Intelligent card safety authentication method and intelligent card safety authentication system on basis of data and short message technologies

A security authentication, smart card technology, applied in the field of information and communication, can solve the problems of inconsistent user name and password rules, great impact on user experience, forgetting passwords, etc.

Active Publication Date: 2018-01-09
EASTCOMPEACE TECH
View PDF3 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, most application platforms use user name and password as a way of security authentication and login. On the one hand, due to the inconsistent user name and password rules of each platform, users often forget their passwords, which has a great impact on user experience. On the other hand, due to the emergence of various attack methods to steal user passwords such as phishing websites and credential databases, the traditional user name and password, which is a secure authentication login method, has been greatly challenged.
[0003] In addition, some platforms also improve the security of authentication by sending text messages such as "SMS verification code" or "SMS notification". The risk of being attacked, intercepted, tampered with, etc. greatly reduces the security of authentication between the business platform and mobile communication devices

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intelligent card safety authentication method and intelligent card safety authentication system on basis of data and short message technologies
  • Intelligent card safety authentication method and intelligent card safety authentication system on basis of data and short message technologies
  • Intelligent card safety authentication method and intelligent card safety authentication system on basis of data and short message technologies

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0060] The embodiment of the present invention discloses a smart card security authentication method based on data message technology, see figure 1 As shown, the method is applied to the security service platform, including:

[0061] Step S11: Intercept the information to be signed sent by the service platform.

[0062] Among them, the above-mentioned business platforms include but are not limited to platforms such as websites and APPs.

[0063] In this embo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an intelligent card safety authentication method and an intelligent card safety authentication system on the basis of data and short message technologies. The intelligent cardsafety authentication method includes intercepting and capturing to-be-signed information transmitted by a business platform, encrypting the to-be-signed information to obtain first encrypted information and transmitting the first encrypted information to an SIM (subscriber identification module) card by the aid of the data and short message technologies; decrypting the first encrypted informationby the aid of safety authentication application after the first encrypted information is received by the SIM card, signing the decrypted to-be-signed information and encrypting obtained signed information to obtain second encrypted information; receiving the second encrypted information transmitted by the SIM card and decrypting the second encrypted information; transmitting the decrypted signedinformation to the business platform to allow the business platform to verify signature for the decrypted signed information so as to complete safety authentication. The intelligent card safety authentication method and the intelligent card safety authentication system have the advantages that the transmitted information is encrypted, and the safety authentication can be implemented between the business platform and the SIM card by the aid of signature functions of the safety authentication application and signature verification functions of the business platform.

Description

technical field [0001] The invention relates to the field of information communication, in particular to a smart card security authentication method and system based on data short message technology. Background technique [0002] At present, most application platforms use user name and password as a way of security authentication and login. On the one hand, due to the inconsistent user name and password rules of each platform, users often forget their passwords, which has a great impact on user experience. ; On the other hand, due to the emergence of various attack methods to steal user passwords such as phishing websites and credential databases, the traditional security authentication login method of user name and password has been greatly challenged. [0003] In addition, some platforms also improve the security of authentication by sending text messages such as "SMS verification code" or "SMS notification". Risks such as being attacked, intercepted, and tampered with wi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04W4/14
Inventor 刘磊周向涛李昕
Owner EASTCOMPEACE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products