Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authentication method, terminal and server

A server and terminal technology, applied in the field of the Internet of Things, can solve the problems of long waiting time, low efficiency, peeping, etc., and achieve the effect of fast authentication

Active Publication Date: 2018-11-13
ZTE CORP
View PDF7 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, in some occasions that require a large number of key input and frequent authentication, there will be problems of low efficiency due to long waiting time or card failure; the way of entering the key may be peeped by others, resulting in key leakage would cause unsafe

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method, terminal and server
  • Authentication method, terminal and server
  • Authentication method, terminal and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0068] Such as figure 1 As shown, this embodiment takes the first terminal side as an example to describe the authentication method in detail, including the following steps:

[0069] Step 101: Obtain image data of the second terminal.

[0070] Here, the acquiring image data of the second terminal includes:

[0071] Search for at least one terminal;

[0072] Determine the second terminal from the at least one terminal;

[0073] The image of the second terminal is collected to obtain the image data.

[0074] Here, in actual application, the first terminal can search for at least one terminal through Bluetooth, and can also use other local area network protocols, such as wireless fidelity (WiFi, Wireless Fidelity), ZigBee, etc., to search for at least one terminal; where the terminal is specific It can be ATM machines, access security gates, smart buses or credit card machines on the subway, etc.

[0075] Before searching, you can identify at least one terminal, for example, ATM machines us...

Embodiment 2

[0123] Such as Figure 5 As shown, this embodiment takes the server side as an example to describe the authentication method in detail, including the following steps:

[0124] Step 501: Receive the image data of the second terminal that is sent by the first terminal through the signaling of the Internet of Things protocol that allows for data transmission.

[0125] Here, the receiving the image data of the second terminal that the first terminal allows the signaling to be used to transmit data through the Internet of Things protocol includes:

[0126] Through the signaling radio bearer between the terminal and the core network, the non-access stratum signaling message sent by the first terminal on the signaling radio bearer through the non-access stratum of the signaling plane is received; Let the message contain the image data of the second terminal.

[0127] In actual application, through the signaling radio bearer between the terminal and the core network, the core network side cor...

Embodiment 3

[0141] In order to implement the method in the first embodiment, this embodiment provides a first terminal, such as Image 6 As shown, the first terminal includes: an acquiring module 61, a first sending module 62, and a first receiving module 63; wherein,

[0142] The obtaining module 61 is configured to obtain image data of the second terminal;

[0143] The first sending module 62 is configured to send the image data to the server through the signaling for data transmission through the Internet of Things protocol when the wireless access bearer is in the released state; and send the key to the second terminal;

[0144] Wherein, the image data is used to request the server to send a key corresponding to the first terminal; the key is used for the second terminal to authenticate the first terminal;

[0145] The first receiving module 63 is configured to receive the key sent by the server.

[0146] The acquisition module 61 is specifically configured to search for at least one terminal; ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an authentication method, comprising the following steps: acquiring image data of a second terminal; when a radio access bearer is in a release state, by virtue of an Internetof Things protocol, allowing a signaling used for data transmission to send the image data to a server, wherein the image data is used for requesting the server to send a secret key corresponding to afirst terminal; and receiving the secret key sent by the server, and sending the secret key to the second terminal, wherein the secret key is used for authenticating the first terminal by the secondterminal. The invention also discloses a terminal and a server.

Description

Technical field [0001] The invention relates to the technical field of the Internet of Things, in particular to an authentication method, a terminal and a server. Background technique [0002] At present, smart devices can be seen everywhere in people's lives, and occasions for human-computer interaction are very frequent, and there is authentication during each human-computer interaction process. For example, in a residential area, use the access card to swipe the card, or swipe the fingerprint, or enter the key; on the bus, use the bus card or the chip inside the mobile phone to swipe the card; in the bank, use the automatic teller machine (ATM, Automatic Teller Machine) withdrawal. [0003] However, in some occasions that require a large amount of key input and frequent authentication, it will cause inefficiency problems due to too long waiting time or card swipe failure; the way of key input may be peeped by other people, resulting in key leakage. Will bring about insecurity ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/083H04W12/062H04W12/069H04L9/40
Inventor 张路
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products