Identity verification method and apparatus

An identity verification method and an identity verification technology, which are applied in the field of identity verification methods and devices, can solve problems such as low security, and achieve the effects of improving security and solving low security.

Inactive Publication Date: 2018-06-26
ZTE CORP
View PDF6 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] The embodiment of the present invention provides an identity verification method and device to at least solve the technical problem of low security when the vehicle-mounted terminal verifies the handheld terminal in the related art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity verification method and apparatus
  • Identity verification method and apparatus
  • Identity verification method and apparatus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0035] The network architecture of the embodiment of the present application includes: a vehicle-mounted terminal, a handheld terminal, and a server, wherein the vehicle-mounted terminal, the handheld terminal, and the server are connected to each other for information exchange.

[0036] In this embodiment, an identity verification method running on the above-mentioned network architecture is provided, figure 1 is a flowchart of an identity verification method according to an embodiment of the present invention, such as figure 1 As shown, the process includes the following steps:

[0037] Step S102, using short-range communication technology to establish a binding relationship with the vehicle-mounted terminal;

[0038] Step S104, requesting the vehicle-mounted terminal to use a symmetric key to authenticate the handheld terminal; wherein, the binding relationship is a one-to-one correspondence between the vehicle-mounted terminal and the handheld terminal.

[0039] Through ...

Embodiment 2

[0078] An identity verification device is also provided in this embodiment, and the device is used to implement the above embodiments and preferred implementation modes, and what has been described will not be repeated. As used below, the term "module" may be a combination of software and / or hardware that realizes a predetermined function. Although the devices described in the following embodiments are preferably implemented in software, implementations in hardware, or a combination of software and hardware are also possible and contemplated.

[0079] Figure 5 is a structural block diagram of an identity verification device according to an embodiment of the present invention, such as Figure 5 As shown, the device includes:

[0080] Establishing a module 50, configured to establish a binding relationship with the vehicle-mounted terminal using short-distance communication technology;

[0081] The request module 52 is used to request the vehicle-mounted terminal to use a sy...

Embodiment 3

[0095] This embodiment is an optional embodiment of the present invention, and is used for detailed and supplementary description of the scheme of the present application:

[0096] The technical problem to be solved in this embodiment is: to overcome the limitation of relying on wireless network and low security existing in related technologies, to provide a virtual key solution based on dynamic password, to realize the uniqueness of identity verification, and to improve the verification efficiency. confidentiality.

[0097] Uniqueness refers to the one-to-one correspondence between the vehicle-mounted terminal and the APP (application program) of the handheld terminal through the public key infrastructure (Public Key Infrastructure, PKI) architecture, that is, the APP of a certain handheld terminal can only control a certain vehicle-mounted terminal. It is impossible to control multiple vehicle-mounted terminals, thereby avoiding the scenario that once a certain handheld term...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an identity verification method and apparatus. The method includes the steps of establishing a binding relationship with a vehicle terminal by using a short-range communicationtechnology; and requesting the vehicle terminal to perform identity verification on a handheld terminal by using a symmetric key; wherein the binding relationship is that the vehicle terminal has a one-to-one correspondence with the handheld terminal. Through the identity verification method and apparatus, the technical problem of low security when the vehicle terminal verifies the handheld terminal in the related art is solved.

Description

technical field [0001] The present invention relates to the communication field, in particular to an identity verification method and device. Background technique [0002] In related technologies, with the rapid development of communication 3G / 4G networks, more and more vehicle-mounted terminal devices have integrated wireless communication modules, and such vehicle-mounted terminal products increasingly need to act as the control center of the entire in-vehicle network. The extension of this kind of control is getting bigger and bigger. In addition to the control of in-vehicle equipment, it also needs to be used as the network channel and control center of the passenger's mobile terminal in the car. This makes the application range of the vehicle terminal more and more extensive. Automobile manufacturers not only hope that the vehicle-mounted terminal can provide basic communication functions, but also hope that the vehicle-mounted terminal can provide vehicle control func...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W4/80H04W4/40H04W12/02H04W12/06H04W76/10H04L29/06
CPCH04L63/0435H04L63/083H04W12/02H04W12/06H04L67/12G06F21/44H04W12/47
Inventor 赵明
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products