Identity authentication method based on mobile terminal as well as device and system thereof

A mobile terminal and identity authentication technology, applied in the communication field, can solve problems such as limited use scenarios and poor security of identity authentication technology

Active Publication Date: 2011-03-30
CHINA MOBILE COMM GRP CO LTD
View PDF7 Cites 52 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0017] Embodiments of the present invention provide a mobile terminal-based identity authentication method and its device and system to solve the problems of poor security and limited use scenarios of existing identity authentication technologies

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method based on mobile terminal as well as device and system thereof
  • Identity authentication method based on mobile terminal as well as device and system thereof
  • Identity authentication method based on mobile terminal as well as device and system thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] Embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0042] see figure 1 , is a schematic diagram of a system architecture applicable to an embodiment of the present invention. For the case of using a mobile terminal as an identity authentication client device, the system architecture mainly includes: a mobile terminal (containing a (U)SIM card, wherein USIM is an English abbreviation for Universal Subscriber Identity Module, and SIM is the name of the User Identity Module. English abbreviation), data transmission server, application server, if the transmitted data adopts digital signature, the LDAP (Lightweight Directory Access Protocol, Lightweight Directory Access Protocol) server of the CA (Certificate Authority) system is also required. For the case of using a PC terminal as an identity authentication client device, the system architecture also needs to include a PC terminal.

[0043] The main fun...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identity authentication method based on a mobile terminal as well as a device and a system thereof so as to solve the problems of poor security and limited use scene in the traditional identity authentication technology. The method comprises the following steps of: after a login identity submitted by a subscriber through an authentication client is verified to pass by a network side, generating first authentication data, providing the first authentication data to the authentication data client, and sending the first authentication data to the mobile terminal bound with the login identity; receiving second authentication data sent by the mobile terminal by the network side, wherein the mobile terminal generates and sends the second authentication data after confirming that the first authentication data received by the mobile terminal is consistent with that received by the authentication client; and verifying the second authentication data by the network side, and determining whether a subscriber identity is legal or not according to a verification result.

Description

technical field [0001] The present invention relates to the field of communication, in particular to a mobile terminal-based identity authentication method and its device and system. Background technique [0002] The rapid development of the Internet and e-commerce has led to the prosperity of online transactions and online banking, and the transaction volume has also shown multiple growth. However, behind this growing trend, the security of online banking is becoming more and more worrying. The biggest feature of the network information age is the digitization and invisibility of identities. How to accurately identify a person's identity while protecting the security of information has become a problem that must be faced and solved. [0003] Frequent online transactions and security loopholes in online banking make it easier for hackers to use various means to steal bank card numbers, passwords, and personal information. False information such as fake notices, Trojan horse ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04W4/18H04L12/06
Inventor 柏洪涛刘海龙粟栗涂晓强左敏
Owner CHINA MOBILE COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products