Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identification identifying method

A technology for identity authentication and user identification, applied in the field of identity authentication, can solve problems such as huge construction costs, use costs, and complex structures

Inactive Publication Date: 2008-04-09
CHINA MOBILE GRP GUANGDONG CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But because the complexity of the key usually requires a high-end server, it also requires a complex key carrier
In this way, the existing system needs to be modified, which requires huge construction and use costs.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identification identifying method
  • Identification identifying method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below with reference to the accompanying drawings and examples.

[0018] The key point of the present invention is that in the identification process, the user uses different channels to transmit the account information and key information to the identification server to achieve the purpose of ensuring information security. Both the first channel and the second channel can be one of the public Internet, fixed-line voice, dedicated man-machine interface, mobile network voice, and mobile network SMS. It can be used as two transmission channels of the present invention.

[0019] Please refer to FIG. 1 . FIG. 1 is a schematic flowchart of an embodiment of an identity authentication method of the present invention. In this embodiment, the user transmits account information and key information respectively by using the pub...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a user identification method. The user identification method comprises the following steps: a user sends account information to a server via a first channel; and the user sends key information to the server via a second channel. The first channel and the second channel, under the different condition in the same one application process, may be public internet, fixed network voice, special man-machine interface, mobile network voice or mobile network short message. The invention can send account information and key information to the server via two different channels to overcome the disadvantage that the information is easy to be capture in the prior single-channel transmission, and avoids the large-scale reconstruction of the existing system, thereby reducing the construction cost and service cost.

Description

technical field [0001] The invention relates to the field of electronic information, in particular to an identification method. Background technique [0002] With the development of science and technology, various financial services are becoming more and more instant, and shopping and commerce based on the Internet are becoming more and more popular. In these activities, identification of identity is particularly important. It is necessary to ensure the normal operation of activities, but also requires high security. [0003] The identification of the current account type is mainly through the key information bound to the account information. In the activity of identity authentication, the user will first provide his own account to the server to send an authentication request; after the server receives the user's authentication request, it will send a key invitation to the user, that is, request the user to provide key information. Operating platforms such as the machine ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
Inventor 叶青俞斐
Owner CHINA MOBILE GRP GUANGDONG CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products