Unlock instant, AI-driven research and patent intelligence for your innovation.

System for secure ID authentication

An ID authentication and security technology, applied in security devices, transmission systems, data processing applications, etc., can solve problems such as limited time and complex software use

Inactive Publication Date: 2015-03-18
TECH BUSINESS MANAGEMENT LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] However, one-time passwords require software on the user module to generate them and corresponding software on the service module to verify them, and the software and its use are sometimes deliberately complicated in order to provide an acceptable level of security, in some Situations that require time-limited passwords and random number generators, or expensive auxiliary devices

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System for secure ID authentication
  • System for secure ID authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The drawing illustrates a secure ID authentication system for authenticating responses from a subscriber module (such as a mobile phone MP) including a SIM card to a request from an application programming interface (API) over a cellular radio network with a UDDI network to authenticate transactions. A transaction may be one that does not require a PIN to be secured (such as a subscription to a newsletter), or one that requires a simple yes / no answer or selection from a list of options, or involves paying or supplying an individual A transaction of information that requires a PIN to be entered.

[0025] request is sent (step I, figure 2 ) to the Identity Application Server (IAS) of the database holding the user module ID information. The IAS converts (step II) the request into a class 2 SMS message, which is transmitted (step III) over the cellular radio network CN to the SIM card of the phone MP, which displays the message on the phone VDU, accompanied by an optiona...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A secure identification (ID) authentication system for authenticating over a cellular radio network that has a UDDI network, a response from a user module comprising a Subscriber Identification Module (SIM) card to a request from an application programming interface (API) to authenticate a transaction, in which; a request is sent to an identity application server (IAS / IDS) holding a database of user module ID information; the IAS transmits the request as a class 2 Short Message Service (SMS) message to the SIM card; the SIM card causes the request to be displayed on the user module; when a response is entered, the user module encrypts the response and associated data and transmits the encrypted data over the UDDI network to an Over The Air (OTA) gateway to the IAS; and the IAS decrypts the data and transmits the response to the API.

Description

technical field [0001] The present invention relates to a secure ID authentication process particularly, but not exclusively, for authenticating financial and other transactions over publicly accessible communication networks such as cellular telephone networks. Background technique [0002] The accepted authentication process for credit and debit card transactions involves the use of a PIN (Personal Identification Number, which usually consists of a four-digit number such as 7356), which is known only to the cardholder or It should only be known about it. Not even the issuing bank or card company knows the user's PIN. [0003] The payment card PIN is held on the card as a data element in the magnetic strip. At a payment terminal connected to the communication network, the terminal reads the PIN from the magnetic strip and requests the user to enter the PIN on the keypad. If they match, the transaction is authenticated. In this example, there is no transmission of the PI...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06Q30/06
CPCH04L2463/102G06Q20/3255H04L63/0853G06Q20/4012H04W12/06H04W12/068G06Q20/16G06Q20/32H04W4/14
Inventor K. 库兰T. N. 特杰
Owner TECH BUSINESS MANAGEMENT LTD