Identity authentication method, device and system

A technology of identity authentication and authentication equipment, applied in the field of communication, can solve the problems of user loss, inconvenient storage, inability to achieve precise marketing, etc., and achieve the effect of avoiding security risks and losses

Inactive Publication Date: 2010-07-14
卓望数码技术(深圳)有限公司
View PDF0 Cites 52 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But at present, most of the membership business is only based on a magnetic card, which is not only inconvenient to save, but more importantly, the magnetic card is extremely easy to be borrowed or used by others, resulting in the loss of a large number of users of the enterprise, and it is impossible to achieve precise marketing.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method, device and system
  • Identity authentication method, device and system
  • Identity authentication method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0032] figure 1 It is a schematic diagram of the structural composition of an identity authentication system in an embodiment of the present invention. As shown in the figure, the identity authentication system includes a mobile terminal 10, an authentication device 20, a business platform 30, and an authentication and authentication service platform 40, wherein:

[0033] The mobile terminal 10 is used to build a digital certificate in a SIM (Subscriber Identity Mo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides an identity authentication method, which comprises the steps of acquiring a user identification from a mobile terminal; acquiring identification information including an authentication serial number and authentication time from a service platform; sending the identification information to the mobile terminal; acquiring authentication information cipher text digitally signed via the mobile terminal form the mobile terminal; submitting an authentication request including the user identification, the authentication information and the authentication information cipher text to the service platform; and acquiring authentication results returned by the service platform. Accordingly, the embodiment of the invention also discloses an identity authentication device and an identity authentication system. With the invention, the user identity is authenticated, and various safety risks and losses brought by fake or alternative identity and the like are avoided.

Description

technical field [0001] The present invention relates to the communication field, in particular to an identity authentication method, device and system. Background technique [0002] Whether it is in the traditional Internet, mobile Internet or real life, information security is facing various risks. [0003] On the one hand, the Internet and e-commerce business are developing rapidly, and the e-commerce business is also becoming mature, but at the same time, the virtuality and anonymity of the network enable network fraud to occur anytime and anywhere, which seriously threatens the development of e-commerce. develop. In the rampant Internet fraud, Internet traders hide behind computer screens, and the problem of difficult identification is an important source of it. Online transaction identity authentication plays an important role in establishing the credit mechanism of the e-commerce industry, so how to confirm the identity of online traders has become an urgent problem ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/04H04W12/06H04L9/32H04W12/069
Inventor 唐斌吴勇邢蔚
Owner 卓望数码技术(深圳)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products