Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Real-name authentication safe login method and system based on cell phone number

A mobile phone number and real-name authentication technology, which is applied in the field of real-name authentication security login based on mobile phone numbers, can solve the problems of user privacy security, data security and real-name requirements, no better implementation mode, and network environment chaos. Reliance on user information, convenient management, and convenient unified management

Inactive Publication Date: 2013-08-28
安徽杨凌科技有限公司
View PDF4 Cites 53 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The above-mentioned existing security authentication technologies have brought certain security to varying degrees, and at the same time brought certain inconveniences to varying degrees. In addition, in the current complicated network environment, network deception often occurs On the one hand, it is because of the disclosure of user privacy, and on the other hand, because of the falseness of user information, the cost of cybercrime is very small. This phenomenon will lead to a very chaotic domestic network environment, and eventually make users lose trust in it. , the society is paying more and more attention to network security, and is also more and more worried about cybercrimes. It is difficult to achieve a certain balance between privacy security, data security and real-name requirements

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Real-name authentication safe login method and system based on cell phone number
  • Real-name authentication safe login method and system based on cell phone number
  • Real-name authentication safe login method and system based on cell phone number

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] figure 1 It is a structural schematic diagram of the system of the present invention, such as figure 1 As shown, a real-name authentication security login system based on a mobile phone number, it includes a client and a server, the client includes a mobile phone authentication client, which can keep the user in continuous connection with the real-time authentication server, through the authentication server To provide authentication for third-party applications, the third-party application login program, the login interface for logging in to the unified login server invoked in the third-party application, the server includes a real-name identity management server, a real-time authentication server, a unified login server, and a session management server , the real-name identity management server is used to manage the information of the authenticated user, and to ensure the security, privacy and correctness of the user information; the real-time authentication server is...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a real-name authentication safe login method and system based on a cell phone number, and relates to the field of internet real-name authentication. The method includes the steps that a real-name identity management server carries out verification and registration according to identity information provided by a user; the user activates an account number through cell phone dynamic verification codes and a digital certificate after passing the verification; a third-party application applies for a login service, a request is sent to a unified login server and transmitted to a real-time authentication server, the real-time authentication server sends the request to the user for validation, the unified login server adjusts whether the third-party application is allowed to log in according to a result returned to the unified login server, and the unified login server saves session information in a session management server and returns the information to the third-party application if the third-party application is allowed to log in. The real-name authentication safe login method and system based on the cell phone number solve the problem that the user relies on user information in different applications, can guarantee safety of the information through cell phone authentication and brings convenience to management for network management departments, the user does not need to maintain personal information again in all the applications, convenience is brought to the user, and worry about privacy disclosure of the user is reduced.

Description

Technical field: [0001] The invention relates to the technical field of Internet application security authentication and real-name authentication login, in particular to a method and system for real-name authentication security login based on a mobile phone number. Background technique: [0002] With the rapid development of the Internet, a variety of applications from different service providers are emerging, and people are also facing the huge challenge of how to exchange information conveniently and safely, especially when the security requirements are high In commercial applications, such as banking systems, online shopping systems, and enterprise information systems, people have four security requirements for confidentiality, integrity, authenticity, and non-repudiation. [0003] At present, the authentication modes adopted by most security authentication systems in China mainly include the following types: [0004] 1) User name plus password authentication: users only...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06H04W12/00H04W12/06H04W12/069H04W12/08H04W12/126
Inventor 汪志宾
Owner 安徽杨凌科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products