Unlock instant, AI-driven research and patent intelligence for your innovation.

Authentication method, authentication system, authentication method of mobile terminal and mobile terminal

A mobile terminal and authentication method technology, applied in the field of communication, can solve problems such as untrustworthiness, lack of security, and inability to identify fake base stations, etc., to achieve the effects of ensuring legality, facilitating implementation, and avoiding security threats

Inactive Publication Date: 2016-06-08
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF7 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In the first existing solution, the physical layer key that plays a key role is negotiated between the base station (network access point) and the mobile terminal. During this process, the mobile terminal cannot identify whether the connected base station is a fake base station. If Unfortunately connected to a fake base station, the physical key generated through negotiation with the fake base station is essentially insecure; in addition, the authentication data is sent by the core network (network server), if the mobile terminal has already connected to the fake base station, then any data received from the fake base station is untrustworthy
[0006] In the second existing solution, it will be attacked by replay attack technology
However, relying solely on the content of the SMS, the mobile terminal cannot tell whether the SMS is sent by a normal network service provider.
[0008] In the third existing solution, both the key and the temporary identification code are sent by the network side, which is similar to the problem mentioned above
[0009] Therefore, none of these solutions in the prior art can fundamentally prevent the mobile terminal from accessing the pseudo base station

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method, authentication system, authentication method of mobile terminal and mobile terminal
  • Authentication method, authentication system, authentication method of mobile terminal and mobile terminal
  • Authentication method, authentication system, authentication method of mobile terminal and mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0065] This embodiment provides an authentication method, such as figure 1 shown, including:

[0066] Step 10: After searching for a server access point, the mobile terminal generates a random code, and sends the random code to the server through the server access point.

[0067] Wherein, the random code is independently generated by the mobile terminal, and the generation process does not interact with any external entity (such as a network or a mobile terminal, etc.), and the content is completely unlimited.

[0068] Step 11: The server signs the random code, encrypts the signed content, and returns the encrypted content to the mobile terminal through the server access point.

[0069] Step 12: The mobile terminal receives the encrypted returned content, decrypts it and verifies the signature.

[0070] Wherein, the content returned after encryption by the server is decrypted. If the random code sent by the mobile terminal can be restored after decryption, and the signature ...

Embodiment 2

[0074] This embodiment provides an authentication method, such as figure 2 As shown, before step 10 also include:

[0075] Step 9: Before searching for the server access point, the mobile terminal pre-saves the public key of the legal server to be accessed.

[0076] Step 10: After searching for a server access point, the mobile terminal generates a random code, and sends the random code to the server through the server access point.

[0077] Wherein, the random code is independently generated by the mobile terminal, and the generation process does not interact with any external entity (such as a network or a mobile terminal, etc.), and the content is completely unlimited.

[0078] Step 11: The server signs the random code, encrypts the signed content, and returns the encrypted content to the mobile terminal through the server access point.

[0079] This step specifically includes: the server uses its own stored private key to digitally sign the random code. Then use the pr...

Embodiment 3

[0090] This embodiment provides an authentication system, such as image 3 As shown, it includes a mobile terminal 1 and a server 2 , and the mobile terminal 1 includes a search module 11 , a random code generation module 12 and a first sending module 13 . The search module 11 is used to search for server access points. The random code generation module 12 is used to generate a random code after the search module 11 searches for a server access point. The first sending module 13 is used to send the random code to the server 2 through the server access point. The server 2 includes a signature module 21 , an encryption module 22 and a second sending module 23 . The signature module 21 is configured to receive the random code sent by the first sending module 13, and sign the random code. The encryption module 22 is used to encrypt the signed content. The second sending module 23 is used to return the encrypted content to the mobile terminal 1 through the server access point. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an authentication method, an authentication system, an authentication method of a mobile terminal and the mobile terminal. The authentication method comprises the following steps: the mobile terminal generates a random code after finding a server access point through searching, and sends the random code to a server through the server access point; the server signs the random code, encrypts signed content and returns the encrypted content to the mobile terminal through the server access point; the mobile terminal receives the returned encrypted content and performs decryption and signature verification on the content; after success of decryption and signature verification, the mobile terminal accesses the server through the server access point. Legitimacy authentication of the server can be realized with the authentication method, so that the legitimacy of the server accessed actually by the mobile terminal is guaranteed, and security threat caused by mistaken access of the mobile terminal to an unknown server is avoided; the authentication method is simple, practical and convenient to implement.

Description

technical field [0001] The present invention relates to the field of communication technologies, and in particular, relates to an authentication method, an authentication system, an authentication method for a mobile terminal, and a mobile terminal. Background technique [0002] At present, the phenomenon of false base stations is widespread, which has caused a great negative impact on the majority of mobile phone users. The root cause of this problem is that the mobile phone terminal does not verify the legality of the network when accessing the mobile network (such as the GSM network). That is, as long as there is network coverage, the base station with the strongest signal is selected by default and an access action is attempted. Unless the network side refuses, it can access the network. This approach does not guarantee that the identity of the actually accessed network is authentic. [0003] Nowadays, there are more and more applications based on mobile terminals, an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04W12/06H04W12/08
CPCH04W12/02H04W12/06H04W12/08
Inventor 张伦泳
Owner CHINA UNITED NETWORK COMM GRP CO LTD