Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A security authentication system and corresponding method utilizing operator network

An operator network, security authentication technology, applied in the field of mobile communication, can solve the problems of easy theft, the stability and security of the authentication process cannot be guaranteed, and achieve the effect of improving security, saving authentication costs, and eliminating the need for roaming fees.

Inactive Publication Date: 2018-02-09
BEIJING TRAVELRELY SOFTWARE TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, in the existing security authentication methods, mobile phone text messages must be transmitted through the air interface, and the content of text messages is encrypted easily and easily stolen. The security authentication process requires human participation, and roaming fees will be incurred when the user performs authentication outside the country. The stability and security of the authentication process sex cannot be guaranteed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A security authentication system and corresponding method utilizing operator network
  • A security authentication system and corresponding method utilizing operator network
  • A security authentication system and corresponding method utilizing operator network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] Embodiments of the present invention are described below with reference to the drawings. Elements and features described in one drawing or one embodiment of the present invention may be combined with elements and features shown in one or more other drawings or embodiments. It should be noted that representation and description of components or processes that are not relevant to the present invention and known to those of ordinary skill in the art are omitted from the drawings and descriptions for the purpose of clarity.

[0040] The present invention will be further described below in conjunction with the accompanying drawings.

[0041] figure 1 It shows the implementation of security authentication system using operator network in this embodiment, including SIM card interface device ( figure 1 displayed as a Bluetooth box), mobile terminal ( figure 1 displayed as mobile phones and App applications), and the background server connected to the core network (CN) of the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a safety authentication system utilizing an operator's network, including a SIM card interface device, a mobile terminal, and a background server for accessing the operator's core network; the SIM card interface device is provided with an SE chip and a SIM card slot, The SIM card is arranged in the SIM card slot, and the SIM card interface device is used to forward the authentication information of the SIM card to the background server through the mobile terminal; the mobile terminal is used to read the SIM card in the interface device information, register to the core network of the operator through the background server, and communicate with the background server through the IP communication network; the background server establishes a standard Iuh or S1 connection for the mobile terminal, and transmits signaling; utilizes the authentication information of the received SIM card Perform security authentication on mobile terminals. The invention does not require human participation and roaming charges are not required for overseas authentication, the authentication cost is low, the process is simple, and the stability and security are high.

Description

technical field [0001] The invention relates to the technical field of mobile communication, in particular to a system and a corresponding method for realizing security authentication by using an operator network. Background technique [0002] Nowadays, with the progress of society and the development of science and technology, mobile terminals such as mobile phones have become more and more popular, and more and more mobile apps have entered people's lives, and people register on the App , Log in, secure payment or forget the password, security authentication will be required. At present, the most common security authentication method is to send SMS for authentication. [0003] However, in the existing security authentication methods, mobile phone text messages must be transmitted through the air interface, and the content of text messages is encrypted easily and easily stolen. The security authentication process requires human participation, and roaming fees will be incurr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/06H04W12/48
CPCH04W12/06
Inventor 常富坤冯璐周鹏
Owner BEIJING TRAVELRELY SOFTWARE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products