Authentication method and device for user identification card, and non-volatile storage medium

A technology for user identification and identification card, applied in the direction of user identity/authority verification, security device, secure communication device, etc., can solve the problems of low security factor and low verification intensity, so as to improve the verification intensity and solve the problem of low verification intensity. , the effect of improving the safety factor

Active Publication Date: 2022-07-01
北京时代亿信科技股份有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present application provides an authentication method and device for a user identification card, and a non-volatile storage medium, so as to at least solve the technical problems of low verification strength and low safety factor in the existing SIM card authentication technology

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method and device for user identification card, and non-volatile storage medium
  • Authentication method and device for user identification card, and non-volatile storage medium
  • Authentication method and device for user identification card, and non-volatile storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] In order to make those skilled in the art better understand the solutions of the present application, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present application. Obviously, the described embodiments are only The embodiments are part of the present application, but not all of the embodiments. Based on the embodiments in the present application, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the protection scope of the present application.

[0027] It should be noted that the terms "first", "second", etc. in the description and claims of the present application and the above drawings are used to distinguish similar objects, and are not necessarily used to describe a specific sequence or sequence. It is to be understood that data so used may be interchanged under app...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present application discloses a user identity card authentication method and device, and a non-volatile storage medium. The method includes: receiving an authentication request initiated by a mobile terminal to authenticate a user identity card, wherein the authentication request includes: an encryption certificate of the mobile terminal; obtaining a timestamp generated by a timestamp server, and analyzing the mobile terminal's The public key encryption time stamp obtained by the encryption certificate is obtained, and the ciphertext time stamp is obtained; the ciphertext time stamp and the server's encryption certificate are sent to the mobile terminal; the authentication information sent by the mobile terminal is received, and the user identity card is authenticated according to the authentication information. , wherein the authentication information is obtained by the mobile terminal based on the information of the user identity card, the encryption certificate of the server and the ciphertext timestamp. The present application solves the technical problems of low verification intensity and low safety factor in the existing SIM card authentication technology.

Description

technical field [0001] The present application relates to the field of chip security, and in particular, to an authentication method and device for a user identification card, and a non-volatile storage medium. Background technique [0002] The Subscriber Identity Module (SIM), also known as the super SIM card, is based on the SIM card security chip and uses different functional modules of the SIM card to achieve low, medium and high authentication security products. It can provide users with mobile phone-based security products. One-click login of the number, financial U-shield authentication, electronic identity authentication and other capabilities. [0003] The existing SIM card authentication method is to send the mobile phone number corresponding to the SIM card to the server for verification through the traffic channel, which has low verification strength and low security factor. [0004] For the above problems, no effective solution has been proposed yet. SUMMARY ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/069H04W12/40H04L9/32
CPCH04W12/069H04W12/40H04L9/3247H04L9/3297
Inventor 李继国章勇张斌
Owner 北京时代亿信科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products