Authentication method and system for mobile subscribers

An identity verification method and technology for mobile users, applied in the field of computers and their software, can solve the problems of easy interception of verification text messages, identification of authenticity of non-verification text messages, and easy cracking of content, etc.

Active Publication Date: 2017-01-04
尹子栋
View PDF4 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] (1) Users cannot accurately verify the service system: there is no uniform standard for verifying the SMS sending number and sending content, and it is completely determined by the service provider
And usually the service system will not notify the user in advance, so in most cases, the user has no corresponding means to distinguish the authenticity of the verification SMS
In many telecommunications fraud cases today, the victim leaks the verification code to criminals without being able to identify the source of the verification SMS, causing serious problems such as account password reset, online banking mobile phone number unbinding, etc.
[0005] (2) Verification text messages are easy to be intercepted, and the content cannot be encrypted: the main function of ordinary text messages is to transmit short characters between senders and receivers. These characters uniformly adopt the UCS2 encoding scheme, which belongs to plaintext transmission
This has resulted in that once the verification SMS is intercepted, its content will be easily cracked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method and system for mobile subscribers
  • Authentication method and system for mobile subscribers
  • Authentication method and system for mobile subscribers

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] Exemplary implementations of the present invention are described below in conjunction with the accompanying drawings, which include various details of the implementations of the present invention to facilitate understanding, and they should be regarded as exemplary only. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the invention. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness. In order to enable those skilled in the art to understand better, some terms are now explained as follows:

[0032] Security service card application device: it is a special application program on a security chip card, and the security chip card is installed and used in a mobile terminal in the form of a pluggable or embedded chip. The device is equivalent to the cl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an authentication method and system for mobile subscribers, which can realize the password-free registration and login and have advantages of convenience in use, high safety and low cost. The authentication method for the mobile subscribers of a third-party application of an Andriod system or an iOS system comprises the following steps: completing access registration of a third-party application on a safety service platform apparatus; and registering a safety service card application apparatus so as to establish a user information database; and when a user logs in at a first time, transmitting, by the safety service platform proxy apparatus SDK, a mobile phone number of a user to the safety service platform apparatus to perform the authentication, if the mobile phone number of the user passes the authentication, generating, by the safety service platform apparatus, an exclusive OpenID, and returning, by the safety service platform apparatus, a user authentication result and the OpenID to the third-party application by virtue of the SDK; and when the user logs in at a second time, transmitting, by the SDK, the OpenID to the safety service platform apparatus to perform the authentication, and if the OpenId passes the authentication, returning, by the safety service platform apparatus, the user authentication result and the user mobile phone number to the third-party application by virtue of the SDK.

Description

technical field [0001] The invention relates to the technical field of computers and software thereof, in particular to an authentication method and system for mobile users. Background technique [0002] With the development of Internet technology and communication technology, the login scheme of "mobile phone number + SMS verification code" is widely used in business scenarios that need to quickly confirm user identity, such as website registration / login, online payment, etc. The technical principle is as follows: First, the user logs in to the service interface (website or APP), fills in his mobile phone number, and clicks the "Get Verification Code" button. Secondly, the website or APP generates a SMS verification code according to the rules, and pushes the verification code down to the user's mobile terminal through the SMS sending interface provided by the operator. Finally, the user receives the push-down SMS and fills in the verification code on the service interface...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04W12/71H04W12/72
CPCH04W12/06
Inventor 尹子栋张钧宇
Owner 尹子栋
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products