Unlock instant, AI-driven research and patent intelligence for your innovation.

Security and authentication method and system for multi-network integration

A technology of multi-network integration and authentication method, which is applied in telephone communication and network fields, can solve problems such as not being absolutely safe, and achieve the effect that it is difficult to be attacked by humans

Active Publication Date: 2020-10-13
翁印嵩
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the SMS verification code must be sent in clear code, so it is not absolutely safe
Moreover, the above methods must go through the intermediary and management of Cloud C, and are completely ineffective when faced with attacks from insiders in the cloud.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security and authentication method and system for multi-network integration
  • Security and authentication method and system for multi-network integration
  • Security and authentication method and system for multi-network integration

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0067] Such as image 3 Shown is an embodiment of the multi-network fusion security and authentication system of the present invention, including a multi-network fusion module 100 connected to the Internet and a telecommunication network at the same time, and a user terminal UU. Among them, the multi-network fusion module 100 performs security information interaction with the user terminal UU through the channel of the telecommunication network based on the identity authentication of the telecommunication, for example, identifying the CID (Calling Line Identification) with the calling number of the telecommunication or using the information provided by the telecommunication operator. Based on the certificate issued for identity authentication, such as SIM card, eSIM or U-key, etc.

[0068] In this embodiment, the multi-network fusion module 100 includes an algorithm module 110 and a control logic module 120 . Among them, the algorithm module 110 communicates with the outside ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to a multi-network integration security and authentication method, comprising the following steps: S1. providing a multi-network integration module, same being simultaneously connected to the Internet and a telecommunication network; and S2. the multi-network integration module carrying out, based on the identity authentication of telecommunication and by means of a channel of a telecommunication network, secure information exchange with a user terminal. In the present invention, by means of a channel of a telecommunication network, secure information exchange is carried out, based on the identity authentication of telecommunication, with a user terminal, wherein the whole process does not require the participation of a third-party cloud end. The present invention avoids the defects in the existing technology, and has the advantages of being secure, reliable and difficult to attack artificially.

Description

technical field [0001] The invention relates to the fields of network and telephone communication, and in particular, relates to a method and system for safety and authentication of multi-network integration. Background technique [0002] With the development of technology, remote control of various devices or remote storage of various information through the Internet is becoming more and more popular, such as the control of smart homes, related applications of the Internet of Things, etc., but security has always been an issue. an obsession. People use various modern technologies such as: VPN, various complex encryption algorithms, various huge cloud services, etc., which not only increases the complexity but also increases the cost of users, and because of the openness of the Internet, security The problem has never been fully resolved. How to construct a safe and low-cost control method for ordinary users has become a problem we have to face. [0003] Among them, the s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/083H04L63/0876
Inventor 翁印嵩
Owner 翁印嵩