Authentication method, micro base station and terminal

An authentication method and micro base station technology, which is applied in user identity/authority verification, advanced technology, broadcast service distribution, etc., can solve the problems that user information security cannot be guaranteed, and user balances are easily exposed, so as to save authentication time, The effect of improving the experience and reducing the probability of leakage

Active Publication Date: 2020-05-29
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] For this reason, the present invention provides an authentication method, a micro base station and a terminal to solve the problem that the security of user information cannot be obtained due to the fact that the micro base station easily exposes private information such as the user's balance when authenticating the terminal. security issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method, micro base station and terminal
  • Authentication method, micro base station and terminal
  • Authentication method, micro base station and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] Specific embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be understood that the specific embodiments described here are only used to illustrate and explain the present invention, and are not intended to limit the present invention.

[0030] A first embodiment of the present invention relates to an authentication method. It is used to reduce the leakage probability of user privacy data and improve the security of user information.

[0031] The implementation details of the authentication method in this embodiment will be described in detail below. The following content is only for the convenience of understanding the implementation details of this solution, and is not necessary for implementing this solution. figure 1 It is a flow chart of the authentication method in this embodiment, and the method can be applied to a micro base station. The method may include the following steps.

[0032...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an authentication method, a micro base station and a terminal, and the method comprises the steps: responding to a connection request transmitted by the terminal, and obtaininga number identification of the terminal; splitting the generated authentication data into N pieces of authentication sub-data, transmitting the N pieces of authentication sub-data to a terminal by using N transmission channels, and sending a micro base station broadcast message to a blockchain network, the micro base station broadcast message comprising the authentication data, a number identifier and a blockchain identifier of a micro base station, and N being an integer greater than or equal to 2; in response to N encryption results returned by the terminal through the N transmission channels, adding the N encryption results to obtain a first verification encryption result, and transmitting the encryption result and the authentication sub-data corresponding to the encryption result through different transmission channels; and determining an authentication result of the terminal according to the first verification encryption result and the second verification encryption result, wherein the second verification encryption result is a result obtained by performing homomorphic encryption on the operator customer service password and the authentication data by the operator server obtained from the blockchain network.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to an authentication method, a micro base station and a terminal. Background technique [0002] With the development of communication technology, the number of network-connected devices continues to increase, especially after entering the fifth generation mobile communication network (The 5th Generation Mobile Networks, 5G), the number of network-connected devices will increase explosively, and the number of network-connected devices per unit area The number may increase to a thousand times that of the past. If the previous macro base station coverage mode continues, no matter how large the bandwidth of the base station is, it will not be able to support it. For example, the previous macro base station covered 1,000 Internet users, and these users shared the speed resources of this base station equally. After entering 5G, users have higher and higher requirements for ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/00H04W12/02H04W12/06H04W4/06H04L9/00H04L9/32H04W12/69
CPCH04W12/02H04W12/06H04W4/06H04L9/008H04L9/3247H04W12/033H04L9/50Y02D30/70
Inventor 田新雪肖征荣马书惠杨子文董慧
Owner CHINA UNITED NETWORK COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products