Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for identity authentication of Internet user

An identity authentication and user technology, applied in user identity/authority verification, electrical components, transmission systems, etc., can solve problems such as inconvenient, reduced revenue, increased operating costs, etc., to improve use security and reduce operating costs , the effect of reducing the cost burden

Inactive Publication Date: 2012-04-04
CHUNGHWA TELECOM CO LTD
View PDF3 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, due to the current second verification procedure, most users are required to purchase additional equipment, such as dynamic password generators, chip cards, card readers, etc. Although the security of identification is improved, it often increases the number of users. cost burden
In addition, when users apply for dynamic password generators or chip cards, they need to perform additional application operations, so it is not very convenient for users
Of course, for the industry, in order to provide users with dynamic password generators or chip cards, it will inevitably increase operating costs, thereby reducing revenue.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for identity authentication of Internet user
  • Method for identity authentication of Internet user
  • Method for identity authentication of Internet user

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] The implementation of the present invention is described below through specific specific examples. Those skilled in the art can easily understand other advantages and effects of the present invention from the content disclosed in this specification, and can also be implemented or applied through other different specific examples.

[0019] see figure 1 , depicts a flow chart of the steps of the network user identity authentication method of the present invention. What has been stated earlier here is that the network user identity authentication method of the present invention is for the user to pass through a data processing device (not shown) connected to the service platform (not shown), and to connect to the authentication platform The mobile communication device (not shown) performs a user login operation. In actual application, the service platform can be a server used to provide users with access to or obtain network services such as audio-visual files and applica...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method for the identity authentication of an Internet user is disclosed, for performing identity authentication on a user via a data processing device connected with a service platform and a mobile communication device connected with a verification platform. The method for the identity authentication of an Internet user comprises the following steps of: firstly ordering the service platform to receive and verify a user account and a user password input in the data processing device by a user; after the verification is passed, ordering the verification platform to verify the mobile communication device according to the pre-stored mobile communication data, and providing a dynamic password for the verified mobile communication device; then ordering the verification platform to receive the dynamic password input by the user from the data processing device, and verifying the received dynamic password according to the dynamic password provided for the mobile communication device; and after the verification is passed, approving user login operation performed by the user. Via the method for the identity authentication of an Internet user, the security of user login operation and Internet use is further improved.

Description

technical field [0001] The invention relates to a network user identity authentication method, in particular to a network user identity authentication method realized through the cooperative operation of a data processing device and a mobile communication device. Background technique [0002] Public security incidents of fraudulent use of online accounts are emerging in an endless stream in today's society. Among them, unscrupulous hackers steal the victim's account number and password, further impersonate the Internet transaction or disclose the victim's private data, etc. The most common cases. [0003] In order to reduce the risk of fraudulent use of online accounts, operators are trying their best to implement various advanced identity verification methods, such as the common second verification procedure. For example, the dynamic password lock service requires users to purchase a specific dynamic password generator first, and after entering the traditional account numbe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 王国荣
Owner CHUNGHWA TELECOM CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products