System for secure ID authentication
An ID authentication and security technology, applied in security devices, transmission systems, data processing applications, etc., can solve problems such as limited time and complex software use
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0024] The drawing illustrates a secure ID authentication system for authenticating responses from a subscriber module (such as a mobile phone MP) including a SIM card to a request from an application programming interface (API) over a cellular radio network with a UDDI network to authenticate transactions. A transaction may be one that does not require a PIN to be secured (such as a subscription to a newsletter), or one that requires a simple yes / no answer or selection from a list of options, or involves paying or supplying an individual A transaction of information that requires a PIN to be entered.
[0025] request is sent (step I, figure 2 ) to the Identity Application Server (IAS) of the database holding the user module ID information. The IAS converts (step II) the request into a class 2 SMS message, which is transmitted (step III) over the cellular radio network CN to the SIM card of the phone MP, which displays the message on the phone VDU, accompanied by an optiona...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 