Identity authentication method, device and system

一种身份认证、子系统的技术,应用在身份认证方法,装置及系统领域,能够解决无法满足便捷性、安全性不可保障等问题

Active Publication Date: 2016-01-20
SHENZHEN TENCENT COMP SYST CO LTD
View PDF6 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, although this solution solves the problem of user value transfer security and off-site fraud to a certain extent, it limits users to transfer value only in known locations. (such as business trip) usage scenarios cannot meet the convenience; in addition, when the mobile device and account are stolen, it is easy to use the victim account to transfer value within the range of the account's usual location, and the security cannot be guaranteed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method, device and system
  • Identity authentication method, device and system
  • Identity authentication method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0038] Such as figure 1 As shown, it is a diagram of an application environment implemented by an identity authentication method in an embodiment, and the application environment includes a mobile terminal 102 and a server 104 . Wherein, the mobile terminal 102 may be a smart phone, a personal notebook or a tablet computer, etc.; the mobile terminal 102 and the server 104 communicate through a network. Various applications can be run on the mobile terminal 102, such as various shopping applications, payment applications, etc. These network applications often have some risks in the process of provi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an identity authentication method, a device and a system. The method comprises steps: a virtual resource data processing request sent by a mobile terminal is acquired, the virtual resource data processing request carries a pre-stored digital fingerprint, and the digital fingerprint is generated by using equipment information and user information; according to a prebuilt user numerical value transfer behavior model, virtual resource data processing authentication is carried out on the virtual resource data processing request; after the virtual resource data processing authentication is passed, according to the digital fingerprint, a numerical value transfer token is generated, and the numerical value transfer token is returned to the mobile terminal; a numerical value transfer request sent by the mobile terminal is received, and the numerical value transfer request carries the numerical value transfer token; and whether the numerical value transfer token is legal is checked, if yes, the identity authentication is passed, and if not, the identity authentication is not passed. Numerical value transfer safety can be improved, and numerical value transfer convenience is ensured.

Description

technical field [0001] The present invention relates to the field of network technology, in particular to an identity authentication method, device and system. Background technique [0002] As a kind of value transfer, mobile payment refers to payment activities such as the purchase of virtual goods or physical objects, the transfer of cash and virtual currency through mobile devices. [0003] In the traditional mobile value transfer process, identity authentication is generally required, and most value transfers are based on user passwords, user fingerprints, and geographic location information where users often perform value transfers as the basis for identity authentication. Specifically, the traditional technical solution uses the user password and the commonly used geographical location information corresponding to the password obtained on the basis of obtaining the user's permission, and after matching the corresponding numerical value transfer password with the geogra...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/083H04L63/0861H04L67/563H04W4/02G06F21/32G06F21/34G06F21/6245H04W12/065H04W4/029H04L12/06H04L9/40
Inventor 鲍东坡金欢王松健邓建威李引吴锐洲阳诚
Owner SHENZHEN TENCENT COMP SYST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products