Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Method and system for user authentication and devices used in system

An identity and user technology, applied in the field of information security, can solve the problems of pushing up the charges of card operators, not suitable for online merchant payment, loss and other problems

Inactive Publication Date: 2013-03-20
陈嘉贤
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This leads to the monopoly position of card operators and pushes up the charges of card operators; at the same time, for card operators that only operate in certain regions, there will be problems when card holders pay merchants in other regions
[0012] 2. The electronic payment mechanisms of the above a1 and a2 categories rely on the physical card owned by the user to identify the user, which is easy to be stolen and has low security
[0013] 3. The electronic payment mechanism of category a2 above can only be used for payment by physical merchants, and is generally not suitable for payment by online merchants
If the user needs to pay through different electronic payment mechanisms and / or different card operators under the same electronic payment mechanism, he / she needs to carry multiple corresponding physical cards with him / her, causing extreme inconvenience and / or risk of loss
[0015] 5. The above-mentioned electronic payment mechanisms of categories a3, a4 and a5 can only be used for payment of online transactions, and are generally not suitable for physical merchants
And these categories take a long time to operate
[0017] 7. For the above-mentioned electronic payment mechanisms in categories a2, a4 and a6, their operators are generally limited to individual regions, and their global versatility is low
The operation of category b4 takes a long time, is prone to errors, and the password is easy to be stolen by malicious software, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for user authentication and devices used in system
  • Method and system for user authentication and devices used in system
  • Method and system for user authentication and devices used in system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0152] Hereinafter, various specific embodiments of the present invention will be described in detail with reference to the accompanying drawings.

[0153] figure 1 A block diagram of a system for authenticating user identities according to an embodiment of the present invention is schematically shown. As shown in the figure, an authentication system according to an embodiment of the present invention includes an optional communication network 110 , a communication network 120 , a user terminal 200 , an authentication front-end computer system 300 and an authentication server 400 . The communication network 110 may be a wireless communication network or a wired communication network or a combination of the two, or a local area network (LAN), a metropolitan area network (MAN) or a wide area network (WAN), or a combination of two or even three of them. The communication network 120 may be a wireless communication network or a wired communication network or a combination of the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method and a system for user authentication and a user terminal, an authentication front-end computer system and an authentication server, wherein the user terminal, the authentication front-end computer system and the authentication server are used in the system for the user authentication. One implementation mode is that the user terminal sends an authentication instruction containing authentication information to the authentication front-end computer system, and then the authentication front-end computer system sends an authentication request containing the authentication information to the specific authentication server. Another implementation mode is that the user terminal sends the authentication request containing the authentication information to the specific authentication server. Based on either of the two implementation modes, after the authentication server receives the authentication request, the authentication server authenticates the user identity according to the authentication information. At last, preferably, the authentication server sends authentication results to the authentication front-end computer system. When a user needs to pay a certain amount of money to an operator, after successful authentication, the authentication server transfers the specific amount of money from a specific payment account of the user to a specific account of the operator.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method and system for authenticating user identities. The invention also relates to a user terminal, an authentication server and an authentication front-end computer system used in said method and system. The present invention is based on the Chinese invention patent application with the filing date of November 8, 2011 and the application number of 201110358242.4, the contents of which are incorporated herein by reference. Background technique [0002] With the development of information technology, e-commerce has become more and more popular in people's life. The popularity of e-commerce is inseparable from the authentication of user identity. In the prior art, there are mainly the following two types of applications that need to authenticate user identities, especially for mobile users: electronic payment mechanisms and electronic ticketing (ticket authenticat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L63/0892H04L63/08H04L29/06H04L63/0876
Inventor 陈嘉贤
Owner 陈嘉贤
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products