Unlock instant, AI-driven research and patent intelligence for your innovation.

Security authentication method and device for private network terminal

A technology of security authentication and private network, which is applied in the direction of transmission system, electrical components, etc., can solve the problems of not being able to use the association relationship, not being able to obtain accurate and fast authentication of fingerprint authentication, and not proposing security authentication of private network services, so as to achieve accurate security authentication Effect

Active Publication Date: 2021-05-28
CHENGDU TD TECH LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the terminal application system and the private network system are two completely different systems, it is impossible to use the existing relationship between terminal system users and fingerprints to perform fingerprint authentication on the business of the private network system
Therefore, the existing terminal fingerprint service module cannot be used to ensure the security of private network services, and thus the accurate and fast authentication effect that fingerprint authentication can achieve cannot be obtained.
[0004] At present, no scheme has been proposed to use fingerprints to perform security authentication on private network services in private network terminals

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security authentication method and device for private network terminal
  • Security authentication method and device for private network terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] In order to make the purpose, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0016] figure 1 It is a schematic flow diagram of the method of the embodiment of the present invention, such as figure 1 As shown, the security authentication method of the private network terminal implemented in this embodiment mainly includes:

[0017] Step 101. When a user enters a fingerprint on a private network terminal, the operating system of the private network terminal obtains the private network account currently logged into the private network, and triggers to associate the currently entered fingerprint data with the private network account.

[0018] In this step, the operating system of the private network terminal needs to obtain the private network account currently logged into the private network when the dedicated user ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application discloses a security authentication method and device for a private network terminal, wherein the method includes: when a user enters a fingerprint on a private network terminal, the operating system of the private network terminal obtains the private network account currently logged into the private network, and triggers Associating the currently entered fingerprint data with the private network account; when the private network terminal is triggered to use fingerprint authentication to perform private network user authentication, the operating system will The private network account of the network and the associated information between the stored fingerprint data and the private network account determine the legitimacy of the current fingerprint data to be authenticated. By adopting the invention, the private network service can be quickly and accurately authenticated in safety.

Description

technical field [0001] The invention relates to mobile communication technology, in particular to a security authentication method and device for a private network terminal. Background technique [0002] In the existing private network systems such as witen or 3gpp, all services are bound to the private network account. After the private network terminal is turned on, it cannot carry out its private network business before logging in to the private network account. In order to ensure the security of private network services, after a private network terminal logs in to a private network account, user security authentication is still required when performing private network services. Usually, one private network terminal can bind multiple private network accounts. [0003] Fingerprint authentication is a highly reliable security authentication method, but in existing terminal devices such as android terminals, fingerprints are bound to users of the terminal application system...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/0861
Inventor 廖红卫张闯武华伍侯乐武
Owner CHENGDU TD TECH LTD