Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity management method used for mobile terminal and apparatus thereof

A technology for identity management and mobile terminals, applied in user identity/authority verification, security devices, secure communication devices, etc., can solve problems such as poor user experience, inability to manage in a unified way, troublesome and laborious, etc., to reduce the risk of identity leakage and realize The effect of unified management and avoiding duplication of development

Active Publication Date: 2012-08-01
TENCENT TECH (SHENZHEN) CO LTD
View PDF5 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Unfortunately, due to the inability to share identities between applications in existing solutions, each application requires the user to authenticate at startup, which results in multiple authentications of the same identity
Correspondingly, not only can users not enjoy a smooth experience, but multiple verifications also increase the risk of user identity leakage
Also, because the same identity information is dispersed in multiple applications and cannot be managed uniformly, this increases security risks
In addition, if you want to add a special operation (such as inputting a verification code) to the authentication operation of all applications, you need to set up all the applications separately, which is extremely troublesome and laborious
[0004] All in all, existing identity management solutions have defects such as repeated development of software functions, decentralized management of user identity information, poor user experience, high security risks, and difficulty in modifying settings.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity management method used for mobile terminal and apparatus thereof
  • Identity management method used for mobile terminal and apparatus thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] The identity management method and device proposed by the present invention aim to realize unified identity information management and unified identity verification of multiple application programs on a mobile terminal.

[0019] In the present invention, in order to provide identity verification services to multiple applications on the mobile terminal, and to avoid re-authentication of the identity that has passed the identity verification, when receiving an identity verification request from one of the multiple applications, identify The application program that sends the authentication request, and sends the request message generated according to the authentication request to the authentication server; and when receiving the return message from the authentication server, the authentication The result is notified to all applications in the related application list to which the identified application belongs.

[0020] In order to make the purpose, technical solution and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an identity management method used for a mobile terminal and an apparatus thereof. The method is characterized by: when the identity authentication request from one of a plurality of the application programs is received, identifying an application program which sends an identity authentication request and sending a request message generated according to the identity authentication request to an identity authentication server; after a return message from the identity authentication server is received, notifying all the application programs in a related application program list to which the identified application program belongs of an identity authentication result acquired according to the return message. By using the technical scheme of the invention, unified management of user identity information and user identity authentication can be realized; development and maintenance costs can be reduced; security of a user account can be improved and user operation is convenient.

Description

technical field [0001] The invention relates to the field of mobile communication, in particular to an identity management method and device for a mobile terminal. Background technique [0002] With the continuous advancement of mobile communication technology and embedded technology, the functions of mobile terminals are becoming more and more powerful. Users can browse news, send and receive emails, and chat with other networked users with the help of applications on mobile terminals. Among them, many applications, such as instant messaging software, online games, e-mail clients, etc., must be authenticated by the server before they can be used normally. Therefore, these applications that require identity verification include not only modules that implement their own main functions, but also a set of identity management modules for managing account information, interacting with servers for identity verification, and so on. [0003] In the prior art, each application progr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/02H04W12/06H04L29/06
CPCG06F21/31H04L63/0815G06F2221/2115H04L9/321G06F21/41H04L9/32
Inventor 朱涛陈俊贵王峰
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products