Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity authentication system and method

An identity authentication and subsystem technology, which is applied in the field of identity or credential devices, can solve the problems of easy leak of mobile phone numbers and complicated operation of identity authentication methods, and achieve the effects of simple operation, easy leak, and complicated operation

Inactive Publication Date: 2010-08-18
张锋
View PDF3 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention provides an identity authentication system and method, which can solve the problem that the operation of the identity authentication method in the prior art is relatively complicated, thereby also solving the problem that the user's mobile phone number is easily leaked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication system and method
  • Identity authentication system and method
  • Identity authentication system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] Preferred embodiments of the present invention will now be described in detail with reference to the accompanying drawings. Wherever possible, the same parts have been designated by the same or like reference numerals throughout the drawings.

[0016] figure 1 A schematic diagram of an identity authentication system according to an embodiment of the present invention is shown. Such as figure 1 As shown, the identity authentication system includes:

[0017] The service subsystem 102 is used to receive the login request information from the user, and send the phone number and time period corresponding to the user's account to the user, wherein the login request information carries the user's account number, account number, and the user's mobile phone number And the phone number has a mapping relationship, and the mobile phone number has a mapping relationship with the user's mobile phone number;

[0018] The authentication subsystem 104 is configured to determine that...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an identity authentication system and an identity authentication method. The identity authentication method comprises the following steps: receiving logon request information from a user, wherein the request information carries an account number of the user; transmitting a telephone number corresponding to the account number and a period of time to the user, wherein the account number, a mobile phone hidden number of the user and the telephone number have a mapping relation, and the mobile phone hidden number and the mobile phone number of the user have the mapping relation; and if an entity provided with the telephone number receives a call request from the mobile phone number in a certain period of time, enabling the user to log on successfully. Due to the adoption of the method and the system, the user can perform the identity authentication by dialing a specified telephone number with a mobile phone without using a password, so operation becomes simple and rapid; the user can hide the mobile phone number so as not to leak the mobile phone number of the user; and the account of the user can be prevented from being stolen.

Description

technical field [0001] The present invention relates to the field of devices for verifying the identity or credentials of system users, and more particularly, to an identity authentication system and method. Background technique [0002] At present, when performing authentication on the network, a common method is to perform identity authentication through an account number and a password, but using this method will make the password easily leaked. [0003] In the prior art, there is also a method of identity authentication through a mobile phone number, but the user must provide the real number of the mobile phone, which will cause the user's real mobile phone number to be easily leaked. , which is more complex in operation. [0004] The identity authentication method in the prior art has the following defects: the operation method is relatively complicated; it is easy to reveal the password or the user's real mobile phone number; and it cannot prevent the user account fro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/32
Inventor 张锋
Owner 张锋
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products