Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method and device for securely accessing a mobile phone terminal to an information network

A mobile phone terminal and information network technology, applied in the field of network security, can solve the problems of inability to use password modules such as USBKEY, fraudulent use and tampering, security risks, etc., and achieve the effects of reducing security risks, preventing tampering and forgery, and authenticating security and reliability.

Pending Publication Date: 2019-06-11
THE FIRST RES INST OF MIN OF PUBLIC SECURITY
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Mobile terminals cannot use password modules such as USBKEY;
[0008] 2) When collecting and sending terminal feature information, only the serial number of the digital certificate is sent, and the digital certificate itself is not signed and sent, which has potential security risks;
[0009] 3) There is no real-time query on the validity of the digital certificate, so that the terminal digital certificate can enter the information network even when it expires or is revoked;
[0010] 4) Using fingerprints as user identity authentication is easy to be tampered with by fraudulent use. For example, hand masks can be used to obtain user fingerprint information and then falsify, thus causing security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for securely accessing a mobile phone terminal to an information network
  • A method and device for securely accessing a mobile phone terminal to an information network
  • A method and device for securely accessing a mobile phone terminal to an information network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0090] In Embodiment 1 provided by the present invention, the mobile phone terminal encryption module is inSE as an example for description. The equipment and environment configuration of this embodiment 1 are as follows:

[0091] 1) Complete information network environment;

[0092] 2) A mobile terminal with inSE built-in mobile terminal password module, has obtained a user digital certificate, and has been written into inSE. The mobile terminal network control APP has been installed. With mobile wireless network data communication capabilities. Has a front camera.

[0093] 3) A network control server, deployed at the entrance of the information network, can establish an HTTPS connection with the mobile terminal, and has the capability of signature verification.

[0094] 4) A portrait data server, deployed in the information network, imports the portrait information of legal users in advance, and provides an interface for querying the portrait information of legal users. ...

Embodiment 2

[0115] In Embodiment 2 provided by the present invention, the mobile phone terminal encryption module is a TF card as an example for description. The equipment and environment configuration of this embodiment 2 are as follows:

[0116] 1) Complete information network environment;

[0117] 2) A mobile phone terminal with TF card interface, and the TF card of the cryptographic module has been inserted; the user digital certificate has been obtained and written into the TF card; the mobile terminal network control APP has been installed; it has the capability of mobile wireless network data communication; Front camera;

[0118] 3) A network control server, deployed at the entrance of the information network, can establish an HTTPS connection with the mobile terminal, and has the capability of signature verification;

[0119] 4) In the private cloud of the information network, create three virtual cloud hosts to realize the cloud deployment of the portrait data server, the termi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and device for enabling a mobile phone terminal to safely access an information network, and the method comprises the following steps of importing the user informationallowed to be accessed and mobile phone terminal information into an information verification system, and generating an information verification white list; constructing a one-to-one corresponding legality mapping table for the user, the mobile phone terminal and the user digital certificate, and pre-importing the one-to-one corresponding legality mapping table into a network controller; using the network controller to obtainthe user information and mobile phone terminal information applied for access, and comparing the user information and the mobile phone terminal information applied for access with the information in the generated information verification white list; when the user information applying for access and the mobile phone terminal information exist in the information verification white list, comparing the user applying for access, the mobile phone terminal and the digital certificate with a pre-imported legality mapping table; if yes, allowing the mobile phone terminalto access the information network; otherwise, denying the access. According to the method, the mobile phone terminal can be accessed to the information network safely, efficiently and flexibly.

Description

technical field [0001] The invention relates to a method for a mobile phone terminal to securely access an information network, and a device for realizing the method, belonging to the technical field of network security. Background technique [0002] Information networks usually need to authenticate the identity of users before providing services, and may encrypt and protect subsequent communication data to control that only legitimate users can use relevant resources, services or functions. Using digital certificates is a common security mechanism to solve this problem. By using the digital certificate bound to the user, using the PKI system, VPN technology, etc., the complexity of the user's use can be simplified and the security of identity authentication can be improved. [0003] The mobile terminal obtains various data resources and services through the information network. The number of accesses is large, and the data exchange traffic is large. The information netwo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/08H04M1/725H04W12/069
Inventor 欧阳甸刘衍斐赵荣辉周昕李勇徐乐张春慧
Owner THE FIRST RES INST OF MIN OF PUBLIC SECURITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products