally adopt the mode of machine-card separation. Although the ESN / MEID information solidified on the mobile terminal is uploaded during the registration process of the mobile terminal, it cannot What is used in authentication and other processes is the UIMID burned on the UIM card instead of ESN / MEID information. [0003] Therefore, strictly speaking, the current public network authentication is essentially aimed at the UIM card rather ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06
Inventor 吴作顺
Owner NO 61 INST OF GENERAL STAFF
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products