Authentication method for telephone subscriber identity

A technology for identity authentication and telephone users, applied in the field of identity authentication, can solve the problems of lack of identity authentication mechanism for callers, automatic identification of callers that cannot be identified, etc., and achieve the effect of reducing deception and harassment, and reducing participation

Inactive Publication Date: 2008-02-27
陈鹏 +2
View PDF4 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] The purpose of the present invention is: in order to overcome existing telephone system (comprising fixed telephone, mobile phone, PHS, note) network side lacks the identity authentication mechanism to caller, and the telephone firewall technology of terminal side can't carry out to caller again. Disadvantages of automatic identification. In the telephone system, two processes of distribution of telephone user identity authentication codes and identification are introduced. Using these two processes in combination can automatically determine the legality of incoming calls or text messages.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method for telephone subscriber identity
  • Authentication method for telephone subscriber identity
  • Authentication method for telephone subscriber identity

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The telephone user identity authentication method described in the present invention mainly comprises (1) access list, comprises " allowed call-in list " and " barred call-in list "; ) The process of distributing identity authentication codes to users; (3) Identity authentication, which is to identify identity authentication based on authentication codes for phone (or short message) callers. The result of "authentication" is stored in the "access list".

[0046] The telephone user identity authentication method of the present invention (for telephone and short message, this identity authentication method is roughly the same, only introduces with telephone as example here) as follows:

[0047] Step 1: Distribution of identity verification codes

[0048] Before making a call, the initiator of the call first needs to obtain the valid identity authentication code of the call recipient through the process of "distribution of identity authentication code".

[0049] There ar...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention relates to an authenticating method for telephone subscriber identities, which sets a system for distinguishing identity of a phone call and short message of a telephone subscriber, judges if the caller or dispatcher of the short message is allowed to dial or send the short message to the user including distribution of identity cards and identitity differentiation based on it to judge the validity of the incoming and the short message: 1, applying a public key algorithm to generate an authentication code: Kpub and Kpri needed by the Kpub algorithm are generated by Krooi set by each phone subscriber, 2, when callerB dials the phone of subcriberA, the system first of all gets phone numberNB of B and looks it up in an access list of A and triggers the identity authentication process, 3, differentiating identity based on the authentication card.

Description

[technical field] [0001] The present invention relates to the identity authentication of the user who makes a call (including sending a short message or other active signaling transmission). Whether the user is allowed to make calls or send text messages to the phone user. [Background technique] [0002] With the proliferation of harassing calls and text messages, people begin to regard their phone numbers as a kind of personal privacy and do not want to make them public; however, phone numbers, as an important symbol of people in social activities, have inherent openness. The contradiction between this openness and privacy of the telephone number does not have a good solution under the current telephone system. The traditional telephone system cannot control who is allowed to call and who is not allowed to call for a certain phone number. At present, the telephone firewall technology on the mobile terminal side can solve this problem to a certain extent. However, the te...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04Q7/38H04Q7/22H04M1/665H04M3/436H04W4/16H04W12/06
Inventor 陈鹏张联峰石庆祖
Owner 陈鹏
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products