Method and system of double identity authentication based on mobile communication independent channel

A technology of identity authentication and independent channel, which is applied in wireless communication, transmission system, electrical components, etc., can solve the problems of identity authentication method influence and user's inability to monitor, etc., and achieve real-time monitoring of account changes, guarantee of uniqueness, and convenient use

Inactive Publication Date: 2010-08-04
熊文俊
View PDF4 Cites 30 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Various insecure factors based on the Internet will affect the above identity authentication methods
If an illegal user obtains the user acc

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system of double identity authentication based on mobile communication independent channel
  • Method and system of double identity authentication based on mobile communication independent channel
  • Method and system of double identity authentication based on mobile communication independent channel

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0049] Example 1

[0050] like figure 1 As shown, the system includes a service provider server, a first identity authentication module, a first identity authentication terminal, a second identity authentication module, and a user mobile phone. The first identity authentication terminal is a user transaction terminal; the first identity authentication module is based on the Internet The first identity authentication module is connected to the service provider server, the first identity authentication module is connected to the Internet through the second identity authentication module, the first identity authentication terminal is connected to the Internet, and the first identity authentication module is connected to the Internet through the second identity authentication module. The second identity authentication module performs the first identity authentication with the first identity authentication terminal; the first identity authentication module can be built into the app...

Example Embodiment

[0059] Example 2

[0060] like figure 1 As shown, the system is basically the same as Embodiment 1, including a service provider server, a first identity authentication module, a first identity authentication terminal, a second identity authentication module, and a user mobile phone. The first identity authentication terminal is a user transaction terminal; the first identity authentication terminal is a user transaction terminal; The identity authentication module is an identity authentication module based on the Internet; the first identity authentication module is connected to the service provider server, the first identity authentication module is connected to the Internet, the first identity authentication terminal is connected to the Internet, and the first identity authentication module passes the The Internet and the first identity authentication terminal perform the first identity authentication; the second identity authentication module is connected to the service pr...

Example Embodiment

[0068] Example 3

[0069] In addition to the IP network fraud similar to the number-changing business, there is currently a virus that automatically responds to short messages on mobile phones. For example, there is currently a virus in which the mobile phone automatically replies to short messages, that is, when a third party (illegal intruder) enters the bank card number and password and requests the server to operate, the second authentication module sends a short message to the user's mobile phone to request a second identity Certification. At this time, the third party can make the mobile phone of the card-holding user automatically reply "YES" to the second authentication module, and the user does not know it at all. Especially when the user is driving or does not hear the short message arrive, it is even more dangerous. In order to prevent the mobile phone from automatically replying to the virus from disturbing the identity authentication process and to improve the s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a technology of network safety authentication and provides a method of double identity authentication based on a mobile communication independent channel and a system for realizing the method. In the method of double identity authentication based on the mobile communication independent channel comprises the following steps, a, a first identity authentication terminal and a first identity authentication module carry out identity authentication for the first time through Internet; b, the first identity authentication terminal provides an operation request to a service provider server; c, a second identity authentication module and a user mobile phone carry out identity authentication for the second time through a mobile communication network, if the second identity authentication is passed, the step d is performed, and otherwise, the second identity authentication fails, and the operation of the first identity authentication terminal to the service provider server is stopped; and d, the service provider server executes the operation request of the first identity authentication terminal. The invention has high safety level, is convenient to use for a user and can monitor account change of a service provider server end in real time.

Description

technical field [0001] The invention relates to network security authentication technology. Background technique [0002] In order to ensure the legitimacy of transactions, the current online banking transactions, online games and other service provider systems that involve account funds are equipped with an identity authentication system at the front end of the network to verify whether the identity of the user who conducts the transaction is legal. The identity authentication system can be built into the application server in the service provider system, or it can be used as an identity authentication server alone, or appear as an authoritative third-party identity authentication system independent of the service provider system. At present, the most commonly used identity authentication method is static password authentication, that is, the service provider provides the user with an account, the user sets a password for the account, and the identity authentication system ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/06H04L29/06H04W12/069
Inventor 熊文俊
Owner 熊文俊
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products