User authentication and authorization method and system for implementing user authentication and authorization method

A user authentication and user-end technology, applied in the field of communication, can solve the problem that user services and information cannot be effectively guaranteed, and achieve the effect of ensuring security

Active Publication Date: 2011-06-29
王冬梅
View PDF6 Cites 31 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the above-mentioned network user authentication method, as long as the user has a mobile phone, the service provided by the network service provider can be used. If the user's mobile phone is lost, st...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User authentication and authorization method and system for implementing user authentication and authorization method
  • User authentication and authorization method and system for implementing user authentication and authorization method
  • User authentication and authorization method and system for implementing user authentication and authorization method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

Embodiment 2

Embodiment 3

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a user authentication and authorization method and a system for implementing the user authentication and authorization method. When a user end launches a business access request, a business server checks whether the user is a contracted user in accordance with identity information of the user; if the user is the contracted user based on the user identity information, the communication mode of at least one social relation user is selected from the user contracted information as an authentication end; the business server judges the validity of the user identity in accordance with information provided by the authentication end; and if the user identity is valid, the business server authorizes a user end and carries out corresponding business access responses. The method and the system for implementing the method provided by the invention are used to overcome the defects in a background technology and effectively ensure the security of user information and network services by using a mode that the communication mode of at least one social relation user is selected from the contracted information which is kept at the time of signing a business service by the user as the authentication end, and the business server judges the validity of the user end identity in accordance with the information provided by the authentication end and authorizes the user end.

Description

A method of user authentication and authorization and its realization system technical field The invention relates to the field of communication technology, in particular to a method for user authentication and authorization and a system for realizing it. Background technique While the popularity of network technology has brought great convenience to users, there are also problems of how to authenticate the legitimacy of user identities in the network, and how to ensure that users' services and information are not illegally stolen and used. As shown in Figures 1 and 2, general service providers have their own independent authentication and authorization centers in their networks responsible for managing subscriber information. After a user signs a contract, the authentication and authorization center stores the user's subscription information. When a user initiates a service access request, the service server performs user authentication through the authentication and a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L29/06
CPCH04L9/321H04L63/102H04L63/08
Inventor 王冬梅
Owner 王冬梅
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products