User identity authentication method, third-party authentication platform and operator authentication platform

A technology of user identity authentication and authentication platform, applied in the direction of user identity/authority verification, etc., can solve problems such as security risks and economic losses, and achieve the effect of ensuring security, improving authentication level, and strengthening authentication services.

Active Publication Date: 2014-07-23
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF3 Cites 48 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, this convenient transaction mode has potential security risks. Consider the following scenario: when the mobile phone is stolen or loaded with spyware, the attacker can obtain extremely high permissions by simply stealing the mobile phone verification code, such as changing the payment password, canceling Pay for the bound certificate, thereby causing economic losses to the user

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User identity authentication method, third-party authentication platform and operator authentication platform
  • User identity authentication method, third-party authentication platform and operator authentication platform
  • User identity authentication method, third-party authentication platform and operator authentication platform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0051] User identity credential - mobile phone and real user are two-level concepts, which can be expressed by "user-owned" and "user-known". "Owned by the user" is a superficial attribute of the user. For example, a mobile phone is an item owned by the user, which is easy to be forged and replaced; "Known by the user" is a deep-level attribute of the user, which is difficult to forge and can represent the real identity of the user. The current authentication methods centered on mobile identity are owned by the third-party application authentication platform to verify users, that is, the mobile phone number + password + SMS verification scheme is used to complete high-risk operations such as mobile payment and transfer. After entering the spyware, the attacker can crack the user's ownership only by stealing the mobile phone verification code, and obtain extremely high permissions, such as modifying the payment password, canceling the payment binding certificate, and logging into ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a user identity authentication method, a third-party authentication platform and an operator authentication platform all oriented to mobile applications. The system comprises a client, the third-party authentication platform and the operator authentication platform; the third-party authentication platform receives a high-risk operation authentication request carrying a user mobile phone number from the client, and then obtains user identity authentication information associated with the user mobile phone number from the operator authentication platform; the operator authentication platform sends the user identity authentication information which is associated with the user mobile phone number and found in a local database to the third-party authentication platform; the third-party authentication platform authenticates the identity of a user using the client according to the user identity authentication information associated with the user mobile phone number. The user information of the operator is fused with the authentication technology of the third-party applications, so that the authentication services with the mobile user identity as the core can be further enhanced, the authentication level can be increased and the security of the user and the third-party can be guaranteed.

Description

technical field [0001] The invention relates to the communication field, in particular to a user identity authentication method, a third-party authentication platform and an operator authentication platform. Background technique [0002] With the rapid development of the mobile Internet, mobile terminal users are no longer satisfied with communication functions such as calls, and it has become a major trend in the development of mobile services to obtain value-added services through mobile terminals mainly based on mobile phones. Mobile device manufacturers have greatly improved the performance of mobile phones and provided technical support for the popularization of mobile applications. At present, mobile applications mainly represented by mobile payment and mobile banking provide users with more convenient and efficient services. It is foreseeable that with the maturity and popularization of LTE and e-commerce technologies, mobile applications will have a broad space for d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
Inventor 张尼张云勇刘镝李正申珉宇
Owner CHINA UNITED NETWORK COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products