Mobile terminal safety access authentication method in combination with fingerprint

A mobile terminal and secure access technology, applied in security devices, digital data authentication, electrical components, etc., can solve problems such as identity verification of people who cannot use the device, to ensure timeliness, solve security defects, and prevent illegal access Effect

Active Publication Date: 2017-03-08
JIANGSU ELECTRIC POWER CO +1
View PDF6 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The technical problem to be solved by the present invention is that the existing identification technology only verifies the device with a security chip and digital certificate, but cannot verify the identity of the person using the device

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile terminal safety access authentication method in combination with fingerprint
  • Mobile terminal safety access authentication method in combination with fingerprint
  • Mobile terminal safety access authentication method in combination with fingerprint

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] Such as Figure 1-5 As shown, the mobile terminal secure access authentication method combined with fingerprints disclosed in the present invention adopts the client / server mode, and the mobile terminal installs client software, and the software first uses USBKEY and digital certificate to negotiate with the secure access gateway to complete certificate-based identity authentication Establish an encrypted channel based on the national secret algorithm, and then collect terminal characteristic information, including USBKEY serial number, digital certificate serial number, mobile terminal serial number and user fingerprint characteristic information, and upload it to the secure access gateway through the encrypted channel. The secure access gateway verifies the integrity and validity of the terminal information, and determines whether the terminal can access the protected server according to the verification result. Specifically include the following steps:

[0030] Step...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a mobile terminal safety access authentication method in combination with fingerprint. The method comprises the four steps of establishing an encryption channel, user registering, user information checking and user business accessing. A client collects terminal feature information which comprises a USBKEY sequence number, a digital certificate sequence number, a mobile terminal sequence number and user fingerprint feature information, and the terminal feature information is uploaded to a safety access gateway through the encryption channel; the safety access gateway verifies the integrity and validity of the terminal information, and decides whether the terminal can access a protected server according to a verification result. The fingerprint recognition technology is combined with the traditional identity recognition mode, so that the medium for marking the identity is directly related to the natural person, the identity recognition and the recognized person are really corresponding to each other, the security level of the mobile terminal information access is effectively improved, and the convenient mobile technology can be facilitated to play effect in the information application.

Description

technical field [0001] The invention relates to a mobile terminal security access authentication method, in particular to a mobile terminal security access authentication method combined with fingerprints. Background technique [0002] At present, terminal security mainly adopts authentication methods such as passwords, USBKEYs, digital certificates, etc., which only verify whether the user knows the certain information, and these media for identifying identities are not related to the identified person itself, not only It is easy to be lost and leaked, and under the existing technical conditions, it is not difficult to forge, so the traditional identification method can no longer meet the various intelligence requirements of the rapidly developing society, especially in terms of security and management. A new, more accurate and reliable identification technology. [0003] Fingerprint identification technology is currently the most mature and cheap biometric identification ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06G06F21/32H04W12/04H04W12/0431H04W12/069H04W12/106
CPCH04W12/04H04W12/06G06F21/32
Inventor 李维邓进朱世顺陆忞娄征臧燕张滔屠正伟
Owner JIANGSU ELECTRIC POWER CO
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products