Method for automatic identifying and configurating terminal

An automatic identification and terminal technology, applied in electrical components, user identity/authority verification, transmission systems, etc., can solve problems such as increasing the complexity of business acceptance and increasing the complexity of factory production, achieving low cost, flexible use, and simple configuration. Effect

Active Publication Date: 2007-06-27
CHINA TELECOM CORP LTD
View PDF0 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantages are: 1) Since the operation system does not pay attention to the hardware information of the terminal, if the IC card is copied, theft will occur-the copied IC card is inserted into any terminal, and it can be connected to the operation system and used normally until The user or operator can stop the theft only after taking certain measures (such as disabling the IC card) after discovering the abnormal usage
2) It is necessary to write the user's identity information and its corresponding network identity information into the IC card when the business is accepted, which increases the complexity of business acceptance
[0008] The disadvantages of this method are: 1) increase the complexity of factory production, and need to preset different settings; 2) increase the complexity of business acceptance, and need to establish a corresponding relationship between terminal body information and user identity information during business acceptance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for automatic identifying and configurating terminal
  • Method for automatic identifying and configurating terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] With reference to FIG. 1 , the flow of a method for automatically identifying and configuring a terminal according to the present invention is described in detail.

[0040] After a certain terminal is turned on (step 1), use the factory settings to request access to the operating system (step 2).

[0041] Step 3, the operating system receives the request from the terminal, and then requires the terminal to provide its own identification information.

[0042] Step 4, the terminal transmits its own identification information, including, for example, the body ID+network identity information, to the operation system. The network identity information is, for example, an ADSL account+ADSL password.

[0043] Wherein, if the terminal has not learned its network identity information, the terminal will send its body information and a default network identity information data. The default data is uniformly configured at the factory to represent the default network identity infor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a terminal identification and authentication method. The user registers his identity information into the operating system. The user operates the terminal to connect with the operating system, which requires the terminal to input the user identity information, and verifies whether the input information and previously registered one are matching. If they are, the operating system writes a network status back to the terminal, and establishes a bundled tie among the terminal fuselage information, the user's identity and the network status. The terminal uses the updated network status and its terminal fuselage information to access to the operating system.

Description

technical field [0001] The invention relates to a terminal automatic identification authentication and configuration method, which belongs to the technical field of terminal equipment identification authentication in network operation technology. Background technique [0002] At present, the terminal identification technology mainly includes methods such as IC card (such as SIM card), account number factory preset, etc., which are briefly described as follows: [0003] 1) IC card method (such as SIM card) [0004] The main idea of ​​the terminal identification method realized by this mode is to store the user's identity information (i.e. user's personalized information, such as user ID) and network identity information (such as ADSL account number / password) all on an IC card, However, the terminal’s body information (such as body code, or other hardware addresses) is not concerned, and is generally not retained in the operating system, so this IC card is mainly used to real...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/12H04L9/32
Inventor 王辉张洪清徐俊谭宝莤郑跃葵许文艳胡文华杨可可胡丹华李巍
Owner CHINA TELECOM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products