Authentication method, equipment and server

An application server and security server technology, applied in the fields of authentication methods, equipment and servers, can solve problems such as inability to meet user needs

Active Publication Date: 2021-01-05
HONOR DEVICE CO LTD
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, these verification methods have their own limitations and cannot meet the needs of users in actual use.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method, equipment and server
  • Authentication method, equipment and server
  • Authentication method, equipment and server

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0206] Example 1: The statement information of the Profile certificate (that is, the signature data of the certificate issued by the certificate issuer) carries the identification of the profile's phone number.

[0207] Figure 7 It is a flow chart of another authentication method provided by the embodiment of this application. Such as Figure 7 As shown, the method includes:

[0208] S301. The application sends a login request message for logging in using the eUICC to the LPA.

[0209] Wherein, the login request message may carry R1. In this example, the login request message is the aforementioned initial authentication request message. The login request message may be a login request message triggered by the user clicking a registration or login button of the application.

[0210] Optionally, before step S301, the application negotiates with the application server which authentication method to use for authentication after the user clicks the registration or login butto...

example 2

[0228] Example 2: The statement information of the Profile certificate (that is, the signature data of the certificate issued by the certificate issuer) does not carry the identification of the profile's phone number.

[0229] Figure 8 It is a flow chart of another authentication method provided by the embodiment of this application. Such as Figure 8 As shown, the method includes:

[0230] S401. The application sends a login request message for logging in using the eUICC to the LPA.

[0231] Wherein, the login request message may carry R1. In this example, the login request message is the aforementioned initial authentication request message. The login request message may be a login request message triggered by the user clicking a registration or login button of the application.

[0232] Optionally, before step S401, the application may negotiate with the application server which authentication method to use for authentication after the user clicks the registration or l...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides an authentication method, equipment and a server. The method comprises the steps that terminal equipment receives an initial authentication request message inputted by a user, and the initial authentication request message is used for requesting the verification of the permission of the terminal equipment to an application; the terminal equipment logs in the certificate of the target account of the application by using the terminal equipment and performs authentication interaction with the application server, and the certificate of the target account isstored in the security element of the terminal equipment. According to the authentication method, the authentication equipment, the authentication server and the application server provided by the embodiment of the invention, the account can be authenticated by the application server through the certificate of the account in the security element of the terminal equipment so as to verify whether the identity of the user using the terminal equipment is legal or not. According to the authentication method, the application server can quickly, stably and safely carry out identity authentication onthe user using the terminal equipment, and limitation of an existing identity authentication method does not exist.

Description

technical field [0001] The embodiments of the present application relate to communication technologies, and in particular to an authentication method, device and server. Background technique [0002] With the evolution of technology and requirements, an embedded universal integrated circuit card (eUICC), also known as an embedded subscriber identification module (eSIM) card, is proposed. The eUICC is a secure element that can be remotely managed by multiple mobile network operators (MNOs), and can be inserted into the terminal device by plugging or welding to realize the communication function of the terminal device. That is, the eUICC can be embedded in the terminal device in the form of a single chip, or the eUICC can be embedded in the terminal device as a part of other single chips in the terminal device, or the eUICC can be inserted in the form of a removable card (ie SIM card form) in the terminal device. [0003] With the popularity of the mobile Internet, applicati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0823H04L9/40
Inventor 刘壮吴敏段文杰范姝男
Owner HONOR DEVICE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products