Authentication method, authentication system, authentication method of mobile terminal and mobile terminal
A mobile terminal and authentication method technology, applied in the field of communication, can solve problems such as untrustworthiness, lack of security, and inability to identify fake base stations, etc., to achieve the effects of ensuring legality, facilitating implementation, and avoiding security threats
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0065] This embodiment provides an authentication method, such as figure 1 shown, including:
[0066] Step 10: After searching for a server access point, the mobile terminal generates a random code, and sends the random code to the server through the server access point.
[0067] Wherein, the random code is independently generated by the mobile terminal, and the generation process does not interact with any external entity (such as a network or a mobile terminal, etc.), and the content is completely unlimited.
[0068] Step 11: The server signs the random code, encrypts the signed content, and returns the encrypted content to the mobile terminal through the server access point.
[0069] Step 12: The mobile terminal receives the encrypted returned content, decrypts it and verifies the signature.
[0070] Wherein, the content returned after encryption by the server is decrypted. If the random code sent by the mobile terminal can be restored after decryption, and the signature ...
Embodiment 2
[0074] This embodiment provides an authentication method, such as figure 2 As shown, before step 10 also include:
[0075] Step 9: Before searching for the server access point, the mobile terminal pre-saves the public key of the legal server to be accessed.
[0076] Step 10: After searching for a server access point, the mobile terminal generates a random code, and sends the random code to the server through the server access point.
[0077] Wherein, the random code is independently generated by the mobile terminal, and the generation process does not interact with any external entity (such as a network or a mobile terminal, etc.), and the content is completely unlimited.
[0078] Step 11: The server signs the random code, encrypts the signed content, and returns the encrypted content to the mobile terminal through the server access point.
[0079] This step specifically includes: the server uses its own stored private key to digitally sign the random code. Then use the pr...
Embodiment 3
[0090] This embodiment provides an authentication system, such as image 3 As shown, it includes a mobile terminal 1 and a server 2 , and the mobile terminal 1 includes a search module 11 , a random code generation module 12 and a first sending module 13 . The search module 11 is used to search for server access points. The random code generation module 12 is used to generate a random code after the search module 11 searches for a server access point. The first sending module 13 is used to send the random code to the server 2 through the server access point. The server 2 includes a signature module 21 , an encryption module 22 and a second sending module 23 . The signature module 21 is configured to receive the random code sent by the first sending module 13, and sign the random code. The encryption module 22 is used to encrypt the signed content. The second sending module 23 is used to return the encrypted content to the mobile terminal 1 through the server access point. ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 