Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method, device and system for identity authentication

An identity authentication and authentication request technology, applied in the field of identity authentication, can solve problems such as malicious attacks, user inconvenience, inconvenience, etc., to ensure security, facilitate popularization, and achieve simple and convenient effects

Inactive Publication Date: 2013-04-10
CHINA MOBILE GROUP SICHUAN
View PDF4 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, if an overly simple random code verification method is used, it is easy to be maliciously attacked by brute force cracking software or Trojan horse programs through graphic analysis; if an overly complicated random code verification method is used, it will bring difficulties and inconvenience to users
In addition, the user identity authentication method of user name and password used in the current mobile online business hall service requires the user to memorize the password corresponding to his user name. When changing the password, a mobile phone SMS verification is required, which also brings inconvenience to the user.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and system for identity authentication
  • Method, device and system for identity authentication
  • Method, device and system for identity authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] Aiming at the problems existing in the prior art, the present invention proposes an identity authentication scheme, which can more conveniently and reliably realize authentication of user identity by an authentication server of a mobile online business hall.

[0050] In order to make the technical solution of the present invention clearer and clearer, the solution of the present invention will be further described in detail below with reference to the accompanying drawings and examples.

[0051] figure 2 It is an identity authentication flow chart of the first embodiment of the identity authentication method of the present invention. In this embodiment, after receiving the voiceprint authentication request sent by the user terminal UE, the authentication server of the mobile online business hall randomly generates voice information requiring the user to respond, sends the voice information requiring the user to respond to the UE, and prompts The user responds to the v...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method, device and system for identity authentication. The method includes: receiving a vocal print authentication request which is sent by user terminal user equipment (UE) and comprises a user name of a user; sending prompting information to the UE, wherein the prompting information comprises voice information responded by the user; receiving user vocal print information sent by the UE and extracting vocal print characteristics in the user vocal print information; judging whether the vocal print characteristics are identical with pre-stored user sample vocal print characteristics, on yes judgment, authentication succeeds, otherwise, the authentication fails; and sending authentication results to the UE. By means of the technical scheme, authentication conducted by an authentication server of a mobile online business hall on a user's identity can be achieved conveniently and reliably.

Description

technical field [0001] The invention relates to the technical field of identity authentication, in particular to an identity authentication method, device and system. Background technique [0002] In the existing mobile online business hall service, the authentication server is responsible for authenticating the user terminal (UE). After passing the authentication, the UE can access the mobile online business hall in a wired or wireless manner. [0003] figure 1 It is a flow chart of realizing the authentication mode between the existing UE and the authentication server. Such as figure 1 shown, including the following steps: [0004] Step 101: UE (with a WEB browser installed) initiates an authentication request to the authentication server; [0005] Step 102: The authentication server pushes a Portal page to the UE in the form of WEB, requiring the user to input authentication information, usually a user name and a password. [0006] Steps 103-104: UE receives the user...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/06H04L29/06
Inventor 涂天禄许雷
Owner CHINA MOBILE GROUP SICHUAN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products