Registration authenticating method

A technology for registration and authentication and authentication information, applied in the field of communication, can solve the problems of private key leakage, single method, certificate attack, etc., to solve the contradiction between security and convenience, reduce technical difficulty, and improve the effect of speed.

Inactive Publication Date: 2017-07-28
ANHUI WATER RESOURCES DEV
View PDF8 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, the common identity authentication technology of mobile terminals uses digital certificates to achieve login authentication, but it completely relies on digital certificate information verification. Because of the single method, there are bound to be security risks of private key leakage, certificate attack and counterfeiting.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Registration authenticating method
  • Registration authenticating method
  • Registration authenticating method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] figure 1 It is a structure of an embodiment of a registration authentication method, mainly composed of a mobile terminal and a server, wherein a registration interface module is used to obtain terminal user information and mobile phone feature codes; a registration management module is used to record user information and mobile phone feature codes And generate the authentication information to be audited; the SMS interface module is used to activate the SMS screening service for the authentication information to be audited by SMS; the SMS screening service module is used to verify the correctness of the mobile phone number in the authentication information to be audited; the authentication management module uses By comparing and verifying the authentication information to be reviewed that has passed the SMS screening, and after the user information is successfully registered or updated, a prompt message of successful registration or update is pushed to the user terminal...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a registration authenticating method, comprising the following steps: 1) obtaining the terminal user information and the cell phone feature code; 2) recording the user information and the cell phone feature code and generating the to-be-authenticated information; 3) through a message port, activating the information discriminating service through a message manner; 3) comparing and authenticating whether there exists the to-be-authenticated information or not after the message discrimination; and if there is no such information, then, executing the operation of registration authenticating service; and if there is such information, executing the operation of updating authenticating service. With the method, the operation of user registration authenticating becomes more rapid, and the difficulty with system development can be reduced effectively. At the same time, through the message port and the message discrimination service, it is possible to instantly authenticate the correctness of the to-be-authenticated information so as to better solve the conflict between the security of user registration authentication and the rapidness in doing so.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a registration authentication method. Background technique [0002] With the advent of the "Internet +" era, wireless mobile communication technology has achieved unprecedented rapid development, and the scale of mobile users has also grown explosively. According to the latest data, the number of global mobile users has exceeded 4.7 billion and will soon exceed 5 billion. It is undeniable that the mobile Internet and mobile terminals have greatly facilitated and enriched people's lives, but while bringing convenience, they have also brought unprecedented challenges to our information security. At present, the common identity authentication technology of mobile terminals uses digital certificates to achieve login authentication, but it completely relies on digital certificate information verification. Because of the single method, there are bound to be security risks of pri...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04W60/00
Inventor 吴红星章龙巢良存赵时运刘家静王厚良
Owner ANHUI WATER RESOURCES DEV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products