Authentication method and device of subscriber identity module card and nonvolatile storage medium

A technology for user identification and authentication methods, applied in the field of non-volatile storage media, user identification card authentication methods and devices, capable of solving problems such as low safety factor and low verification strength, and improving verification strength and solving verification problems. Low strength, the effect of improving the technical effect

Active Publication Date: 2022-05-20
北京时代亿信科技股份有限公司
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present application provides an authentication method and device for a user identification card, and a non-volatile storage m

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method and device of subscriber identity module card and nonvolatile storage medium
  • Authentication method and device of subscriber identity module card and nonvolatile storage medium
  • Authentication method and device of subscriber identity module card and nonvolatile storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] In order to enable those skilled in the art to better understand the solution of the present application, the technical solution in the embodiment of the application will be clearly and completely described below in conjunction with the accompanying drawings in the embodiment of the application. Obviously, the described embodiment is only It is an embodiment of a part of the application, but not all of the embodiments. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the scope of protection of this application.

[0027] It should be noted that the terms "first" and "second" in the description and claims of the present application and the above drawings are used to distinguish similar objects, but not necessarily used to describe a specific sequence or sequence. It is to be understood that the data so used are interchangeable under appropriate circumstances such...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an authentication method and device of a subscriber identity module card and a nonvolatile storage medium. The method comprises the following steps: receiving an authentication request which is initiated by a mobile terminal and is used for authenticating a subscriber identity module card, and the authentication request comprises an encryption certificate of the mobile terminal; obtaining a timestamp generated by the timestamp server, and encrypting the timestamp by using a public key obtained by analyzing the encryption certificate of the mobile terminal to obtain a ciphertext timestamp; sending the ciphertext timestamp and an encryption certificate of the server to the mobile terminal; authentication information sent by the mobile terminal is received, the user identity identification card is authenticated according to the authentication information, and the authentication information is obtained by the mobile terminal based on the information of the user identity identification card, the encryption certificate of the server and the ciphertext timestamp. The technical problems of low verification intensity and low safety coefficient of the existing SIM card authentication technology are solved.

Description

technical field [0001] The present application relates to the field of chip security, in particular, to an authentication method and device for a user identification card, and a non-volatile storage medium. Background technique [0002] Subscriber Identity Module (SIM), also known as a super SIM card, is based on the SIM card security chip, using different functional modules of the SIM card to achieve low, medium and high levels of authentication security products, which can provide users with mobile phone-based One-click login of number, financial USB-Shield authentication, electronic identity authentication and other capabilities. [0003] The existing SIM card authentication method is to send the mobile phone number corresponding to the SIM card to the server for verification through the traffic channel, which has low verification strength and low safety factor. [0004] For the above problems, no effective solution has been proposed yet. Contents of the invention [...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/069H04W12/40H04L9/32
CPCH04W12/069H04W12/40H04L9/3247H04L9/3297
Inventor 李继国章勇张斌
Owner 北京时代亿信科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products