Authentication method and device, terminal and computer readable storage medium

An authentication method and authentication device technology, applied in the direction of secure communication devices, digital transmission systems, electrical components, etc., can solve the problems of multiple systems, low authentication efficiency, and high cost

Active Publication Date: 2020-05-05
CHINA TELECOM CORP LTD
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The inventors of the present disclosure have found the following problems in the above-mentioned related technologi

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method and device, terminal and computer readable storage medium
  • Authentication method and device, terminal and computer readable storage medium
  • Authentication method and device, terminal and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] Various exemplary embodiments of the present disclosure will now be described in detail with reference to the accompanying drawings. It should be noted that relative arrangements of components and steps, numerical expressions and numerical values ​​set forth in these embodiments do not limit the scope of the present disclosure unless specifically stated otherwise.

[0029] At the same time, it should be understood that, for the convenience of description, the sizes of the various parts shown in the drawings are not drawn according to the actual proportional relationship.

[0030] The following description of at least one exemplary embodiment is merely illustrative in nature and in no way intended as any limitation of the disclosure, its application or uses.

[0031] Techniques, methods and devices known to those of ordinary skill in the relevant art may not be discussed in detail, but where appropriate, such techniques, methods and devices should be considered part of t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an authentication method and device, a terminal and a computer readable storage medium, and relates to the technical field of mobile communication. The method comprises the steps that a first terminal receives an authentication request sent by a second terminal; the first terminal judges whether the first terminal and the second terminal are in the same authentication domain; under the condition of being in different authentication domains, the first terminal extracts an identifier of the second terminal in the authentication request and a public parameter of the authentication domain where the second terminal is located; the first terminal calculates a public key according to the identifier of the second terminal and the public parameter; and the first terminal authenticates the second terminal by using the public key. According to the technical scheme, the authentication efficiency can be improved, and the authentication cost is reduced.

Description

technical field [0001] The present disclosure relates to the technical field of mobile communication, and in particular to an authentication method, an authentication device, a terminal, and a computer-readable storage medium. Background technique [0002] Authenticating communication terminals is an important technology to improve network security. [0003] In related technologies, methods such as characteristic string authentication, certificate authentication, and algorithm authentication are mainly used. The authentication information of the terminal is stored on the authentication platform in this authentication domain, and two terminals in different authentication domains realize mutual authentication between cross-domain terminals through the authentication platform of their respective authentication domains and the third-party authentication center. Contents of the invention [0004] The inventors of the present disclosure have found the following problems in the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L29/06
CPCH04L9/0825H04L63/083
Inventor 黄铖斌方燕萍王锦华姜钰任永攀王渭清
Owner CHINA TELECOM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products