Unlock instant, AI-driven research and patent intelligence for your innovation.

User Authentication and Authorization System

A technology for verifying authorization and user identity, which is applied in the field of user identity verification and authorization system, and can solve problems such as leakage, user information leakage, and user information theft.

Inactive Publication Date: 2016-09-14
季亚琴科·安德烈 +2
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The disadvantage of the existing method is that user information may be stolen and leaked by a third party. If the personal identification code is entered through a computer keyboard or telephone, the user may negligently disclose his personal identification code and cause information leakage; In the case of mobile phones, if the SIM card is lost, the third party who gets the SIM card can steal user information by repeatedly trying to enter the PIN, so there is room for improvement

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User Authentication and Authorization System
  • User Authentication and Authorization System
  • User Authentication and Authorization System

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The method adopted by the present invention to achieve the intended purpose of the invention will be further described below in conjunction with the accompanying drawings and preferred embodiments of the present invention.

[0032] The invention relates to a user identity verification and authorization system, which is suitable for multi-user accessible equipment, such as shared remote computer equipment or telephone equipment. Please refer to Figure 1 to Figure 3 As shown, it is a functional block diagram of the system. The user authentication and authorization system includes a smart card 10, a client device 20, a system server 30 and a creation module 40, wherein:

[0033] The smart card 10 stores a key information that can be read and written repeatedly. The key information can be a user identification (ID) code or a personal identification number (Personal Identification Number, PIN) or include a user identification code and a personal identification number, but i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A user identity verification and authorization system comprises a smart card, a client device, a system server and a creation module. The smart card stores key information which could be read and written repeatedly; the client device has a reader which is used to read the key information in the smart card; after reading the key information from the smart card, the client device transfers the key information to a verification module in the system server; the system server also comprises a database storing user information corresponding to the key information; when verifying that the received key information corresponds to the user information stored in the database of the system server, the verification module allows the client device to use services provided by a multiuser accessible device; the creation module is used for generating new key information and corresponding user information for next verification. The invention can reduce the possibility that personal information is leaked by mistake or intentionally.

Description

technical field [0001] The invention relates to a user identity verification and authorization system, in particular to a system for performing user identity verification and authorization on multi-user access equipment, so as to prevent unauthorized users from accessing system resources such as remote computers and telephones. Background technique [0002] General multi-user accessible equipment, such as shared remote computer equipment or telephone equipment, has the function of giving different access rights to different users when accessing the equipment, and in order to ensure the security of data in the equipment, when the user accesses multiple When a user can access a device, a multi-user accessible device usually has a user authentication program to confirm the identity of the visitor and the access authority. [0003] Existing technologies such as Figure 6 As shown, the multi-user accessible device has a client device and a system server, wherein the client device...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32G06F21/31
CPCG06F21/31H04L9/3234
Inventor 季亚琴科·安德烈普罗宁·谢尔盖孙永纲
Owner 季亚琴科·安德烈