Unlock instant, AI-driven research and patent intelligence for your innovation.

Interconnection authentication method and system based on identity card

An identification card and interconnection technology, which is applied in the field of interconnection authentication methods and systems based on identification cards, and can solve problems such as the inability to complete the authentication process.

Active Publication Date: 2019-10-01
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In order to speed up the cooperative deployment, the website enterprise may only sign a cooperative deployment agreement with one operator (called the contracted operator), and the authentication server of the contracted operator (called the signed server), the website server and the user terminal conduct Authentication interaction, and the server of the uncontracted operator (called uncontracted server) will not perform authentication interaction with the website server and user terminal, and cannot complete the authentication process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Interconnection authentication method and system based on identity card
  • Interconnection authentication method and system based on identity card
  • Interconnection authentication method and system based on identity card

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0035] figure 1 The flow chart of the interconnection and intercommunication authentication method based on the identification card provided by Embodiment 1 of the present invention; please refer to figure 1 The identification card-based interconnection authentication method provided in this embodiment includes:

[0036] S1. The website server receives an authentication request, and the authentication request includes a mobile phone number corresponding to an identification card one by one.

[0037] Wherein, the target website is a website that the user currently wants to visit. The embodiment of the present invention is applied to a scenario where a user needs to authenticate based on an identity card when accessing a target website, and the application scenario may be a login scenario, a payment scenario, and the like. The identification card may be a SIM card, a UIM card, and the like.

[0038] Specifically, when the user clicks an operation requiring authentication such...

Embodiment 2

[0054] figure 2 It is a flow chart of step S5 in the identification card-based interconnection and interworking authentication method provided by Embodiment 2 of the present invention. The identification card-based interconnection authentication method provided in this embodiment is similar to the identification card-based interconnection authentication method provided in Embodiment 1 above, and also includes steps S1-S8, since steps S1-S8 are in Embodiment 1 It has already been described in detail and will not be repeated here. Only the difference between this embodiment and the above-mentioned Embodiment 1 will be described below.

[0055] Specifically, see figure 2 , the step S5 includes:

[0056] S51. The unsubscribed server requests the information in the authentication request from the subscribed server.

[0057] That is to say, in this embodiment, after receiving the authentication request sent by the website server, the unsigned server further requests the signed...

Embodiment 3

[0061] image 3 It is a flow chart of step S5 in the identification card-based interconnection authentication method provided in Embodiment 3 of the present invention. The identification card-based interconnection authentication method provided in this embodiment is the same as the ID card-based authentication method provided in Embodiment 1 The interconnection and interoperability authentication methods are similar, and the similarities between the two will not be repeated here. Only the differences between the present application and the above-mentioned embodiment 1 are described below.

[0062] Specifically, in this embodiment, in addition to the mobile phone number, the authentication request also includes: biometric data of the user. On this basis, see image 3 , the step S5 includes:

[0063] S51. The unsigned server sends a biometric data acquisition request to the basic database according to the authentication request, so that after the basic database receives the b...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides an identification card-based interconnection authentication method and system, comprising: the website server receives an authentication request including a mobile phone number corresponding to the identification card and sends it to the signing server; the signing server queries the attribution information of the mobile phone number And when the mobile phone number does not belong to the operator corresponding to the contracted server, return the attribution information of the mobile phone number to the website server; the website server sends the authentication request to the uncontracted server according to the attribution information; The corresponding terminal; the terminal receives the authentication request, and receives the user authentication confirmation information and sends it to the unsigned server; the unsigned server receives the authentication confirmation information and sends it to the website server; the website server completes the authentication process according to the authentication confirmation information.

Description

technical field [0001] The invention belongs to the technical field of the Internet of Things, and in particular relates to an identification card-based interconnection authentication method and system. Background technique [0002] With the continuous evolution of information and communication technology and the introduction of new technologies such as cloud computing and big data, people can use PCs and mobile terminals to carry out various network services such as web surfing, resource access, e-commerce, mobile payment, and social networking. Although various network services are convenient for users, the privacy and security situation of network users is becoming more and more severe. In recent years, a series of network information leakage incidents have emerged one after another. In order to prevent the user's information from being leaked, when a user logs in to a website on a PC, at present, authentication is often performed based on an identification card such as ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/06G06F21/32H04L29/06G06K9/00
CPCH04L63/0861H04L63/0876H04W12/06G06F21/32G06V40/16G06V40/161
Inventor 刘镝王志军张尼王笑帝
Owner CHINA UNITED NETWORK COMM GRP CO LTD