Identity authentication method and system

An identity authentication and identification technology, applied in the field of mobile Internet, can solve the problems of loss of account information and historical behavior, inability to obtain records, poor application experience, etc., and achieve the effect of ensuring consistency, balancing security and convenience

Active Publication Date: 2011-09-14
ALIBABA (CHINA) CO LTD
View PDF3 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In these cases, the original account information and historical behavior will be lost. When the user needs to use the previous application histor

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and system
  • Identity authentication method and system
  • Identity authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0053] In this embodiment, it is assumed that there are three application scenarios: application 1, application 2, and application 3. In the application 1 scenario, user A accesses the UC website by using the UC browser of the mobile phone. In the application 2 scenario, user A sends a text message by using the UC desktop application. In the scenario of application 3, user A queries the experience value of the UC website by sending a text message. Wherein, application 3 is an application currently activated on the mobile terminal, and application 1 and application 2 are applications previously activated on the mobile terminal.

[0054] In application 1, when user A accesses the UC website using the UC browser of the mobile phone, the UC browser obtains user A's identification data. Here, the identification data may be software parameters, hardware parameters and / or user data related to applications of the mobile terminal. For example, UC browser obtains identification data,...

no. 2 example

[0070] In this embodiment, it is assumed that the application scenarios are still the three application scenarios described in the first embodiment: application 1, application 2, and application 3. Wherein, application 3 is an application currently activated on the mobile terminal, and application 1 and application 2 are applications previously activated on the mobile terminal. But the difference is that user A changed a new mobile phone number, such as 13987654321, after performing the operations of application 1 and application 2 as described in the first embodiment, but still used the original mobile phone. That is to say, the hardware of user A's mobile phone has not changed, but the mobile phone number has changed.

[0071] In this case, if user A uses a new mobile phone number to send a text message in App 3 to query the experience value of the UC website, since the new mobile phone number is not in the super identity database, no matching SUID can be found. However, as...

no. 3 example

[0082] In this embodiment, it is assumed that the application scenarios are the application scenarios described in the first embodiment: application 1 and application 2. Wherein, application 1 and application 2 are previously activated applications on the mobile terminal. However, user A, after performing the operations of application 1 and application 2 as described in the first embodiment, changed a new mobile phone due to the loss of the mobile phone, but retrieved the original mobile phone number through the operator. That is to say, user A's mobile phone hardware has changed, but the mobile phone number has not changed. At this time, user A needs to obtain the login information of using the UC browser to access the UC website in application 1, so as to restart application 1.

[0083] As described in the first embodiment, before user A loses his mobile phone, SUID-1 and SUID-2 are generated and saved in the super identity database in application 1 and application 2 respec...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an identity authentication method carried out by an authentication server. The method comprises the following steps of: receiving a super identity identifier corresponding to the current application of a mobile terminal from the mobile terminal; inquiring one or more super identity identifiers matched with the received super identity identifier in a super identity identifier database of the authentication server, wherein the super identity identifier(s) corresponding to one or more applications and combinations of the super identity identifiers as well as authenticationdegrees corresponding to respective component elements in a generated super identity identifier are stored in the super identity identifier database; acquiring one or more inquired authentication degrees matched with the super identity identifiers; and returning the one or more matched super identity identifiers and corresponding authentication degrees to the current application of the mobile terminal for identity authentication processing. When the method is used, the identities of users can be found as much as possible when the users use the mobile terminal; thus, repeated register can be reduced, and the consistency of user accounts can be ensured.

Description

technical field [0001] The present invention relates to the field of mobile Internet, and more specifically, to an identity authentication method and system. Background technique [0002] Currently, mobile terminals with Internet access functions such as mobile phones, PDAs (Personal Digital Assistants), and navigators are closely related to people's daily life. More and more people use mobile terminals to access the Internet to obtain information anytime and anywhere. [0003] Usually, when using a mobile terminal to surf the Internet, in order to ensure the security of user data, most applications need to confirm the identity of the operator first, that is, perform identity authentication, and only users with legal identities can perform corresponding access operations. Currently, the most commonly used identity authentication method is that each user sets their own account name and account password. Among them, when using a mobile phone to perform operations, some accou...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/06H04L29/06H04W12/71H04W12/72
Inventor 梁捷关中
Owner ALIBABA (CHINA) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products