Mobile-terminal-based identity authentication system and method

A mobile terminal and identity authentication technology, applied in the field of strong identity authentication security system, can solve problems such as high cost, inability to solve dynamic factor synchronization, and inability to communicate, achieving cost savings, flexible and convenient software clients Synchronized effect

Active Publication Date: 2012-09-19
TIMESAFER BEIJING TECH
View PDF3 Cites 69 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the use of hardware devices for users to obtain dynamic passwords has certain defects: high cost, inability to communicate, inability to solve the synchronization of dynamic factors with the authentication server, and inability to provide users with rich operating experience and business functions

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile-terminal-based identity authentication system and method
  • Mobile-terminal-based identity authentication system and method
  • Mobile-terminal-based identity authentication system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The mobile terminal-based identity authentication method provided by the present invention is implemented according to the following steps:

[0041] (1) The user can obtain the initial password to log in to the self-service terminal through a third-party application system (B / S) or from the administrator (such as figure 2 Said).

[0042] (2) Generate the serial number to initialize the mobile client, (such as image 3 (Mentioned) (3) Initialization of the mobile client, (such as Figure 4 Said) (4) Identity authentication: When the user submits a login application to the third-party application server, the mobile terminal submits an authentication request to the authentication server, and the third-party application server returns the authentication result to the user after obtaining the authentication result of the mobile terminal by the authentication server ( Such as Figure 5 Said).

[0043] The system of the present invention for realizing the above-mentioned identity au...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a mobile-terminal-based identity authentication method and a mobile-terminal-based identity authentication system. The method comprises the following steps of: (1) acquiring an initial password for the login of a self-service server; (2) logging in the self-service server to acquire an initializing sequence number of a mobile client by a user; (3) initializing the mobile client; and (4) performing identity authentication, namely a user makes a login application to a third party application server, a mobile terminal makes an authentication request to an authentication server, and the third party application server returns an authentication result to the user after obtaining a mobile terminal authentication result from the authentication server, wherein the authentication request made by the mobile terminal to the authentication server comprises dynamic password authentication and position information authentication. Hardware equipment is replaced by a software client, so that the production cost of hardware is saved; and by a dynamic factor (a time factor or an event factor) between the software client and the authentication server, synchronization can be conveniently realized, and integration with a third party application system is facilitated, so that limitation and shortcomings caused by the use of the hardware equipment to the whole authentication system are completely overcome.

Description

technical field [0001] The invention relates to a technology combining wireless communication, network communication, algorithm security and network security, specifically a security system and method for generating a dynamic password on a trusted mobile terminal and using the password to realize strong identity authentication. Background technique [0002] With the rapid development of the Internet, more and more application systems are running on the public network, network security issues have become increasingly prominent, and identity authentication for sensitive operation portals has become extremely important. At present, most application systems still use the identity authentication method of user name plus static password. This authentication method has many security risks, such as: static passwords are easy to be guessed and cracked, static passwords are intercepted by hackers, and static passwords are stolen by administrators. Illegal use, defrauded by phishing we...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 陈易黄进王黎明段克强李涛左飞
Owner TIMESAFER BEIJING TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products