Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity authentication method, authentication server and third-party platform

An authentication server and identity authentication technology, which is applied in the field of identity authentication methods, authentication servers and third-party platforms, can solve problems such as SMS gateway bottlenecks and inability to support large-scale authentication, and reduce the number of SMS communications and processing capabilities. The effect of restriction

Active Publication Date: 2016-08-24
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, since each user authentication requires SMS communication between the SIM card and the operator's authentication server, when the number of authenticated users increases and the number of authentications increases, the operator's SMS gateway will become the bottleneck of the entire system
For example, assuming that there are 10 million users and 10,000 users who are online at the same time and use authentication services, this service alone requires the operator's SMS gateway to process 10,000 SMS messages per second, and the processing capacity of the operator's SMS gateway is usually 6000 entries / second, thus unable to support such a large-scale authentication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method, authentication server and third-party platform
  • Identity authentication method, authentication server and third-party platform
  • Identity authentication method, authentication server and third-party platform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0069] In order to enable those skilled in the art to better understand the technical solutions of the present invention, the identity authentication method, authentication server and third-party platform provided by the present invention will be described in detail below with reference to the accompanying drawings.

[0070] figure 1 It is a flowchart of the identity authentication method provided by the first embodiment of the present invention. See figure 1 , Identity authentication methods include:

[0071] Step 101: Receive an authentication request form sent by a third-party platform, where the authentication request form includes a user's mobile phone number and an authentication risk value, and the authentication risk value is 1 or 0. Here, 1 means that SIM card authentication is required; 0 means that there is no requirement for authentication.

[0072] The above-mentioned third-party platform is the entrance for the user to perform identity authentication, and is responsibl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an identity authentication method, an authentication server and a third-party platform. The method comprises the steps of receiving an authentication request table sent by the third-party platform, wherein the authentication request table comprises a mobile phone number of a user and an authentication risk value, and the authentication risk value is equal to 1 or 0; judging whether the authentication risk value is equal to 1 or 0; if the authentication risk value is equal to 1, carrying out SIM (Subscriber Identity Module) card authentication; if the authentication risk value is equal to 0, carrying out client authentication; if SIM card authentication or client authentication is passed, sending information that authentication is successful to the third-party platform; and if SIM card authentication or client authentication is not passed, sending information that authentication is failed to the third-party platform. In the technical scheme of the identity authentication method, the authentication server and the third-party platform which are provided by the invention, times of short message communication between an SIM card and the authentication server of an operator can be reduced, so that the condition that due to limitation of processing capacity of a short message gateway of the operator, large-scale authentication cannot be supported can be reduced.

Description

Technical field [0001] The present invention relates to the field of communication technology, in particular to an identity authentication method, an authentication server and a third-party platform. Background technique [0002] Currently, there are mainly three mobile identity authentication technologies. 1) Mobile phone number + password + SMS verification technology, 2) Based on 3GPP GBA technology, 3) Scheme based on operator credentials. Among them, the third mobile identity authentication technology is a SIM card-based identity authentication scheme unique to operators. The specific process of the scheme is: the user enters the mobile phone number on the login page of the third-party platform, and the login page forwards the mobile number To the operator’s authentication server, the authentication server addresses the user and communicates with the card application on the SIM card corresponding to the mobile phone number to verify whether the user logging in with the mobi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04W4/14H04W12/06
CPCH04L63/08H04L63/0876H04W4/14H04W12/06
Inventor 张尼刘镝王志军汤雅妃王笑帝
Owner CHINA UNITED NETWORK COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products