Identity authentication method and identity authentication device

A technology for identity authentication and geographic location information, applied in the field of identity authentication methods and devices, can solve problems such as poor user experience, and achieve the effects of easy acquisition and improved efficiency

Inactive Publication Date: 2015-11-18
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF4 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Embodiments of the present invention provide an identity authentication method and device, which avoids the problem of poor user experience caused by the need to memorize a large number of complex user names and passwords, and does not need to download SIM card applications, which can improve the efficiency of identity authentication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and identity authentication device
  • Identity authentication method and identity authentication device
  • Identity authentication method and identity authentication device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0039] An embodiment of the present invention provides an identity authentication method, which is applied to the process of a user logging in to a third-party platform, such as figure 1 As shown, the identity authentication methods include:

[0040] S101. The identity authentication server receives an identity authentication request sent by a third-party platform, and the identity authentication request includes a user's mobile phone number.

[0041] Wherein, the mobile phone number included in the identity authentication request is the mobile phone number entered by the user when logging in on the third-party platform. The identity authentication server is a server set up by the mobile operator and used for identity authentication of the user. The third-party platform is the platform that users need to log in to conduct Internet business. For example, the third-party platform can be WeChat, QQ, Taobao, and game websites.

[0042] S102. According to the mobile phone number,...

Embodiment 2

[0052] The embodiment of the present invention provides an identity authentication method, which is applied to the process of user login to the third-party platform, such as figure 2 As shown, the identity authentication methods include:

[0053] S201. The first identity authentication client receives a user information request sent by an identity authentication server.

[0054] Wherein, the first identity authentication client is a client installed on the user's mobile terminal and used for identity authentication of the user. The identity authentication server is a server set up by the mobile operator and used for identity authentication of the user. The user information request is used to indicate that the user is logging into the third-party platform, and requests the first identity authentication client to report the user information, and the user information is used to indicate the user's communication status within a preset time period.

[0055] S202. If the first id...

Embodiment 3

[0060] The embodiment of the present invention provides an identity authentication method, which is applied to the process of user login to the third-party platform, such as image 3 As shown, the identity authentication methods include:

[0061] S301. The first identity authentication client receives a time parameter pre-allocated by the identity authentication server.

[0062] Wherein, the first identity authentication client is a client installed on the user's mobile terminal and used for identity authentication of the user. The identity authentication server is a server set up by the mobile operator and used for identity authentication of the user.

[0063]The time parameters include: a first preset time t1 and a second preset time t2. t1 and t2 may be time parameters randomly generated by the identity authentication server. For different identity authentication clients, the identity authentication server can assign different t1 and t2. The first identity authenticatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses an identity authentication method and an identity authentication device, and relates to the technical field of communication. According to the identity authentication method and the identity authentication device, the problem of relatively poor user experience as a large number of complex user names and passwords need to be remembered is avoided, and the identity authentication efficiency can be improved without downloading a SIM card application. The specific scheme is that an identity authentication server receives an identity authentication request sent by a third-party platform, determines an identifier of a first identity authentication client by searching for a pre-stored corresponding relationship based on a phone number, sends a user information request if the first identity authentication client is in an online state, sends an authentication success message to the third-party platform if a user information response carrying user information is received and the user information is in accordance with user information stored in the identity authentication server, and sends an authentication failure message to the third-party platform if the user information is inconsistent with the user information stored in the identity authentication server or the user information response carrying the user information is not received.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to an identity authentication method and device. Background technique [0002] With the rapid development of the mobile Internet, users are no longer satisfied with communication services such as calls. It has become a major trend in the development of mobile Internet services for users to obtain data and services through mobile terminals, mainly mobile phones. At present, mobile Internet services mainly represented by mobile browsing, mobile search, mobile games, mobile social networking, mobile payment, and mobile banking provide users with more convenient and efficient services. It is foreseeable that with the long-term evolution (English: With the maturity and popularization of LongTermEvolution (abbreviation: LTE) technology and e-commerce technology, mobile Internet services will have a broad space for development. [0003] In order to ensure the security of the mobile...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0876H04L63/083H04W12/06H04W12/71H04W12/72H04L63/08
Inventor 张尼张云勇王志军刘镝汤雅妃
Owner CHINA UNITED NETWORK COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products