Method for authenticating identity of mobile terminal and constructing safety channel

A security channel and identity authentication technology, which is applied in the field of mobile identity authentication and secure channel establishment, can solve the problems of cumbersome generation and distribution of public and private keys, and achieve high effectiveness and prevent attacks

Inactive Publication Date: 2015-05-13
XI AN JIAOTONG UNIV
View PDF4 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Limited by the performance of mobile devices and network conditions, the generation and distribution of public and private keys will be very cumbersome, which will inevitably slow down the process of establishing encrypted channels, and the increase in time is also intolerable for mobile data transmission

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for authenticating identity of mobile terminal and constructing safety channel
  • Method for authenticating identity of mobile terminal and constructing safety channel
  • Method for authenticating identity of mobile terminal and constructing safety channel

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] The present invention will be further described in detail below in conjunction with the examples.

[0052] The present invention comprises the following steps: step 1) identity authentication,

[0053] The two sides of the data transmission use the front and rear cameras of the smart terminal to shoot each other, extract the feature values ​​of the image captured by the front camera of the first user and the image captured by the rear camera of the second user, and perform the first image matching. When the matching is successful; When the first image matching is successful, the second matching is performed: the two sides of the data transmission switch the front and rear cameras to shoot each other, and respectively extract the feature values ​​of the second image captured by the smart terminals of both parties for the second image matching. When the matching is successful, then Go to the next step. Image feature values ​​can be grayscale or brightness.

[0054] Iden...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the field of identity authentication and image recognition, and specifically relates to a method for authenticating identity of a mobile terminal and constructing a safety channel. The method comprises the steps of 1) authenticating the identity, namely, mutually shooting by two data transmission sides through a front camera and a rear camera of an intelligent terminal, extracting the characteristics values of the image shot by the front camera of a first user and image shot by the rear camera of a second user, performing image matching for the first time, and entering the next step after successful matching; 2) constructing the safety channel, namely, generating a random key according to the background noise of the image shot in step 1), constructing a temporary channel through the random key, and then constructing the safety channel on the basis of the temporary channel by the Diffie-Hellman key exchange method. The communication channel constructed by the method is stable, safe and high in effectiveness; the identity can be authenticated and the safety channel can be constructed simply by shooting the images; the method has the advantages of being safe, efficient, convenient and fast and can be generally applied in the field of mobile data transmission for a long term.

Description

technical field [0001] The invention belongs to the field of identity authentication and image recognition, and in particular relates to a mobile terminal identity authentication and a method for establishing a safe channel. Background technique [0002] With the rapid development and prosperity of the mobile Internet, the demand for data transmission on mobile devices is growing faster and faster. In this context, mobile data transmission technology has been developed at an unprecedented high speed. In the era of information explosion, personal privacy is constantly being leaked in various ways. How to protect personal privacy and data security is an issue that has to be considered. On this basis, regardless of whether the data transmission on the mobile device side uses Bluetooth, WIFI or NFC, the data must be transmitted to the correct user and must be transmitted to the user safely. In short, the bottom-level requirement for data transmission is correct identity authen...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06G06K9/00
Inventor 韩劲松蒋志平惠维赵季中陈帅宇周伟魏尧苟莹颖
Owner XI AN JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products