Check patentability & draft patents in minutes with Patsnap Eureka AI!

Method and device for terminal authentication

A terminal authentication and terminal technology, applied in the field of mobile Internet, can solve the problem of no authentication process, and achieve the effect of safe and independent authentication process and fast login

Active Publication Date: 2016-04-27
CHINA TELECOM CORP LTD
View PDF7 Cites 33 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, in the above two multi-terminal authentication technologies, the gateway or home gateway essentially logs in to the business system for authentication, and then shares the login authority with the terminal. The terminal only acts as an operation interface in the system and does not have an independent authentication process.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for terminal authentication
  • Method and device for terminal authentication
  • Method and device for terminal authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0033] The relative arrangements of components and steps, numerical expressions and numerical values ​​set forth in these embodiments do not limit the scope of the present invention unless specifically stated otherwise.

[0034] At the same time, it should be understood that, for the convenience of description, the sizes of the various parts shown in the drawings are not drawn according to the actual proportional relationship.

[0035] Techniques, methods and devic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a device for terminal authentication and belongs to the mobile Internet technology field. The method comprises steps that a first authentication request sent by a terminal during first registration of a user is received, and the first authentication request contains a user account, a cipher and a terminal identification; whether the cipher is an account cipher or a temporary cipher is determined; if the cipher is the account cipher, the terminal is authenticated according to the user account, the cipher and the terminal identification contained in the first authentication request, an access token corresponding to the user account and the account cipher is sent to the terminal after authentication, and the access token and the terminal identification are bound; a second authentication request sent by the terminal during second registration of the user is received, and the terminal is authenticated according to the access token and the terminal identification contained in the second identification request. Through the method, safe and independent authentication of the terminal can be realized.

Description

technical field [0001] The invention relates to the technical field of mobile Internet, in particular to a method and device for terminal authentication. Background technique [0002] With the development of Internet technology, many users now own multiple terminals at the same time, such as mobile phones, tablet computers, TVs, and personal computers. A user may use multiple terminals to log in to the same business system, that is, use the same account number and password on different terminals to log in to the same business system. [0003] In a method and system for realizing multi-terminal unified authentication, when the gateway receives a terminal's access request to the service platform, the gateway encapsulates the token used for authentication stored by itself into the terminal's service access request, and the service access The request is forwarded to the service platform that the terminal needs to access. After receiving the service access request, the service p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04W12/06H04W12/69
Inventor 庄永昌王建秀
Owner CHINA TELECOM CORP LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More