Method, system and device for identifying user's identity

An identity and user technology, applied in the field of information security, can solve the problems of low global versatility, long operation time, and high card operator charges.

Inactive Publication Date: 2012-06-13
陈嘉贤
View PDF0 Cites 28 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This leads to the monopoly position of card operators and pushes up the charges of card operators; at the same time, for card operators that only operate in certain regions, there will be problems when card holders pay merchants in other regions
[0012] 2. The electronic payment mechanisms of the above a1 and a2 categories rely on the physical card owned by the user to identify the user, which is easy to be stolen and has low security
[0013] 3. The electronic payment mechanism of category a2 above can only be used for payment by physical merchants, and is generally not suitable for payment by online merchants
If the user needs to pay through different electronic payment mechanisms and / or different card operators under the same electronic payment mechanism, he / she needs to carry multiple corresponding physical cards with him / her, causing extreme inconvenience and / or risk of loss
[0015] 5. The above-mentioned electronic payment mechanisms of categories a3, a4 and a5 can only be used for payment of online transactions, and are generally not suitable for physical merchants
And these categories take a long time to operate
[0017] 7. For the above-mentioned electronic payment mechanisms in categories a2, a4 and a6, their operators are generally limited to individual regions, and their global versatility is low
The operation of category b4 takes a long time, is prone to errors, and the password is easy to be stolen by malicious software, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, system and device for identifying user's identity
  • Method, system and device for identifying user's identity
  • Method, system and device for identifying user's identity

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0154] Hereinafter, various specific embodiments of the present invention will be described in detail with reference to the accompanying drawings.

[0155] figure 1 A block diagram of a system for authenticating user identities according to an embodiment of the present invention is schematically shown. As shown in the figure, an authentication system according to an embodiment of the present invention includes an optional communication network 110 , a communication network 120 , a user terminal 200 , an authentication front-end computer system 300 and an authentication server 400 . The communication network 110 may be a wireless communication network or a wired communication network or a combination of the two, or a local area network (LAN), a metropolitan area network (MAN) or a wide area network (WAN), or a combination of two or even three of them. The communication network 120 may be a wireless communication network or a wired communication network or a combination of the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method and a system for identifying a user's identity, as well as a user terminal, an identification front end computer system and an identification server. According to the invention, the user terminal transmits identification indication containing identification information to the identification front end computer system; the identification front end computer system sends an identification request containing the identification information to a specific identification server; after receiving the identification request, the identification server identifies a user's identity according to the identification information; and preferably, the identification server sends an identification result to the identification front end computer system. When the user pays a certain amount of money to an operator, and after successful identification, the identification server pays a certain amount of money to a specific operator's account from a specific user's payment account.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method and system for authenticating user identities. The invention also relates to a user terminal, an authentication server and an authentication front-end computer system used in said method and system. The invention also relates to a corresponding computer program product and computer readable medium. Background technique [0002] With the development of information technology, e-commerce has become more and more popular in people's life. The popularity of e-commerce is inseparable from the authentication of user identity. In the prior art, there are mainly two types of applications that need authentication of user identity: electronic payment mechanism and electronic ticketing (ticket authentication, such as: tickets and membership cards, work cards, passes, time cards for attendance clocks, student cards , library card and other certificates) mechanism. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L63/0892H04L63/08H04L29/06H04L63/0876
Inventor 陈嘉贤
Owner 陈嘉贤
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products