Identity authentication method and system based on telecommunication smart card

An identity authentication and smart card technology, applied in the field of communications, can solve the problems of multiple entry of reserved information and additional carrying, and achieve the effect of improving security and realizing storage.

Pending Publication Date: 2022-06-24
CHINA UNITED NETWORK COMM GRP CO LTD +1
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] This application provides an identity authentication method and system based on a telecom smart card, which reduces the risk of user privacy information such as ID number and name information being leaked during the general identity authentication process, and further solves the problem that users need to enter different information multiple times. Reserved Information and Additional Carried Questions

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and system based on telecommunication smart card
  • Identity authentication method and system based on telecommunication smart card
  • Identity authentication method and system based on telecommunication smart card

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] For the sake of understanding, the related terms involved in this application will be explained first.

[0033] 1. Smart card

[0034] Smart card Generic term for plastic cards with embedded microchips. Some smart cards contain a microelectronic chip, and the smart card needs to exchange data through a reader. The integrated circuit in the smart card includes a central processing unit (CPU), random access memory (RAM) and an in-card operating system solidified in the read-only memory. The data in the card is divided into external reading and internal processing parts. , which can handle a large amount of data by itself. At present, smart cards are mainly divided into two categories, one is operator smart cards, and the other is financial smart cards.

[0035] For the operator's smart card, for example, the subscriber identity module (SIM card for short) is the identity authentication card held by the mobile users of the global system for mobile communications (GSM), ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an identity authentication method and system based on a telecommunication smart card. According to the technical scheme, the identification information of the user is encrypted through the SIM card, so that the risk that privacy information of the user, such as an identity card number, a name and the like, is leaked in a general identity authentication process is avoided; besides, the identity authentication method is realized by the user through the SIM card, and the SIM card is carried in the user handheld terminal, so that the problem that an intelligent card for identity authentication needs to be additionally carried is solved.

Description

technical field [0001] The present application relates to the field of communication technologies, and in particular, to an identity authentication method and system based on a telecommunication smart card. Background technique [0002] With the widespread application of mobile Internet to all aspects of society, more and more enterprises and individuals are engaged in various business and transaction activities on the Internet. The development of these electronic businesses depends on secure user identity authentication. [0003] The current identity authentication method is mainly to first enter the user's fingerprint information, ID card number information or other information into the authentication system, and when the user authenticates, he carries the corresponding authentication object for authentication. For example, when going through the security check at the airport, the user's ID number is generally entered when buying a ticket, and then the user's ID card is us...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/03H04W12/06H04W12/33
CPCH04W12/02H04W12/06
Inventor 梁斌刘毅敏刘翔宇陈凤常可心秦炜肖磊
Owner CHINA UNITED NETWORK COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products