Method and system of double identity authentication based on mobile communication independent channel
A technology of identity authentication and independent channel, which is applied in wireless communication, transmission system, electrical components, etc., can solve the problems of identity authentication method influence and user's inability to monitor, etc., and achieve real-time monitoring of account changes, guarantee of uniqueness, and convenient use
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0049] Example 1
[0050] like figure 1 As shown, the system includes a service provider server, a first identity authentication module, a first identity authentication terminal, a second identity authentication module, and a user mobile phone. The first identity authentication terminal is a user transaction terminal; the first identity authentication module is based on the Internet The first identity authentication module is connected to the service provider server, the first identity authentication module is connected to the Internet through the second identity authentication module, the first identity authentication terminal is connected to the Internet, and the first identity authentication module is connected to the Internet through the second identity authentication module. The second identity authentication module performs the first identity authentication with the first identity authentication terminal; the first identity authentication module can be built into the app...
Example Embodiment
[0059] Example 2
[0060] like figure 1 As shown, the system is basically the same as Embodiment 1, including a service provider server, a first identity authentication module, a first identity authentication terminal, a second identity authentication module, and a user mobile phone. The first identity authentication terminal is a user transaction terminal; the first identity authentication terminal is a user transaction terminal; The identity authentication module is an identity authentication module based on the Internet; the first identity authentication module is connected to the service provider server, the first identity authentication module is connected to the Internet, the first identity authentication terminal is connected to the Internet, and the first identity authentication module passes the The Internet and the first identity authentication terminal perform the first identity authentication; the second identity authentication module is connected to the service pr...
Example Embodiment
[0068] Example 3
[0069] In addition to the IP network fraud similar to the number-changing business, there is currently a virus that automatically responds to short messages on mobile phones. For example, there is currently a virus in which the mobile phone automatically replies to short messages, that is, when a third party (illegal intruder) enters the bank card number and password and requests the server to operate, the second authentication module sends a short message to the user's mobile phone to request a second identity Certification. At this time, the third party can make the mobile phone of the card-holding user automatically reply "YES" to the second authentication module, and the user does not know it at all. Especially when the user is driving or does not hear the short message arrive, it is even more dangerous. In order to prevent the mobile phone from automatically replying to the virus from disturbing the identity authentication process and to improve the s...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap