A mobile terminal-based identification method and system
An identity authentication and mobile terminal technology, which is applied in the field of identity authentication methods and systems based on mobile terminals, can solve problems such as manual input is prone to errors, and achieve the effect of simplifying operations and ensuring safety
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0053] Embodiment 1 of the present invention (as figure 1 shown) is to directly use the identity authentication method of the present invention in the login operation of the application system. In this embodiment, the application system of this embodiment corresponds to the information system in the identity authentication method of the present invention, and the client of the application system in this embodiment corresponds to the information system client in the identity authentication method of the present invention. When the user uses the application system client to log in the application system, the user inputs and submits the account name in the application system through the application system client; at the same time, the user uses the login assistant in the mobile terminal and the user's identity certificate (such as account name, password, account name and identification private key, digital certificate and private key) to log in to the application system; the appl...
Embodiment 2
[0055] This embodiment (such as figure 1 As shown), the identity authentication method of the present invention is directly used in the login operation of the application system. The difference from Embodiment 1 is that the display information sent by the login assistant to the application system client in this embodiment is a picture, and the login assistant is moving What the terminal displays is a set of pictures including the pictures sent to the application system client. The user selects the picture he sees on the application system client from a group of pictures displayed on the mobile terminal, and in this way confirms the display information he sees to the login assistant, or informs the login assistant that no matching picture has been seen or is displayed in the information system. The client does not see the picture. Here, the pictures sent and displayed by the login assistant may be from a pre-generated set of pictures (this set of pictures may only include two ...
Embodiment 3
[0057] This embodiment (such as figure 2 As shown), the identity authentication method of the present invention is also directly used in the login operation of the application system. The difference from Embodiments 1 and 2 is that in this embodiment, the login assistant receives a request from the information system to allow the user to log in Finally, the user is prompted to randomly (randomly, arbitrarily) input information on the human-computer interaction interface of the login assistant, and the information entered by the user is sent to the information system client through the information system; Whether the information entered by the user on the mobile terminal is displayed, and confirm the result to the login assistant, and the login assistant determines whether the information system client has received the information sent by it. In this method, the information entered by the user is not important or what it is. The user usually only needs to input a few character...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


