Identity authentication method, device, equipment and storage medium

An identity authentication and legal technology, applied in the field of communications, can solve the problems of low recognition accuracy, inability to distinguish wireless frames in time, and limited recognition methods, and achieve the effect of improving security.

Active Publication Date: 2022-05-20
SHANGHAI WU QI MICROELECTRONICS CO LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

As the WiFi6 physical layer adopts Orthogonal Frequency Division Multiple Access ("OFDMA"), the data transmission of each device overlaps in time, and the above method cannot distinguish the wireless frames sent by different devices in time. Therefore, it is impossible to accurately obtain the RF fingerprint of a device
Moreover, the constellation diagram is related to the modulation method, and the same device has different constellation diagrams with different modulation rates. Therefore, the identification method has great limitations and the identification accuracy is not high.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method, device, equipment and storage medium
  • Identity authentication method, device, equipment and storage medium
  • Identity authentication method, device, equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The technical solutions in the embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application. In the description of the present application, the terms "first", "second" and the like are only used for distinguishing descriptions, and cannot be understood as indicating or implying relative importance.

[0035] Such as figure 1 As shown, this embodiment provides an electronic device 1, including: at least one processor 11 and a memory 12, figure 1 Take a processor as an example. Processor 11 and memory 12 are connected via bus 10 . The memory 12 stores instructions that can be executed by the processor 11, and the instructions are executed by the processor 11, so that the electronic device 1 can execute all or part of the flow of the method in the following embodiments, based on the resource unit characteristics in the OFDMA technology, The radio frequency characteristics of the terminal trans...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present application provides an identity authentication method, device, device, and storage medium. The method includes: when receiving a data signal sent by a terminal to be tested on a specified resource unit, extracting the current ID of the terminal to be tested according to the data signal. radio frequency fingerprint; compare the current radio frequency fingerprint with the legal radio frequency fingerprint pre-stored in the database, and determine whether the fingerprint deviation between the current radio frequency fingerprint and the legal radio frequency fingerprint is less than a preset threshold; when the fingerprint deviation is less than When the threshold is preset, it is determined that the radio frequency fingerprint authentication of the terminal under test succeeds. The application can more accurately obtain the radio frequency characteristics of the terminal transmitter to be tested, thereby improving the security of identity authentication.

Description

technical field [0001] The present application relates to the technical field of communications, and in particular, to an identity authentication method, device, device and storage medium. Background technique [0002] As an open and shared wireless network, WiFi network has become the mainstream network of wireless interconnection. However, the security of the current WiFi network is based on the identity authentication and encryption algorithm defined by the IEEE802.11X protocol. This method belongs to the authentication method of the data link layer, which has security holes and is easy to be attacked. It is not difficult for illegal users to obtain WiFi keys through listening and a large number of repeated attempts. In addition, usually the WiFi network access password is known to many people and is easy to be leaked intentionally or unintentionally; hackers also steal the MAC address of legitimate user equipment ( Media Access Control Address, media access control addr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/44G06K9/62G06F16/2455
Inventor 古强薛林
Owner SHANGHAI WU QI MICROELECTRONICS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products