Internet identity authentication method based on incoming calls

An identity authentication, Internet technology, applied in the fields of electronics, Internet, trusted authentication, and communication, can solve the problems of not being particularly convenient, insecure, operating costs and convenience, reducing security standards, etc., to shorten the physical location and reduce the convenience. , the effect of improving safety

Inactive Publication Date: 2014-04-09
侯贺杰
View PDF4 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] 1. In the past, the user's mobile phone was selected as one of the main convenient and safe authentication methods in the user identity authentication, but at present, the active SMS verification code method is mainly used. This method will generate a certain cost for each verification, according to the current billing standard About ¥0.05 to ¥0.1 / time, because the fee is relatively low and the current Internet micropayment is not particularly convenient. Many website operators adopt the strategy of no charge for advance funds, which naturally increases the operating burden of the website
[0003] 2. U-shield provides higher security for online banking transactions, but because there is still a certain cost and it is inconvenient to use without carrying it with you, and it still takes a long time for third-party payment (such as Alipay, etc.) to widely use U-shield the way
[0004] 3. In order to reduce operating costs and convenience, many websites have adopted a method of lowering security standards. In many identity authentication and e-commerce transactions (including many online banking and third-party payments), simple account password methods are still adopted, thereby providing Internet The application brings certain security risks
[0005] 4. Even SMS authentication, one of the current main identity authentication methods, only supports mobile phones that can receive SMS, and does not support fixed-line authentication for the time being, which causes some inconvenience and insecurity to the network identity authentication of enterprise entities

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet identity authentication method based on incoming calls

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment approach

[0017] The specific implementation mode, the website server end of the present invention realizes easier and has ready-made technology more, mainly enumerates several called host end implementation modes below:

[0018] 1. The designated number of the website is the mobile phone number method 1. Directly use the mobile phone as the called host, write the corresponding mobile phone software to obtain the incoming call number and send it to the website server through GPRS and other methods. Currently popular mobile operating systems such as Android can support this software Law.

[0019] 2. The designated number on the website is the mobile phone number Method 2, use the single-chip microcomputer to control the GSM module to obtain the incoming call number, and then use the GPRS function to send the incoming call number to the server.

[0020] 3. Using the LAN method to replace the above-mentioned GPRS method can increase the speed and concurrent operation.

[0021] 4. The desi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an Internet identity authentication method which is mainly applied to the aspect of Internet identity authentication and provides a scheme which is high in safety, high in convenience and low in cost for the Internet, electronic commerce and the like. The Internet identity authentication method includes the steps that firstly, identity authentication is conducted by enabling a user to actively conduct calling and recording to compare user interface submit information so as to conduct algorithm matching; secondly, in the simple process, when identity authentication needs to be conducted by the user in the Internet using process, after a cell phone number of a called host is designated through an active calling website or system, the called host sends a caller ID to a website or system server, the user submits the cell phone number to be verified or other related information to be verified on a verification interface at the same time, and the server compares the number or the submitted related information inputted by the user with the number information from the called host within limited time such as one minute to conduct algorithm matching so that the identity can be verified. According to the technology, both the cell phone number and the fixed-line telephone number can be verified, and user incoming calls can not be answered in the verification process.

Description

Technical field: [0001] The patent of the invention relates to the fields of Internet, communication, electronics, trusted authentication, etc., and provides a high-security, high-convenience, and low-cost solution for the user identity authentication requirements of the Internet and e-commerce. Background technique: [0002] 1. In the past, the user's mobile phone was selected as one of the main convenient and safe authentication methods in the user identity authentication, but at present, the active SMS verification code method is mainly used. This method will generate a certain cost for each verification, according to the current billing standard It is about ¥0.05 to ¥0.1 / time, because the fee is relatively low and the current Internet micropayment is not particularly convenient. Many website operators adopt the strategy of no charge for advance funds, which naturally increases the operating burden of the website. [0003] 2. U-shield provides higher security for online b...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 侯贺杰
Owner 侯贺杰
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products