Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Terminal security authentication method, device and system

A technology of terminal security and authentication method, applied in the field of devices and systems, terminal security authentication method, and can solve problems such as relying on security capabilities

Active Publication Date: 2015-11-25
HUAWEI TECH CO LTD
View PDF4 Cites 43 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Embodiments of the present invention provide a terminal security authentication method, device, and system to solve the problem that terminal access authentication using software user identification information is too dependent on the security capabilities of the terminal's operating system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal security authentication method, device and system
  • Terminal security authentication method, device and system
  • Terminal security authentication method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0125] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0126] The terminal access authentication process of the present invention takes the EAP-SIM authentication flow as the framework, and on this basis, the interactive information or interactive flow related to the digital certificate and user identification information in the present invention is added.

[0127] figure 1 It is a flow chart of Embo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Provided in an embodiment of the present invention are a secure terminal authentication method, device and system, the method comprising: acquiring user identity information distributed by a carrier server, the user identify information comprising a serial number uniquely identifying the identity of a user and a key; transmitting an access authentication request to an access server; according to the digital certificate of the terminal and the user identify information, conducting information interaction with the access server for access authentication; and receiving the access authentication success information transmitted by the access server, accessing a network via the access server, and utilizing the network service provided by the network. The embodiment of the present invention realizes dual authentication of a terminal identifier and a user identifier, thus solving the problem that terminal access authentication using software user identity information is more dependent on the security capability of the operating system of the terminal.

Description

technical field [0001] Embodiments of the present invention relate to communication technologies, and in particular to a terminal security authentication method, device and system. Background technique [0002] The emergence of the second generation Global System for Mobile Communication (GSM for short) mobile phone and Subscriber Identity Module (SIM for short) makes users no longer have to change mobile phones or numbers as frequently as in the era of machine-card integration. With the rapid development, the models emerge in endlessly. At the same time, mobile communication network operators flexibly expand the distribution channels of SIM cards with the help of machine-card separation technology, ensuring the safe use of network basic keys, and bringing today's mobile phone user scale and rich mobile services. , and continue to be used in the third-generation mobile terminal. In IoT applications, due to the special requirements of the terminal for the use environment and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/06H04W12/069
CPCH04L9/32H04W12/08
Inventor 杜宗鹏薛莉
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products