Unlock instant, AI-driven research and patent intelligence for your innovation.

Terminal security authentication method, device and system

An authentication method and terminal security technology, applied in the field of devices and systems, and terminal security authentication methods, can solve problems such as relying on security capabilities

Active Publication Date: 2019-07-09
HUAWEI TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Embodiments of the present invention provide a terminal security authentication method, device, and system to solve the problem that terminal access authentication using software user identification information is too dependent on the security capabilities of the terminal's operating system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal security authentication method, device and system
  • Terminal security authentication method, device and system
  • Terminal security authentication method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0125] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0126] The terminal access authentication process of the present invention takes the EAP-SIM authentication flow as the framework, and on this basis, the interactive information or interactive flow related to the digital certificate and user identification information in the present invention is added.

[0127] figure 1 It is a flow chart of Embo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Embodiments of the present invention provide a terminal security authentication method, device and system. The terminal security authentication method of the present invention includes: obtaining user identification information distributed by the operator server, the user identification information including a serial number and a key that uniquely identify the user identity; sending an access authentication request to the access server; according to the The digital certificate of the terminal and the user identification information are exchanged with the access server for implementing access authentication information; receiving the access authentication success information sent by the access server, and passing the access The server accesses the network and uses network services provided by the network. The embodiment of the present invention realizes double authentication of the terminal ID and the user ID, and solves the problem that the terminal access authentication using software user identification information is too dependent on the security capability of the operating system of the terminal.

Description

technical field [0001] Embodiments of the present invention relate to communication technologies, and in particular to a terminal security authentication method, device and system. Background technique [0002] The appearance of the second generation Global System for Mobile Communication (GSM for short) mobile phones and Subscriber Identity Module (SIM for short) makes it unnecessary for users to replace mobile phones or mobile phones as frequently as in the era of machine-card integration. The number also makes mobile phone technology develop rapidly, and the styles emerge in endlessly. At the same time, mobile communication network operators flexibly expand the distribution channels of SIM cards with the help of machine-card separation technology, ensuring the safe use of network basic keys, and bringing today's mobile phone users Large scale and rich mobile services, and continue to be used in the third generation of mobile phone terminals. In IoT applications, due to t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/06H04W12/069
CPCH04L9/32H04W12/08
Inventor 杜宗鹏薛莉
Owner HUAWEI TECH CO LTD