Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

New method for using the mobile number bond with account for identity identification

A mobile phone number and account binding technology, applied in user identity/authority verification, data exchange through path configuration, electrical components, etc., can solve problems such as poor awareness of user prevention, loss, account theft, etc.

Inactive Publication Date: 2007-12-12
马骏
View PDF0 Cites 43 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] The current user identity confirmation method is basically in the form of account number and password, but if it is stolen, it will cause huge losses
The incompleteness of the current Internet legislation, the loopholes in the system itself, and the poor awareness of users have all caused frequent incidents of account theft on the Internet.
However, the current methods of anti-theft of accounts are all carried out on the Internet, just like changing passwords under the eyes of hackers.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0005] 1. The user enters the login interface to fill in the account number and sends a login request to the authentication server. The authentication server sends a confirmation string to the client computer when the user enters the login interface or sends a confirmation string to the client computer after receiving the login request, and then After receiving the login request, assign a time slice to the account; the user will send the confirmation string to the mobile phone number bound to the account to the telecommunications terminal connected to the authentication server through SMS within the specified time, and the server will pass the confirmation character sent After confirming the legitimacy of the account, the client computer corresponding to the confirmation string is allowed to log in to the account. If the confirmation string sent is wrong or the confirmation string is not sent within the specified time, it will return to the login interface.

[0006] 2. The user...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the information security field of computer and network, relates to ID attestation system and method, and it can prevent the user account from stolen. The method uses the mobile phone to do network ID attestation, distinguish the computer by the affirmed strings, and the user account and mobile phone can correspond with client computer one by one to identify the validity of user ID. The method can be used in various account affirmations of network services (web management, e-mail, e-business, network game, chatting tool, network bank and the field of remote control), and it also can be used other service relative with network (the operation of ATM). It is a efficient method to prevent the network form being stolen.

Description

technical field [0001] The invention relates to the field of computer and network information security, relates to various identity authentication systems and methods related to the network, and is a method for effectively preventing user accounts from being stolen. Background technique [0002] The current user identity confirmation method is basically the form of adding a password to the account number, but if it is stolen, huge losses will be generated. The incompleteness of the current Internet legislation, the loopholes in the system itself, and the poor awareness of users' prevention have all caused frequent incidents of account theft in the Internet. But the current account number anti-theft methods are all carried out on the Internet, just like changing passwords under the eyes of hackers, they are all expedient measures, and they are not a permanent solution. How to find a method that can treat both symptoms and root causes? Contents of the invention [0003] Th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L12/28H04L29/06
Inventor 马骏
Owner 马骏
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products