Identity authentication method and device for terminal device, terminal device and server

An identity authentication device and terminal equipment technology, applied in the information field, can solve the problems of terminal equipment security threats, fraudulent use of equipment, high cost, etc., achieve long-term security assurance, prevent reverse engineering cracking, and improve security

Active Publication Date: 2017-10-27
BEIJING SOGOU INTELLIGENT TECH CO LTD
View PDF6 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the serial number SN of most smart terminals is encoded in some kind of plaintext, such as a self-increasing integer sequence, which is extremely easy to be cracked by malicious programs and the identity of the device is falsely used. Once the identity of the smart terminal is fraudulently used, the It may lead to some malicious attacks and pose a serious threat to the security of terminal equipment
[0004] In the prior art, based on the RSA asymmetric encryption algorithm, a signature certificate can be issued for each smart terminal, and by using the signature certificate of the device to verify the identity of the device, the identity verification of the smart terminal can be completed in a safe environment, but , adopting the above scheme needs to establish its own independent CA (Certification Authority, certification) system, and the cost is relatively high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and device for terminal device, terminal device and server
  • Identity authentication method and device for terminal device, terminal device and server
  • Identity authentication method and device for terminal device, terminal device and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] In order to make the above objects, features and advantages of the present invention more comprehensible, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0055] refer to figure 1 , which shows a flow chart of the steps of Embodiment 1 of an identity authentication method for a terminal device according to the present invention, which may specifically include the following steps:

[0056] Step 101, sending an identity authentication request to the server;

[0057] Generally, after the terminal device accesses the network, it needs to complete corresponding identity authentication with the server. At this time, the terminal device can send an identity authentication request to the server.

[0058]In the embodiment of the present invention, the request may include the serial number SN of the terminal device, and the secure serial number SSN stored in the terminal device, and the secu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides an identity authentication method and device for a terminal device, the terminal device and a server. The method comprises the steps of sending an identity authentication request to the server, wherein the request comprises a sequence number SN of the terminal device and a security sequence number SSN existing in the terminal device, and the security sequence number SSN has corresponding identification information; and receiving an identity authentication result returned by the server. The SSN can be effectively prevented from being broken by reverse engineering, the SSN is guaranteed to be safe and valid, and the security of the terminal device and system is improved.

Description

technical field [0001] The present invention relates to the field of information technology, in particular to an identity authentication method for terminal equipment, an identity authentication device for terminal equipment, a terminal equipment and a server. Background technique [0002] With the development of technology, there are more and more smart terminals of all kinds, which bring great convenience to people's work and life. Through smart terminals, people can obtain information, make purchases, and complete payment. Therefore, the security of smart terminals has attracted more and more attention. [0003] Usually, any intelligent terminal will have a unique serial number SN (Serial Number) to identify the identity of the terminal. After the smart terminal accesses the network each time, it needs to send the serial number to the server, and the server will identify and verify the identity of the smart terminal according to the received serial number. However, the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/067H04L63/0838H04L67/60
Inventor 王东永刘晔吴滔李健涛
Owner BEIJING SOGOU INTELLIGENT TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products