Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A mobile terminal security access authentication method combined with fingerprint

A mobile terminal, secure access technology, applied in security devices, digital data authentication, electrical components, etc., can solve problems such as authentication of people who cannot use the device, ensure timeliness, enhance use security, and improve response speed. Effect

Active Publication Date: 2021-09-24
JIANGSU ELECTRIC POWER CO +1
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The technical problem to be solved by the present invention is that the existing identification technology only verifies the device with a security chip and digital certificate, but cannot verify the identity of the person using the device

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A mobile terminal security access authentication method combined with fingerprint
  • A mobile terminal security access authentication method combined with fingerprint
  • A mobile terminal security access authentication method combined with fingerprint

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] Such as Figure 1-5 As shown, the mobile terminal secure access authentication method combined with fingerprints disclosed in the present invention adopts the client / server mode, and the mobile terminal installs client software, and the software first uses USBKEY and digital certificate to negotiate with the secure access gateway to complete certificate-based identity authentication Establish an encrypted channel based on the national secret algorithm, and then collect terminal characteristic information, including USBKEY serial number, digital certificate serial number, mobile terminal serial number and user fingerprint characteristic information, and upload it to the secure access gateway through the encrypted channel. The secure access gateway verifies the integrity and validity of the terminal information, and determines whether the terminal can access the protected server according to the verification result. Specifically include the following steps:

[0030] Step...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a mobile terminal safety access authentication method combined with fingerprints, which includes four steps of establishing an encrypted channel, user registration, user information review and user service access. The client collects terminal characteristic information, including USBKEY serial number, digital certificate serial number, mobile terminal serial number and user fingerprint characteristic information, uploads it to the secure access gateway through an encrypted channel, and the secure access gateway verifies the integrity and validity of the terminal information , and determine whether the terminal can access the protected server according to the verification result. By combining fingerprint identification technology with traditional identification methods, the media for identifying identities is directly related to the natural person itself, realizing the real correspondence between identification and the identified person, and effectively improving the security level of mobile terminal information access , It is more conducive to the role of convenient mobile technology in information application.

Description

technical field [0001] The invention relates to a mobile terminal security access authentication method, in particular to a mobile terminal security access authentication method combined with fingerprints. Background technique [0002] At present, terminal security mainly adopts authentication methods such as passwords, USBKEYs, digital certificates, etc., which only verify whether the user knows the certain information, and these media for identifying identities are not related to the identified person itself, not only It is easy to be lost and leaked, and under the existing technical conditions, it is not difficult to forge, so the traditional identification method can no longer meet the various intelligence requirements of the rapidly developing society, especially in terms of security and management. A new, more accurate and reliable identification technology. [0003] Fingerprint identification technology is currently the most mature and cheap biometric identification ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/069G06F21/32H04W12/04H04W12/0431H04W12/106
CPCH04W12/04H04W12/06G06F21/32
Inventor 李维邓进朱世顺陆忞娄征臧燕张滔屠正伟
Owner JIANGSU ELECTRIC POWER CO
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products