Method and system for identity authentication of internet user

A user identity authentication and Internet technology, applied in the field of identity authentication methods and systems based on Internet user line information, to achieve the effect of simple implementation, low investment, and elimination of possibility

Active Publication Date: 2011-10-05
CHINA TELECOM CORP LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the purpose of the present invention is to propose a method and system for Internet user identity authentication to solve the problem of how network operators provide unique user identity identification to e-commerce websites in Internet electronic transactions, thereby greatly improving transaction efficiency. safety

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for identity authentication of internet user
  • Method and system for identity authentication of internet user
  • Method and system for identity authentication of internet user

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be described in further detail below in conjunction with specific embodiments and with reference to the accompanying drawings.

[0042] The solution for Internet user identity authentication provided by the present invention mainly includes: when a user opens a website service, the operator network provides the user's line information to the website server; and

[0043] When a user sends an authentication message to the website server through the operator network, the operator network intercepts the authentication message sent by the user, adds user line information to the authentication message, and sends it to the website server; the website server takes out the user line information and compares it with the preset The user line information in the website server is compared, and if they are consistent, the authentication is passed.

[0044]User n...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a system for the identity authentication of an internet user. When website service fulfillment is carried out for the user, an operator network provides a website. The invention discloses a method and a system for the identity authentication of an internet user. When website service fulfillment is carried out for the user, an operator network provides a website server with circuit information of the user. The method comprises the following steps: when the user sends out an authentication message to the website server through the operator network, the operator server with circuit information of the user. The method comprises the following steps: when the user sends out an authentication message to the website server through the operator network, the operator network captures the authentication message sent out by the user, adds the circuit information of the user to the authentication message and sends the authentication message and the circuit informatr network captures the authentication message sent out by the user, adds the circuit information of the user to the authentication message and sends the authentication message and the circuit information of the user to the website server; the website server takes the circuit information of the user out and compares the same with the circuit information of the user preset in the website server, if ion of the user to the website server; the website server takes the circuit information of the user out and compares the same with the circuit information of the user preset in the website server, if the comparing result is consistent, the identity authentication of the internet user is passed. In the invention, because the identity mark of the user is accomplished by operator network equipment, a the comparing result is consistent, the identity authentication of the internet user is passed. In the invention, because the identity mark of the user is accomplished by operator network equipment, an encrypt method and an information format are only known by a cooperated operator and an e-commerce web site, thereby the safety risk during the user business is greatly reduced. A user circuit can nn encrypt method and an information format are only known by a cooperated operator and an e-commerce web site, thereby the safety risk during the user business is greatly reduced. A user circuit can not be fabricated so that the user circuit which carries out business through binding service can not be lost even if a user account is stolen.to be fabricated so that the user circuit which carries out business through binding service can not be lost even if a user account is stolen.

Description

technical field [0001] The invention relates to identity authentication technology in network security in the field of data communication, in particular to an identity authentication method and system based on Internet user line information. Background technique [0002] With the development of e-commerce, there are more and more online electronic transactions based on home users. Various transaction systems such as home shopping, securities business, and online banking all need a simple and safe identity authentication technology to avoid security risks. This risk lies in two One aspect: one is to steal user information, and the thief uses user information in a different place to achieve the purpose of payment; the other is to remotely manipulate the user's device through a Trojan horse program in the user's local device to achieve the purpose of payment. Therefore, the authentication method of setting a simple transaction password and verification code has great security r...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L29/06G06Q30/00
Inventor 欧亮邹洁唐宏
Owner CHINA TELECOM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products