Identity authentication system based on telecom operators

A telecom operator, identity authentication technology, applied in the direction of user identity/authority verification, etc., can solve the problems of cumbersome login and lack of strong account protection, and achieve the effect of increasing efficiency and easy application.

Active Publication Date: 2013-06-05
陈大昭
View PDF5 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The technical problem to be solved by the present invention is to provide an identity authentication system based on a telecommunications operator in view of the above deficiencies. The encoder can be used, which simply improves the security of the account, which is convenient and practical

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication system based on telecom operators
  • Identity authentication system based on telecom operators

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Of course, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on The claims in the present invention, except for the embodiments but within the scope of the claims, also belong to the protection scope of the present invention.

[0027] as attached figure 1 As shown, a telecom operator-based identity authentication system is characterized in that it includes:

[0028] The identity authentication request provider is the merchant that requires confirmation of the user's identity. The identity authentication request provider will first input the merchant's identification code, password, and user terminal (that is, the server facing the user, such as a web page, electronic gate, etc.) etc.), the authentication proce...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identity authentication system based on telecom operators. The system adopts various communication devices of a mobile terminal, such as near field communication (NFC), Bluetooth, wireless fidelity (WIFI), infrared rays, bar codes, ultrasonic waves and radio frequency identification devices (RFID) to receive information of identity authentication requested from an external or mobile network, utilizing information of mobile users provided by subordinate telecom operators of mobile devices, such as telephone numbers and other items to carry out comparison, returning results to authentication request providers or providing the telephone numbers of the users to the authentication request providers, and enabling the authentication request providers to voluntarily carry out comparison. The identity authentication system based on the telecom operators adopts the mobile telephone numbers as global identity tags, has the advantages of being easy to apply, unique, and open but not private, achieving the function of identity authentication of the mobile terminals bundled with third-party guarantee, thereby improving accuracy and convenience of the identity authentication, easily achieving the third-party guarantee and conveniently protecting personal data or personal accounts.

Description

technical field [0001] The invention relates to an identity authentication system based on telecommunication operators. Background technique [0002] Based on convenience and needs, people often log in to different websites or software to process messages or play games. However, viruses or Trojan horses are everywhere, and they are changing with each passing day. The current method based on the use of third-party guarantees is inconvenient and expensive. The third-party guarantee methods require merchants to invest a lot of resources and users need to carry additional hardware or install a lot of identity software. The defect of the prior art is that it is inconvenient And the problem of non-popularity leads to frequent theft of identity or household registration, which interferes with people's normal order and limits the development of the network. Furthermore, the existing non-third-party guaranteed identity authentication system requires the user to enter a lot of data t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
Inventor 陈大昭
Owner 陈大昭
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products