Method and system for interconnecting and intercommunicating authentication based on identity recognition card
An identification card and interconnection technology, applied in the field of identification card-based interconnection authentication method and system, can solve problems such as inability to complete the authentication process
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0035] figure 1 The flow chart of the interconnection and intercommunication authentication method based on the identification card provided by Embodiment 1 of the present invention; please refer to figure 1 The identification card-based interconnection authentication method provided in this embodiment includes:
[0036] S1. The website server receives an authentication request, and the authentication request includes a mobile phone number corresponding to an identification card one by one.
[0037] Wherein, the target website is a website that the user currently wants to visit. The embodiment of the present invention is applied to a scenario where a user needs to authenticate based on an identity card when accessing a target website, and the application scenario may be a login scenario, a payment scenario, and the like. The identification card may be a SIM card, a UIM card, and the like.
[0038] Specifically, when the user clicks an operation requiring authentication such...
Embodiment 2
[0054] figure 2 It is a flow chart of step S5 in the identification card-based interconnection and interworking authentication method provided by Embodiment 2 of the present invention. The identification card-based interconnection authentication method provided in this embodiment is similar to the identification card-based interconnection authentication method provided in Embodiment 1 above, and also includes steps S1-S8, since steps S1-S8 are in Embodiment 1 It has already been described in detail and will not be repeated here. Only the difference between this embodiment and the above-mentioned Embodiment 1 will be described below.
[0055] Specifically, see figure 2 , the step S5 includes:
[0056] S51. The unsubscribed server requests the information in the authentication request from the subscribed server.
[0057] That is to say, in this embodiment, after receiving the authentication request sent by the website server, the unsigned server further requests the signed...
Embodiment 3
[0061] image 3 It is a flow chart of step S5 in the identification card-based interconnection authentication method provided in Embodiment 3 of the present invention. The identification card-based interconnection authentication method provided in this embodiment is the same as the ID card-based authentication method provided in Embodiment 1 The interconnection and interoperability authentication methods are similar, and the similarities between the two will not be repeated here. Only the differences between the present application and the above-mentioned embodiment 1 are described below.
[0062] Specifically, in this embodiment, in addition to the mobile phone number, the authentication request also includes: biometric data of the user. On this basis, see image 3 , the step S5 includes:
[0063] S51. The unsigned server sends a biometric data acquisition request to the basic database according to the authentication request, so that after the basic database receives the b...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 