Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network identity authenticating method and system

A network identity and network authentication technology, applied in the field of network identity authentication, can solve the problems of low security and insufficient security, and achieve the effect of making up for low security and strong security

Active Publication Date: 2011-05-11
TENCENT TECH (SHENZHEN) CO LTD +1
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] The above-mentioned method utilizes telephone communication to carry out user identity authentication, avoids the defect that the security of authentication by network communication is not high, but the above-mentioned method still has deficiencies in security.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network identity authenticating method and system
  • Network identity authenticating method and system
  • Network identity authenticating method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] In order to make the above objects, features and advantages of the present invention more comprehensible, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0048] The present invention randomly configures the operation code and the authorization code for the operation of requesting to verify the user's identity, displays the operation code, and then obtains the telephone number sent by the user using the communication terminal, and matches it with the preset telephone number. If it is consistent, the operation code and the authorization code are returned. The authorization code is sent to the communication terminal; when the returned operation code is consistent with the displayed operation code, the authorization code input by the user is obtained, and if the authorization code entered by the user matches the randomly configured authorization code, it is confirmed that the user's iden...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The method includes steps: collocating random operation code and authorization code for operation of requesting validation of user ID, and displaying the operation code; obtaining telephone number sent through communication terminal used by user, and matching the said telephone number with the preset telephone number; if consistent, then returning back the operation code and the authorization code to the communication terminal; when it is consistent between the returned operation code and the displayed operation code, then obtaining the authorization code input from the user; if it is matchedbetween authorization code input from the user and the authorization code collocated randomly, then affirming that the user ID is legal. The invention also discloses the system for network ID authentication. The invention validates ID of network user effectively, and possesses higher security.

Description

technical field [0001] The invention relates to the field of network identity authentication, in particular to a method and system for network identity authentication. Background technique [0002] The Internet security problem is a major obstacle to the development of e-commerce. Due to the proliferation of computer viruses and the imperfect legal system related to the Internet, cases of online theft of users' virtual properties often occur, and users have doubts about the security of important operations on the Internet. Verifying the legitimacy of the user's identity before the user performs important operations is the most important prerequisite for ensuring Internet security. At present, the better security is to use the phone to verify the legality of the user's identity. [0003] refer to figure 1 , which is a flow chart of an existing network identity authentication method, and the specific steps are as follows. [0004] Step S101, binding the user name of the use...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L29/06
Inventor 魏宪德
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products