Supercharge Your Innovation With Domain-Expert AI Agents!

Information authentication method and authentication server

An authentication server and authentication method technology, which is applied in the field of information authentication methods and authentication servers, can solve problems such as high development costs, high technical thresholds, and complex operations, and achieve the effects of avoiding personal information leakage, simple technical solutions, and low development costs

Active Publication Date: 2021-03-12
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF8 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The existing information authentication process often requires the user to input the name, ID number or even face recognition, which is cumbersome and has the risk of leaking the user's personal information during the input and transmission process
At the same time, the existing technologies require users to complete information authentication according to the product description, and specific business systems need to be connected and developed or system reformed according to different authentication processes.
[0003] In summary, the main disadvantages of the information authentication process for existing equipment are: complex operation, risk of privacy leakage, high technical threshold, and high development cost

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information authentication method and authentication server
  • Information authentication method and authentication server
  • Information authentication method and authentication server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] In order to enable those skilled in the art to better understand the technical solution of the present disclosure, the present disclosure will be described in further detail below in conjunction with the accompanying drawings and specific embodiments.

[0040] In order to solve the problems of complex operation, risk of privacy leakage, high technical threshold and high development cost in the information authentication process for existing equipment. The disclosure provides an information authentication method and an authentication server. The following will be described in detail one by one with reference to the drawings of the embodiments provided in the present disclosure.

[0041] figure 1 A flow chart of an information authentication method provided by an embodiment of the present disclosure is shown. The information authentication method can be applied to an authentication server. Such as figure 1 As shown, the information authentication method provided in th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an information authentication method and an authentication server, and the method comprises the steps: receiving an authentication request transmitted by terminal equipment, andobtaining the address of the terminal equipment; in response to the fact that the fixed network account corresponding to the address of the terminal device is inquired locally, obtaining identity information corresponding to the fixed network account from a service ordering server; and performing desensitization processing on the identity information to obtain desensitized data, and sending the desensitized data to the terminal device, so that a user of the terminal device confirms the correctness of the desensitized data. The method only depends on a network environment, does not depend on equipment and services, and is simple in technical scheme and low in development cost. A service access party does not need to perform butt joint development or perform secondary transformation on a service system; meanwhile, the scheme is realized based on an existing broadband access server of an operator, and the operator does not need to carry out additional equipment investment. Personal information leakage can be effectively avoided. The technical scheme is convenient to use and good in user experience.

Description

technical field [0001] The disclosure belongs to the technical field of communication, and in particular relates to an information authentication method and an authentication server. Background technique [0002] With the implementation and popularization of the Internet real-name system policy, more and more businesses need to authenticate users. The existing information authentication process often requires the user to input name, ID number or even face recognition, which is cumbersome and has the risk of leaking the user's personal information during the input and transmission process. At the same time, the existing technologies require users to complete information authentication according to product descriptions, and specific business systems need to be connected and developed or system reformed according to different authentication processes. [0003] To sum up, the main disadvantages of the information authentication process for existing devices are: complex operatio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/12
CPCH04L63/0876H04L61/2503
Inventor 姜琳赵鑫鲁笛
Owner CHINA UNITED NETWORK COMM GRP CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More