Unlock instant, AI-driven research and patent intelligence for your innovation.

Mobile communication terminal generated authentication data and system of terminal authentication and implement method thereof

A technology for mobile communication terminals and authentication data, applied to mobile communication terminals that generate authentication data, terminal authentication systems and their actions, can solve problems such as non-execution of authentication key authentication, achieve the effect of preventing infringement and improving reliability

Inactive Publication Date: 2007-05-16
INSPUR LG DIGITAL MOBILE COMMUNICATIONS CO LTD
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, there is a problem that the paid service can be used through a terminal that has not subscribed to the paid service when the authentication key issued as above is duplicated to another terminal for no reason or the above-mentioned authentication key is hacked.
[0006] That is to say, in the existing broadcasting system and service, when the above-mentioned terminals use the broadcasting service, especially paid services, the authentication is only performed based on the existence or non-existence of the issued authentication key in the above-mentioned terminal, and the above-mentioned authentication is not kept. As long as the above-mentioned authentication key exists in a normal state, both the person and the terminal containing the above-mentioned key can use the paid service, so the above-mentioned unprovoked copying or hacking of the authentication key occurs. problems caused by infringement

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile communication terminal generated authentication data and system of terminal authentication and implement method thereof
  • Mobile communication terminal generated authentication data and system of terminal authentication and implement method thereof
  • Mobile communication terminal generated authentication data and system of terminal authentication and implement method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] Embodiments according to the present invention are described below with reference to the drawings. Fig. 1 is a block diagram showing the composition of a mobile communication terminal and a terminal authentication system generating authentication data according to the present invention; Fig. 2 is a block diagram showing the composition of a mobile communication terminal and a terminal authentication system generating authentication data according to the present invention; Fig. 3 is a block diagram showing the configuration of the authentication center of the terminal authentication system according to the present invention.

[0028] The mobile communication terminal and the terminal authentication system according to the present invention, as shown in FIG. 1 , include a broadcast system 100 that transmits data with a broadcast signal, and a terminal that receives the broadcast signal transmitted from the broadcast system and provides broadcast services, and executes An ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to a mobile communication terminal generated authentication data, a system of terminal authentication and implement method thereof, the mobile communication terminal includes: a terminal which can receive broadcast; an authentication center for sending authentication key to the terminal when registering the terminal for broadcast service, judging whether the terminal used by the broadcast service is registered well based on background of the authentication key and authentication data when receiving the authentication data corresponding to the authentication key from the terminal and connecting to the terminal. Comparing the terminal information and executing the authentication when judging whether the terminal authentication key should be preserved or validity of the authentication key, thereby the infraction caused by no reason copy or hacker can be prevented. The reliability of the mobile communication terminal can be improved by reinforcement of the authentication.

Description

technical field [0001] The present invention relates to a mobile communication terminal that generates authentication data, a terminal authentication system, and an operating method thereof, and particularly relates to performing authentication generation by comparing issued authentication keys with information on terminals that have issued the above-mentioned authentication keys to prevent unnecessary duplication of authentication keys A mobile communication terminal, a terminal authentication system, and an operation method thereof for unauthorized use of authentication data of a broadcast service by hackers. Background technique [0002] Recently, broadcasting signals are transmitted through satellites or broadcasting antennas, and broadcasting services can be watched while moving. [0003] The above-mentioned broadcast service can be used in the terminal of the broadcast module that can receive the above-mentioned broadcast signal. For example, when terminals such as not...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04Q7/38H04Q7/32H04B1/40H04W12/06
CPCH04W4/06H04W12/06H04L9/0891
Inventor 薛美映
Owner INSPUR LG DIGITAL MOBILE COMMUNICATIONS CO LTD