Unlock instant, AI-driven research and patent intelligence for your innovation.

A mobile terminal-based identification method and system

An identity authentication and mobile terminal technology, which is applied in the field of identity authentication methods and systems based on mobile terminals, can solve problems such as manual input is prone to errors, and achieve the effect of simplifying operations and ensuring safety

Active Publication Date: 2019-07-23
北京天威诚信电子商务服务有限公司
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Scanning barcodes or manually entering long random strings brings inconvenience to users (no matter scanning barcodes or manual input, users have to perform more operations, and manual input is prone to errors)

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A mobile terminal-based identification method and system
  • A mobile terminal-based identification method and system
  • A mobile terminal-based identification method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0053] Embodiment 1 of the present invention (as figure 1 shown) is to directly use the identity authentication method of the present invention in the login operation of the application system. In this embodiment, the application system of this embodiment corresponds to the information system in the identity authentication method of the present invention, and the client of the application system in this embodiment corresponds to the information system client in the identity authentication method of the present invention. When the user uses the application system client to log in the application system, the user inputs and submits the account name in the application system through the application system client; at the same time, the user uses the login assistant in the mobile terminal and the user's identity certificate (such as account name, password, account name and identification private key, digital certificate and private key) to log in to the application system; the appl...

Embodiment 2

[0055] This embodiment (such as figure 1 As shown), the identity authentication method of the present invention is directly used in the login operation of the application system. The difference from Embodiment 1 is that the display information sent by the login assistant to the application system client in this embodiment is a picture, and the login assistant is moving What the terminal displays is a set of pictures including the pictures sent to the application system client. The user selects the picture he sees on the application system client from a group of pictures displayed on the mobile terminal, and in this way confirms the display information he sees to the login assistant, or informs the login assistant that no matching picture has been seen or is displayed in the information system. The client does not see the picture. Here, the pictures sent and displayed by the login assistant may be from a pre-generated set of pictures (this set of pictures may only include two ...

Embodiment 3

[0057] This embodiment (such as figure 2 As shown), the identity authentication method of the present invention is also directly used in the login operation of the application system. The difference from Embodiments 1 and 2 is that in this embodiment, the login assistant receives a request from the information system to allow the user to log in Finally, the user is prompted to randomly (randomly, arbitrarily) input information on the human-computer interaction interface of the login assistant, and the information entered by the user is sent to the information system client through the information system; Whether the information entered by the user on the mobile terminal is displayed, and confirm the result to the login assistant, and the login assistant determines whether the information system client has received the information sent by it. In this method, the information entered by the user is not important or what it is. The user usually only needs to input a few character...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to a mobile terminal-based identification method and a system based on the method. A user uses an information system client to submit an account name to an information system and requests logon and authentication; meanwhile, the user uses a logon assistant in the mobile terminal and a user identity credential to complete logon or authentication in the information system; the information system uses the account name submitted by the user and the used identity credential to associate the information system client used by the user with the logon assistant; the logon assistant sends information to the information system client by using the information system, and determines, according to a confirmation operation of the user, whether the information system client receives the sent information; and when the user determines that the information system client receives the information sent by the logon assistant, the logon assistant gives a confirmation to the information system that the user using the information system client is allowed to complete logon or authentication in the information system, then the information system allows the user to login or pass the authentication.

Description

technical field [0001] The invention belongs to the technical field of information security, in particular to an identification method and system based on a mobile terminal. Background technique [0002] In order to cope with the risk of account name and password theft that use public computers to log in (logon) network information systems in Internet cafes and other public environments, and to facilitate users' login in information systems, people have proposed some methods of using mobile terminals (such as mobile phones, tablet computers, etc.) ) information system login scheme, such as the patent applicant of the present invention in its patent application "A login method based on mobile communication terminal and short message" (application number: 201510225152.6), "A system and login method based on mobile phone login" ( Application number: 201410395338.1), "An asynchronous login method for information systems" (201510393405.0), and a series of patents from Tencent and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3215H04L63/0815H04L63/18
Inventor 龙毅宏
Owner 北京天威诚信电子商务服务有限公司