Login authentication system and method

An authentication system and authentication method technology, applied in electrical components, wireless communication, safety devices, etc., to achieve the effect of saving the cost of re-learning and saving the cost of protection

Inactive Publication Date: 2010-10-06
邱宏达
View PDF0 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in this way, if the mobile communication device 1' or the Subscriber Identity Module (SIM) card is lost or stolen by a close person or other situations occur, if the interested person uses the mobile communication device 1' or Hijack the SIM card and log in to the online banking service provider 3' with the same account number and password, because the online banking service provider 3' sends a short message corresponding to the SIM card in the mobile communication device 1' to send a set of keys The password, that is, the sent identification object is the SIM card, and it is not sent to the mobile device or the user who holds the mobile device. Therefore, it is still impossible to avoid the password in the mobile communication device 1' held by the original client. After the SIM card is hijacked by an interested person, it is inserted into other mobile communication devices, and a set of keys is cheated from the service provider 3' by logging into the service provider 3', inputting the same account number, and sending it back again. The key is successfully logged in and opened and the crisis of information is stolen

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Login authentication system and method
  • Login authentication system and method
  • Login authentication system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The implementation of the present invention is described below through specific specific examples. Those with general knowledge in the technical field and those familiar with this technology can easily understand other advantages and effects of the present invention from the content disclosed in this specification.

[0035] see figure 2 , is a schematic diagram of the system architecture of the first embodiment of the login authentication system of the present invention. As shown in the figure, the login authentication system of this embodiment is used to provide a user security login mechanism for the client on the mobile communication device 1 to log in to the service platform 3 through the communication network. In the preferred embodiment, the mobile communication device 1 is a mobile communication device. The phone uses the login authentication system to definitely identify the client that makes the login request through the mobile communication device 1 as the ow...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses login authentication system and method. The login authentication system is a safety login mechanism for a client to login a service platform through a network system by using a mobile communication device. The service platform demands the mobile communication device to input an account number and a password to carry out opening authentication. After the mobile communication device is subjected to the opening authentication of the service platform, the service platform automatically generates an anti-counterfeiting program with a software serial number and returns the anti-counterfeiting program to the mobile communication device to write in the mobile communication device so that the mobile communication device logins the service platform by using the anti-counterfeiting program with the software serial number.

Description

technical field [0001] The present invention relates to a login authentication system and method, in particular to a login authentication system and method in which a client uses a mobile communication device to log in to a service platform through a network system for security authentication. Background technique [0002] Due to the rapid development of computers and the Internet, it has become a common practice to use computers and / or electronic devices and the Internet to perform information transmission, transaction, query or information processing. Furthermore, due to the portability and convenience of mobile communication devices (such as mobile phones), and the characteristics of personal and private devices, users of this mobile communication device can output / Input information, and use the Internet to transmit to the service provider to implement various requirements, thus providing convenience and efficiency in transaction processing; therefore, there have been co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04W12/12
Inventor 邱宏达
Owner 邱宏达
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products